Use @mansectsu@ and @mansectform@ in the man page bodies as well.

This commit is contained in:
Todd C. Miller
2000-03-27 03:26:24 +00:00
parent 92132436be
commit 6c94d8d231
9 changed files with 52 additions and 56 deletions

View File

@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
22/Mar/2000 1.6.3 1
26/Mar/2000 1.6.3 1
@@ -122,12 +122,12 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
-s The -s (_s_h_e_l_l) option runs the shell specified by the
_S_H_E_L_L environment variable if it is set or the shell
as specified in _p_a_s_s_w_d(5).
as specified in _p_a_s_s_w_d(4).
22/Mar/2000 1.6.3 2
26/Mar/2000 1.6.3 2
@@ -138,7 +138,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
-H The -H (_H_O_M_E) option sets the _H_O_M_E environment
variable to the homedir of the target user (root by
default) as specified in _p_a_s_s_w_d(5). By default, ssssuuuuddddoooo
default) as specified in _p_a_s_s_w_d(4). By default, ssssuuuuddddoooo
does not modify _H_O_M_E.
-S The -S (_s_t_d_i_n) option causes ssssuuuuddddoooo to read the password
@@ -193,7 +193,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
22/Mar/2000 1.6.3 3
26/Mar/2000 1.6.3 3
@@ -225,7 +225,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
give away files.
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
Note: the following examples assume suitable _s_u_d_o_e_r_s(5)
Note: the following examples assume suitable _s_u_d_o_e_r_s(4)
entries.
To get a file listing of an unreadable directory:
@@ -259,7 +259,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT
22/Mar/2000 1.6.3 4
26/Mar/2000 1.6.3 4
@@ -325,7 +325,7 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
22/Mar/2000 1.6.3 5
26/Mar/2000 1.6.3 5
@@ -337,7 +337,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
directory, setuid shell scripts are generally safe).
SSSSEEEEEEEE AAAALLLLSSSSOOOO
_l_o_g_i_n___c_a_p(3), _s_u_d_o_e_r_s(5), _v_i_s_u_d_o(8), _s_u(1).
_l_o_g_i_n___c_a_p(3), _s_u_d_o_e_r_s(4), _v_i_s_u_d_o(1m), _s_u(1).
@@ -391,6 +391,6 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
22/Mar/2000 1.6.3 6
26/Mar/2000 1.6.3 6

View File

@@ -2,12 +2,8 @@
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
''' Revision 1.2 2000/03/23 00:35:58 millert
''' Add FreeBSD login.conf support (untested on BSD/OS) based on a patch from
''' Michael D. Marchionna.
''' configure now does substitution on the man pages, allowing us to
''' fix up the paths and set the section correctly. Based on an idea
''' from Michael D. Marchionna.
''' Revision 1.3 2000/03/27 03:26:23 millert
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
@@ -100,7 +96,7 @@
.nr % 0
.rr F
.\}
.TH sudo @mansectsu@ "1.6.3" "22/Mar/2000" "MAINTENANCE COMMANDS"
.TH sudo @mansectsu@ "1.6.3" "26/Mar/2000" "MAINTENANCE COMMANDS"
.UC
.if n .hy 0
.if n .na
@@ -286,11 +282,11 @@ as a user other than \fIroot\fR. To specify a \fIuid\fR instead of a
.Ip "-s" 4
The \f(CW-s\fR (\fIshell\fR) option runs the shell specified by the \fI\s-1SHELL\s0\fR
environment variable if it is set or the shell as specified
in \fIpasswd\fR\|(5).
in \fIpasswd\fR\|(@mansectform@).
.Ip "-H" 4
The \f(CW-H\fR (\fI\s-1HOME\s0\fR) option sets the \fI\s-1HOME\s0\fR environment variable
to the homedir of the target user (root by default) as specified
in \fIpasswd\fR\|(5). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
in \fIpasswd\fR\|(@mansectform@). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
.Ip "-S" 4
The \f(CW-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
standard input instead of the terminal device.
@@ -354,7 +350,7 @@ will be ignored and sudo will log and complain. This is done to
keep a user from creating his/her own timestamp with a bogus
date on system that allow users to give away files.
.SH "EXAMPLES"
Note: the following examples assume suitable \fIsudoers\fR\|(5) entries.
Note: the following examples assume suitable \fIsudoers\fR\|(@mansectform@) entries.
.PP
To get a file listing of an unreadable directory:
.PP
@@ -439,7 +435,7 @@ that make setuid shell scripts unsafe on some operating systems
(if your OS supports the /dev/fd/ directory, setuid shell scripts
are generally safe).
.SH "SEE ALSO"
\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(5), \fIvisudo\fR\|(8), \fIsu\fR\|(1).
\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(@mansectform@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1).
.rn }` ''
.IX Title "sudo @mansectsu@"

