Skip to content

Commit 9c98d0f

Browse files
committed
Regenerate man format manuals
1 parent b876e3b commit 9c98d0f

14 files changed

+27
-27
lines changed

docs/cvtsudoers.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1391,7 +1391,7 @@ sudo-workers mailing list,
13911391
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
13921392
or <[email protected]> (private).
13931393
.PP
1394-
Please not report security vulnerabilities through public GitHub
1394+
Please do not report security vulnerabilities through public GitHub
13951395
issues, Bugzilla or mailing lists.
13961396
Instead, report them via email to <[email protected]>.
13971397
You may encrypt your message with PGP if you would like, using

docs/sudo.conf.man.in

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ The following plugin-agnostic paths may be set in the
255255
file:
256256
.TP 6n
257257
askpass
258-
The fully qualified path to a helper program used to read the user's
258+
The fully-qualified path to a helper program used to read the user's
259259
password when no terminal is available.
260260
This may be the case when
261261
\fBsudo\fR
@@ -294,7 +294,7 @@ BSD,
294294
macOS and Solaris.
295295
.TP 6n
296296
intercept
297-
The path to a shared library containing a wrappers for the
297+
The path to a shared library containing wrappers for the
298298
execve(2),
299299
execl(3),
300300
execle(3),
@@ -372,7 +372,7 @@ The default value is
372372
.TP 6n
373373
plugin_dir
374374
The default directory to use when searching for plugins
375-
that are specified without a fully qualified path name.
375+
that are specified without a fully-qualified path name.
376376
The default value is
377377
\fI@plugindir@\fR.
378378
.if \n(SL \{\
@@ -803,11 +803,11 @@ front-end configuration
803803
# Sudo command interception:
804804
# Path intercept /path/to/sudo_intercept.so
805805
#
806-
# Path to a shared library containing replacements for the execv()
807-
# and execve() library functions that perform a policy check to verify
808-
# the command is allowed and simply return an error if not. This is
809-
# used to implement the "intercept" functionality on systems that
810-
# support LD_PRELOAD or its equivalent.
806+
# Path to a shared library containing replacements for the execv(),
807+
# execve() and fexecve() library functions, which perform a policy
808+
# check to verify whether the command is allowed and simply return
809+
# an error if it is not. This is used to implement the "intercept"
810+
# functionality on systems that support LD_PRELOAD or its equivalent.
811811
#
812812
# The compiled-in value is usually sufficient and should only be changed
813813
# if you rename or move the sudo_intercept.so file.
@@ -833,7 +833,7 @@ front-end configuration
833833
# Path plugin_dir /path/to/plugins
834834
#
835835
# The default directory to use when searching for plugins that are
836-
# specified without a fully qualified path name.
836+
# specified without a fully-qualified path name.
837837
#
838838
#Path plugin_dir @plugindir@
839839

@@ -921,7 +921,7 @@ sudo-workers mailing list,
921921
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
922922
or <[email protected]> (private).
923923
.PP
924-
Please not report security vulnerabilities through public GitHub
924+
Please do not report security vulnerabilities through public GitHub
925925
issues, Bugzilla or mailing lists.
926926
Instead, report them via email to <[email protected]>.
927927
You may encrypt your message with PGP if you would like, using

docs/sudo.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1783,7 +1783,7 @@ sudo-workers mailing list,
17831783
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
17841784
or <[email protected]> (private).
17851785
.PP
1786-
Please not report security vulnerabilities through public GitHub
1786+
Please do not report security vulnerabilities through public GitHub
17871787
issues, Bugzilla or mailing lists.
17881788
Instead, report them via email to <[email protected]>.
17891789
You may encrypt your message with PGP if you would like, using

