From 05e7cac89b549b83e756b8f04d97d2326bd9fd99 Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Thu, 19 Jul 2012 17:13:19 -0400 Subject: [PATCH] Fix groff warnings. --- doc/sudo.mdoc.in | 16 ++++++++-------- doc/sudoers.mdoc.in | 2 +- 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/doc/sudo.mdoc.in b/doc/sudo.mdoc.in index f305ca302..7d060d471 100644 --- a/doc/sudo.mdoc.in +++ b/doc/sudo.mdoc.in @@ -535,7 +535,7 @@ and .Em runaspw flags in .Xr sudoers @mansectform@ ) -.It Li %U +.It Li \&%U expanded to the login name of the user the command will be run as (defaults to root unless the .Fl u @@ -622,12 +622,12 @@ many shells require that the be escaped with a backslash .Pq Ql \e . Security policies may restrict -.Em uid No Ns s +.Em uid Ns No s to those listed in the password database. The .Em sudoers policy allows -.Em uid No Ns s +.Em uid Ns No s that are not in the password database as long as the .Em targetpw option is not set. @@ -671,9 +671,9 @@ should stop processing command line arguments. .Pp Environment variables to be set for the command may also be passed on the command line in the form of -.Sy VAR No Ns = Ns Em value , +.Sy VAR Ns No = Ns Em value , e.g.\& -.Sy LD_LIBRARY_PATH No Ns = Ns Em /usr/local/pkg/lib . +.Sy LD_LIBRARY_PATH Ns No = Ns Em /usr/local/pkg/lib . Variables passed on the command line are subject to the same restrictions as normal environment variables with one important exception. @@ -829,7 +829,7 @@ The debug flag syntax used by and the .Em sudoers plugin is -.Em subsystem No Ns @ Ns Em priority +.Em subsystem Ns No @ Ns Em priority but the plugin is free to use a different format so long as it does not include a comma .Pq Ql \&, . @@ -963,7 +963,7 @@ If a user runs a command such as or .Li sudo sh , subsequent commands run from that shell are not subject to -.Nm sudo No Ns 's +.Nm sudo Ns No 's security policy. The same is true for commands that offer shell escapes (including most editors). @@ -1165,7 +1165,7 @@ if that user is allowed to run arbitrary commands via .Nm sudo . Also, many programs (such as editors) allow the user to run commands via shell escapes, thus avoiding -.Nm sudo No Ns 's +.Nm sudo Ns No 's checks. However, on most systems it is possible to prevent shell escapes with the .Xr sudoers @mansectform@ diff --git a/doc/sudoers.mdoc.in b/doc/sudoers.mdoc.in index b8298e6d3..5d8dbd1f5 100644 --- a/doc/sudoers.mdoc.in +++ b/doc/sudoers.mdoc.in @@ -2305,7 +2305,7 @@ and .Em runaspw flags in .Em sudoers ) -.It Li %U +.It Li \&%U expanded to the login name of the user the command will be run as (defaults to root) .It Li %u