View File

@@ -160,13 +160,13 @@ I<username>, use "#uid".
The C<-s> (I<shell>) option runs the shell specified by the I<SHELL>
environment variable if it is set or the shell as specified
in passwd(5).
in passwd(@mansectform@).
=item -H
The C<-H> (I<HOME>) option sets the I<HOME> environment variable
to the homedir of the target user (root by default) as specified
in passwd(5). By default, B<sudo> does not modify I<HOME>.
in passwd(@mansectform@). By default, B<sudo> does not modify I<HOME>.
=item -S
@@ -242,7 +242,7 @@ date on system that allow users to give away files.
=head1 EXAMPLES
Note: the following examples assume suitable sudoers(5) entries.
Note: the following examples assume suitable sudoers(@mansectform@) entries.
To get a file listing of an unreadable directory:
@@ -329,4 +329,4 @@ are generally safe).
=head1 SEE ALSO
login_cap(3), sudoers(5), visudo(8), su(1).
login_cap(3), sudoers(@mansectform@), visudo(@mansectsu@), su(1).

View File

@@ -61,7 +61,7 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
22/Mar/2000 1.6.3 1
26/Mar/2000 1.6.3 1
@@ -127,7 +127,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 2
26/Mar/2000 1.6.3 2
@@ -193,7 +193,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 3
26/Mar/2000 1.6.3 3
@@ -259,7 +259,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 4
26/Mar/2000 1.6.3 4
@@ -325,7 +325,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 5
26/Mar/2000 1.6.3 5
@@ -391,7 +391,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 6
26/Mar/2000 1.6.3 6
@@ -457,7 +457,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 7
26/Mar/2000 1.6.3 7
@@ -523,7 +523,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 8
26/Mar/2000 1.6.3 8
@@ -589,7 +589,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 9
26/Mar/2000 1.6.3 9
@@ -655,7 +655,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 10
26/Mar/2000 1.6.3 10
@@ -721,7 +721,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 11
26/Mar/2000 1.6.3 11
@@ -787,7 +787,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 12
26/Mar/2000 1.6.3 12
@@ -853,7 +853,7 @@ EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
22/Mar/2000 1.6.3 13
26/Mar/2000 1.6.3 13
@@ -919,7 +919,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 14
26/Mar/2000 1.6.3 14
@@ -985,7 +985,7 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 15
26/Mar/2000 1.6.3 15
@@ -1040,7 +1040,7 @@ FFFFIIIILLLLEEEESSSS
SSSSEEEEEEEE AAAALLLLSSSSOOOO
_s_u_d_o(8), _v_i_s_u_d_o(8), _s_u(1), _f_n_m_a_t_c_h(3).
_s_u_d_o(1m), _v_i_s_u_d_o(1m), _s_u(1), _f_n_m_a_t_c_h(3).
@@ -1051,7 +1051,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
22/Mar/2000 1.6.3 16
26/Mar/2000 1.6.3 16
@@ -1117,6 +1117,6 @@ sudoers(4) FILE FORMATS sudoers(4)
22/Mar/2000 1.6.3 17
26/Mar/2000 1.6.3 17

