From df7144394cdfba51911ac2f208ebca20d1c53ccb Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Sat, 15 Dec 2001 16:39:51 +0000 Subject: [PATCH] regen --- sudoers.cat | 48 ++++++++++++++++++++++++------------------------ sudoers.man.in | 12 ++++++------ 2 files changed, 30 insertions(+), 30 deletions(-) diff --git a/sudoers.cat b/sudoers.cat index 329083cf4..9aa8ac70c 100644 --- a/sudoers.cat +++ b/sudoers.cat @@ -61,7 +61,7 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN -December 14, 2001 1.6.4 1 +December 15, 2001 1.6.4 1 @@ -127,7 +127,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 2 +December 15, 2001 1.6.4 2 @@ -193,7 +193,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 3 +December 15, 2001 1.6.4 3 @@ -259,7 +259,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 4 +December 15, 2001 1.6.4 4 @@ -325,7 +325,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 5 +December 15, 2001 1.6.4 5 @@ -391,7 +391,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 6 +December 15, 2001 1.6.4 6 @@ -457,7 +457,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 7 +December 15, 2001 1.6.4 7 @@ -490,8 +490,8 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) _s_e_t___l_o_g_n_a_m_e option). If ssssuuuuddddoooo was compiled with the SECURE_PATH option, its value will be used for the PATH environment variable. Other - variables may be preserved with the - i option. + variables may be preserved with the _e_n_v___k_e_e_p + option. use_loginclass If set, ssssuuuuddddoooo will apply the defaults specified @@ -523,7 +523,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 8 +December 15, 2001 1.6.4 8 @@ -589,7 +589,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 9 +December 15, 2001 1.6.4 9 @@ -655,7 +655,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 10 +December 15, 2001 1.6.4 10 @@ -694,8 +694,8 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) to guard against printf-style format vulnera­ bilties in poorly-written programs. The list can be replaced, added to, deleted from, or - disabled by using the =, +=, -=, and oper­ - ators respectively. The default list of envi­ + disabled by using the =, +=, -=, and ! opera­ + tors respectively. The default list of envi­ ronment variable to check is printed when ssssuuuuddddoooo is run by root with the _-_V option. @@ -703,7 +703,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) ronment variables to be removed from the user's environment. The list can be replaced, added to, deleted from, or disabled by using - the =, +=, -=, and operators respectively. + the =, +=, -=, and ! operators respectively. The default list of environment variable to remove is printed when ssssuuuuddddoooo is run by root with the _-_V option. @@ -715,13 +715,13 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) trol over the environment ssssuuuuddddoooo-spawned pro­ cesses will get. The list can be replaced, added to, deleted from, or disabled by using - the =, +=, -=, and operators respectively. + the =, +=, -=, and ! operators respectively. This list has no default members. -December 14, 2001 1.6.4 11 +December 15, 2001 1.6.4 11 @@ -787,7 +787,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 12 +December 15, 2001 1.6.4 12 @@ -853,7 +853,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 13 +December 15, 2001 1.6.4 13 @@ -919,7 +919,7 @@ EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS -December 14, 2001 1.6.4 14 +December 15, 2001 1.6.4 14 @@ -985,7 +985,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 15 +December 15, 2001 1.6.4 15 @@ -1051,7 +1051,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 16 +December 15, 2001 1.6.4 16 @@ -1117,7 +1117,7 @@ sudoers(4) MAINTENANCE COMMANDS sudoers(4) -December 14, 2001 1.6.4 17 +December 15, 2001 1.6.4 17 @@ -1183,6 +1183,6 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO -December 14, 2001 1.6.4 18 +December 15, 2001 1.6.4 18 diff --git a/sudoers.man.in b/sudoers.man.in index 14159e271..8953438ec 100644 --- a/sudoers.man.in +++ b/sudoers.man.in @@ -1,5 +1,5 @@ .\" Automatically generated by Pod::Man version 1.15 -.\" Fri Dec 14 17:27:57 2001 +.\" Sat Dec 15 09:38:35 2001 .\" .\" Standard preamble: .\" ====================================================================== @@ -138,7 +138,7 @@ .\" ====================================================================== .\" .IX Title "sudoers @mansectform@" -.TH sudoers @mansectform@ "1.6.4" "December 14, 2001" "MAINTENANCE COMMANDS" +.TH sudoers @mansectform@ "1.6.4" "December 15, 2001" "MAINTENANCE COMMANDS" .UC .SH "NAME" sudoers \- list of which users may execute what @@ -521,7 +521,7 @@ The other variables are set to default values (possibly modified by the value of the \fIset_logname\fR option). If \fBsudo\fR was compiled with the \f(CW\*(C`SECURE_PATH\*(C'\fR option, its value will be used for the \f(CW\*(C`PATH\*(C'\fR environment variable. -Other variables may be preserved with the i option. +Other variables may be preserved with the \fIenv_keep\fR option. .Ip "use_loginclass" 12 .IX Item "use_loginclass" If set, \fBsudo\fR will apply the defaults specified for the target user's @@ -682,7 +682,7 @@ be removed from the user's environment if the variable's value contains \f(CW\*(C`%\*(C'\fR or \f(CW\*(C`/\*(C'\fR characters. This can be used to guard against printf-style format vulnerabilties in poorly-written programs. The list can be replaced, added to, deleted from, or disabled by using -the \f(CW\*(C`=\*(C'\fR, \f(CW\*(C`+=\*(C'\fR, \f(CW\*(C`\-=\*(C'\fR, and operators respectively. The default +the \f(CW\*(C`=\*(C'\fR, \f(CW\*(C`+=\*(C'\fR, \f(CW\*(C`\-=\*(C'\fR, and \f(CW\*(C`!\*(C'\fR operators respectively. The default list of environment variable to check is printed when \fBsudo\fR is run by root with the \fI\-V\fR option. .Ip "env_delete" 12 @@ -690,7 +690,7 @@ run by root with the \fI\-V\fR option. A double-quoted, space-separated list of environment variables to be removed from the user's environment. The list can be replaced, added to, deleted from, or disabled by using the \f(CW\*(C`=\*(C'\fR, \f(CW\*(C`+=\*(C'\fR, \f(CW\*(C`\-=\*(C'\fR, -and operators respectively. The default list of environment +and \f(CW\*(C`!\*(C'\fR operators respectively. The default list of environment variable to remove is printed when \fBsudo\fR is run by root with the \&\fI\-V\fR option. .Ip "env_keep" 12 @@ -700,7 +700,7 @@ be preserved in the user's environment when the \fIenv_reset\fR option is in effect. This allows fine-grained control over the environment \&\fBsudo\fR\-spawned processes will get. The list can be replaced, added to, deleted from, or disabled by using the \f(CW\*(C`=\*(C'\fR, \f(CW\*(C`+=\*(C'\fR, \f(CW\*(C`\-=\*(C'\fR, and - operators respectively. This list has no default members. +\&\f(CW\*(C`!\*(C'\fR operators respectively. This list has no default members. .PP When logging via \fIsyslog\fR\|(3), \fBsudo\fR accepts the following values for the syslog facility (the value of the \fBsyslog\fR Parameter): \fBauthpriv\fR (if your \s-1OS\s0 -- 2.40.0