From 0a96fe40762e62d82857eaa8be1e93d282ef9c79 Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Mon, 13 Aug 2007 16:23:14 +0000 Subject: [PATCH] Add some missing markup Update copyright --- sudo.pod | 26 ++++++++++++-------------- sudoers.pod | 7 ++++--- visudo.pod | 2 +- 3 files changed, 17 insertions(+), 18 deletions(-) diff --git a/sudo.pod b/sudo.pod index 6325ba4e2..305c7b5ca 100644 --- a/sudo.pod +++ b/sudo.pod @@ -60,8 +60,8 @@ When invoked as B, the B<-e> option (described below), is implied. B determines who is an authorized user by consulting the file -F<@sysconfdir@/sudoers>. By giving B the B<-v> flag a user -can update the time stamp without running a I The password +F<@sysconfdir@/sudoers>. By giving B the B<-v> flag, a user +can update the time stamp without running a I. The password prompt itself will also time out if the user's password is not entered within C<@password_timeout@> minutes (unless overridden via I). @@ -97,11 +97,10 @@ B accepts the following command line options: The B<-a> (I) option causes B to use the specified authentication type when validating the user, as allowed -by /etc/login.conf. The system administrator may specify a list +by F. The system administrator may specify a list of sudo-specific authentication methods by adding an "auth-sudo" -entry in /etc/login.conf. This option is only available on systems -that support BSD authentication where B has been configured -with the --with-bsdauth option. +entry in F. This option is only available on systems +that support BSD authentication. =item -b @@ -123,18 +122,17 @@ L. The B<-c> (I) option causes B to run the specified command with resources limited by the specified login class. The I -argument can be either a class name as defined in /etc/login.conf, +argument can be either a class name as defined in F, or a single '-' character. Specifying a I of C<-> indicates that the command should be run restricted by the default login capabilities for the user the command is run as. If the I argument specifies an existing user class, the command must be run as root, or the B command must be run from a shell that is already -root. This option is only available on systems with BSD login classes -where B has been configured with the --with-logincap option. +root. This option is only available on systems with BSD login classes. =item -E -The B<-E> (I) option will override the +The B<-E> (I I) option will override the I option in L). It is only available when either the matching command has the C tag or the I option is set in L. @@ -215,7 +213,7 @@ file. The B<-L> (I defaults) option will list out the parameters that may be set in a I line along with a short description -for each. This option is useful in conjunction with grep(1). +for each. This option is useful in conjunction with L. =item -l [I] @@ -229,7 +227,7 @@ exit with a return value of 1. =item -P -The B<-P> (I) option causes B to +The B<-P> (I I) option causes B to preserve the invoking user's group vector unaltered. By default, B will initialize the group vector to the list of groups the target user is in. The real and effective group IDs, however, are @@ -313,7 +311,7 @@ a command. =item -- -The C<--> flag indicates that B should stop processing command +The B<--> flag indicates that B should stop processing command line arguments. It is most useful in conjunction with the B<-s> flag. =back @@ -433,7 +431,7 @@ In B<-s> or B<-H> mode (or if sudo was configured with the =item C -Set to a sane value if sudo was configured with the --with-secure-path option +Set to a sane value if the I sudoers option is set. =item C diff --git a/sudoers.pod b/sudoers.pod index 921a0e753..8ada44d9b 100644 --- a/sudoers.pod +++ b/sudoers.pod @@ -1,5 +1,6 @@ =cut -Copyright (c) 1994-1996,1998-2005 Todd C. Miller +Copyright (c) 1994-1996, 1998-2005, 2007 + Todd C. Miller Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above @@ -1137,7 +1138,7 @@ machines in the I C, we keep an additional local log file and make sure we log the year in each log line since the log entries will be kept around for several years. Lastly, we disable shell escapes for the commands in the PAGERS C -(/usr/bin/more, /usr/bin/pg and /usr/bin/less). +(F, F and F). # Override built-in defaults Defaults syslog=auth @@ -1233,7 +1234,7 @@ in the I C (master, mail, www and ns). jill SERVERS = /usr/bin/, !SU, !SHELLS For any machine in the I C, B may run -any commands in the directory /usr/bin/ except for those commands +any commands in the directory F except for those commands belonging to the I and I C. steve CSNETS = (operator) /usr/local/op_commands/ diff --git a/visudo.pod b/visudo.pod index 8ddb0f7ca..84395c21e 100644 --- a/visudo.pod +++ b/visudo.pod @@ -1,5 +1,5 @@ =cut -Copyright (c) 1996,1998-2004 Todd C. Miller +Copyright (c) 1996,1998-2005, 2007 Todd C. Miller Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above -- 2.40.0