View File

@@ -2,8 +2,8 @@
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
''' Revision 1.4 2000/03/23 04:09:53 millert
''' Add support for wildcards in the hostname.
''' Revision 1.5 2000/03/27 03:26:23 millert
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
@@ -96,7 +96,7 @@
.nr % 0
.rr F
.\}
.TH sudoers @mansectform@ "1.6.3" "22/Mar/2000" "FILE FORMATS"
.TH sudoers @mansectform@ "1.6.3" "26/Mar/2000" "FILE FORMATS"
.UC
.if n .hy 0
.if n .na
@@ -977,7 +977,7 @@ as returned by the \f(CWhostname\fR command or use the \fIfqdn\fR option in
\& /etc/netgroup List of network groups
.Ve
.SH "SEE ALSO"
\fIsudo\fR\|(8), \fIvisudo\fR\|(8), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
\fIsudo\fR\|(@mansectsu@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
.rn }` ''
.IX Title "sudoers @mansectform@"

View File

@@ -927,4 +927,4 @@ I<sudoers>.
=head1 SEE ALSO
sudo(8), visudo(8), su(1), fnmatch(3).
sudo(@mansectsu@), visudo(@mansectsu@), su(1), fnmatch(3).

View File

@@ -12,7 +12,7 @@ SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
vvvviiiissssuuuuddddoooo edits the _s_u_d_o_e_r_s file in a safe fashion, analogous
to _v_i_p_w(8). vvvviiiissssuuuuddddoooo locks the _s_u_d_o_e_r_s file against
to _v_i_p_w(1m). vvvviiiissssuuuuddddoooo locks the _s_u_d_o_e_r_s file against
multiple simultaneous edits, provides basic sanity checks,
and checks for parse errors. If the _s_u_d_o_e_r_s file is
currently being edited you will receive a message to try
@@ -120,7 +120,7 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
shell if the editor used by vvvviiiissssuuuuddddoooo allows shell escapes.
SSSSEEEEEEEE AAAALLLLSSSSOOOO
_s_u_d_o(8), _v_i_p_w(8).
_s_u_d_o(1m), _v_i_p_w(1m).

View File

@@ -2,8 +2,8 @@
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
''' Revision 1.3 2000/03/27 03:07:35 millert
''' Typo: @sysconf@ -> @sysconfdir@
''' Revision 1.4 2000/03/27 03:26:24 millert
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
@@ -196,7 +196,7 @@ visudo \- edit the sudoers file
\fBvisudo\fR [ \fB\-s\fR ] [ \fB\-V\fR ]
.SH "DESCRIPTION"
\fBvisudo\fR edits the \fIsudoers\fR file in a safe fashion, analogous to
\fIvipw\fR\|(8). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
\fIvipw\fR\|(@mansectsu@). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
simultaneous edits, provides basic sanity checks, and checks
for parse errors. If the \fIsudoers\fR file is currently being
edited you will receive a message to try again later. In the
@@ -277,7 +277,7 @@ See the LICENSE file distributed with \fBsudo\fR for complete details.
There is no easy way to prevent a user from gaining a root shell if
the editor used by \fBvisudo\fR allows shell escapes.
.SH "SEE ALSO"
\fIsudo\fR\|(8), \fIvipw\fR\|(8).
\fIsudo\fR\|(@mansectsu@), \fIvipw\fR\|(@mansectsu@).
.rn }` ''
.IX Title "visudo @mansectsu@"

View File

@@ -46,7 +46,7 @@ B<visudo> [ B<-s> ] [ B<-V> ]
=head1 DESCRIPTION
B<visudo> edits the I<sudoers> file in a safe fashion, analogous to
vipw(8). B<visudo> locks the I<sudoers> file against multiple
vipw(@mansectsu@). B<visudo> locks the I<sudoers> file against multiple
simultaneous edits, provides basic sanity checks, and checks
for parse errors. If the I<sudoers> file is currently being
edited you will receive a message to try again later. In the
@@ -158,4 +158,4 @@ the editor used by B<visudo> allows shell escapes.
=head1 SEE ALSO
sudo(8), vipw(8).
sudo(@mansectsu@), vipw(@mansectsu@).