docs/sudo_logsrv.proto.man.in

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@ was previously interrupted.
290290
It contains the following members:
291291
.TP 8n
292292
log_id
293-
The the server-side name for an I/O log that was previously
293+
The server-side name for an I/O log that was previously
294294
sent to the client by the server.
295295
This may be a path name on the server or some other kind of server-side
296296
identifier.
@@ -876,7 +876,7 @@ sudo(8),
876876
sudo_logsrvd(8)
877877
.PP
878878
\fIProtocol Buffers\fR,
879-
https://developers.google.com/protocol-buffers/.
879+
https://protobuf.dev/.
880880
.SH "AUTHORS"
881881
Many people have worked on
882882
\fBsudo\fR
@@ -902,7 +902,7 @@ sudo-workers mailing list,
902902
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
903903
or <[email protected]> (private).
904904
.PP
905-
Please not report security vulnerabilities through public GitHub
905+
Please do not report security vulnerabilities through public GitHub
906906
issues, Bugzilla or mailing lists.
907907
Instead, report them via email to <[email protected]>.
908908
You may encrypt your message with PGP if you would like, using

docs/sudo_logsrvd.conf.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1148,7 +1148,7 @@ sudo-workers mailing list,
11481148
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
11491149
or <[email protected]> (private).
11501150
.PP
1151-
Please not report security vulnerabilities through public GitHub
1151+
Please do not report security vulnerabilities through public GitHub
11521152
issues, Bugzilla or mailing lists.
11531153
Instead, report them via email to <[email protected]>.
11541154
You may encrypt your message with PGP if you would like, using

docs/sudo_logsrvd.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,7 @@ sudo-workers mailing list,
471471
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
472472
or <[email protected]> (private).
473473
.PP
474-
Please not report security vulnerabilities through public GitHub
474+
Please do not report security vulnerabilities through public GitHub
475475
issues, Bugzilla or mailing lists.
476476
Instead, report them via email to <[email protected]>.
477477
You may encrypt your message with PGP if you would like, using

docs/sudo_plugin.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5518,7 +5518,7 @@ sudo-workers mailing list,
55185518
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
55195519
or <[email protected]> (private).
55205520
.PP
5521-
Please not report security vulnerabilities through public GitHub
5521+
Please do not report security vulnerabilities through public GitHub
55225522
issues, Bugzilla or mailing lists.
55235523
Instead, report them via email to <[email protected]>.
55245524
You may encrypt your message with PGP if you would like, using

docs/sudo_plugin_python.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1880,7 +1880,7 @@ sudo-workers mailing list,
18801880
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
18811881
or <[email protected]> (private).
18821882
.PP
1883-
Please not report security vulnerabilities through public GitHub
1883+
Please do not report security vulnerabilities through public GitHub
18841884
issues, Bugzilla or mailing lists.
18851885
Instead, report them via email to <[email protected]>.
18861886
You may encrypt your message with PGP if you would like, using

docs/sudo_sendlog.man.in

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ sudo-workers mailing list,
196196
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
197197
or <[email protected]> (private).
198198
.PP
199-
Please not report security vulnerabilities through public GitHub
199+
Please do not report security vulnerabilities through public GitHub
200200
issues, Bugzilla or mailing lists.
201201
Instead, report them via email to <[email protected]>.
202202
You may encrypt your message with PGP if you would like, using

docs/sudoers.ldap.man.in

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ option (or as
170170
It may take command line arguments just as a normal command does.
171171
Unlike other commands,
172172
\(lqsudoedit\(rq
173-
is a built into
173+
is built into
174174
\fBsudo\fR
175175
itself and must be specified in without a leading path.
176176
.sp
@@ -420,7 +420,7 @@ The query will match
420420
\fInisNetgroupTriple\fR
421421
entries with either the short or long form of the host name or
422422
no host name specified in the tuple.
423-
If the NIS domain is set, the query will match only match entries
423+
If the NIS domain is set, the query will only match entries
424424
that include the domain or for which there is no domain present.
425425
If the NIS domain is
426426
\fInot\fR
@@ -1796,7 +1796,7 @@ sudo-workers mailing list,
17961796
https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
17971797
or <[email protected]> (private).
17981798
.PP
1799-
Please not report security vulnerabilities through public GitHub
1799+
Please do not report security vulnerabilities through public GitHub
18001800
issues, Bugzilla or mailing lists.
18011801
Instead, report them via email to <[email protected]>.
18021802
You may encrypt your message with PGP if you would like, using

0 commit comments

Comments
 (0)