Document that sudo uses the real uid to map from uid to passwd file

user name.
This commit is contained in:
Todd C. Miller
2015-08-09 16:22:16 -06:00
parent b2f1bbfb02
commit ad9a51bd9d
5 changed files with 15 additions and 5 deletions

View File

@@ -16,7 +16,9 @@ SSYYNNOOPPSSIISS
DDEESSCCRRIIPPTTIIOONN
ssuuddoo allows a permitted user to execute a _c_o_m_m_a_n_d as the superuser or
another user, as specified by the security policy.
another user, as specified by the security policy. The invoking user's
real (_n_o_t effective) user ID is used to determine the user name with
which to query the security policy.
ssuuddoo supports a plugin architecture for security policies and
input/output logging. Third parties can develop and distribute their own
@@ -606,4 +608,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or http://www.sudo.ws/license.html for
complete details.
Sudo 1.8.15 August 7, 2015 Sudo 1.8.15
Sudo 1.8.15 August 9, 2015 Sudo 1.8.15

View File

@@ -410,4 +410,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or http://www.sudo.ws/license.html for
complete details.
Sudo 1.8.15 December 4, 2014 Sudo 1.8.15
Sudo 1.8.15 August 9, 2015 Sudo 1.8.15

View File

@@ -16,7 +16,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.TH "SUDO" "5" "December 4, 2014" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.TH "SUDO" "5" "August 9, 2015" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"

View File

@@ -21,7 +21,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.TH "SUDO" "8" "August 7, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.TH "SUDO" "8" "August 9, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
@@ -89,6 +89,10 @@ allows a permitted user to execute a
\fIcommand\fR
as the superuser or another user, as specified by the security
policy.
The invoking user's real
(\fInot\fR
effective) user ID is used to determine the user name with which
to query the security policy.
.PP
\fBsudo\fR
supports a plugin architecture for security policies and input/output

View File

@@ -77,6 +77,10 @@ allows a permitted user to execute a
.Ar command
as the superuser or another user, as specified by the security
policy.
The invoking user's real
.No ( Em not
effective) user ID is used to determine the user name with which
to query the security policy.
.Pp
.Nm
supports a plugin architecture for security policies and input/output