Skip to content

Commit 9d49f86

Browse files
committed
Run igor on other docs too, not just man pages
1 parent 5180dd8 commit 9d49f86

File tree

6 files changed

+41
-39
lines changed

6 files changed

+41
-39
lines changed

NEWS

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ What's new in Sudo 1.9.14
263263
The sudoers plugin will now change the root directory id needed
264264
before performing command matching. Previously, the root directory
265265
was simply prepended to the path that was being processed.
266-
266+
267267
* When NETGROUP_BASE is set in the ldap.conf file, sudo will now
268268
perform its own netgroup lookups of the host name instead of
269269
using the system innetgr(3) function. This guarantees that user
@@ -273,7 +273,7 @@ What's new in Sudo 1.9.14
273273
* Fixed a bug introduced in sudo 1.9.13 that resulted in a missing
274274
" ; " separator between environment variables and the command
275275
in log entries.
276-
276+
277277
* The visudo utility now displays a warning when it ignores a file
278278
in an include dir such as /etc/sudoers.d.
279279

@@ -442,7 +442,7 @@ What's new in Sudo 1.9.13
442442
* Sudo no longer checks the ownership and mode of the plugins that
443443
it loads. Plugins are configured via either the sudo.conf or
444444
sudoers file which are trusted configuration files. These checks
445-
suffered from time-of-check vs. time-of-use race conditions and
445+
suffered from time-of-check versus time-of-use race conditions and
446446
complicate loading plugins that are not simple paths. Ownership
447447
and mode checks are still performed when loading the sudo.conf
448448
and sudoers files, which do not suffer from race conditions.
@@ -531,7 +531,7 @@ What's new in Sudo 1.9.12
531531
security policy. The new "intercept_verify" sudoers setting can
532532
be used to control this behavior.
533533

534-
* Fixed running commands with a relative path (e.g. ./foo) in
534+
* Fixed running commands with a relative path (e.g., ./foo) in
535535
intercept mode. Previously, this would fail if sudo's current
536536
working directory was different from that of the command.
537537

@@ -831,7 +831,7 @@ What's new in Sudo 1.9.9
831831

832832
* visudo now only warns about an undefined alias or a cycle in an
833833
alias once for each alias.
834-
834+
835835
* The sudoRole cn was truncated by a single character in warning messages.
836836
GitHub issue #115.
837837

@@ -997,7 +997,7 @@ What's new in Sudo 1.9.8
997997
* The new "log_exit_status" sudoers setting can be used to log
998998
the exit status commands run via sudo. This is also a corresponding
999999
"log_exit" setting in the sudo_logsrvd.conf eventlog stanza.
1000-
1000+
10011001
* Support for logging sudo_logsrvd errors via syslog or to a file.
10021002
Previously, most sudo_logsrvd errors were only visible in the
10031003
debug log.
@@ -1089,7 +1089,7 @@ What's new in Sudo 1.9.7
10891089
* The "fuzz" Makefile target now runs all the fuzzers for 8192
10901090
passes (can be overridden via the FUZZ_RUNS variable). This makes
10911091
it easier to run the fuzzers in-tree. To run a fuzzer indefinitely,
1092-
set FUZZ_RUNS=-1, e.g. "make FUZZ_RUNS=-1 fuzz".
1092+
set FUZZ_RUNS=-1, e.g., "make FUZZ_RUNS=-1 fuzz".
10931093

10941094
* Fixed fuzzing on FreeBSD where the ld.lld linker returns an
10951095
error by default when a symbol is multiply-defined.
@@ -1766,7 +1766,7 @@ What's new in Sudo 1.8.30
17661766
* Sudo now treats an attempt to run "sudo sudoedit" as simply
17671767
"sudoedit". If the sudoers file contains a fully-qualified path
17681768
to sudoedit, sudo will now treat it simply as "sudoedit" (with
1769-
no path). Visudo will will now treat a fully-qualified path
1769+
no path). Visudo will now treat a fully-qualified path
17701770
to sudoedit as an error. Bug #871.
17711771

17721772
* Fixed a bug introduced in sudo 1.8.28 where sudo would warn about
@@ -2826,7 +2826,7 @@ What's new in Sudo 1.8.15
28262826
* When the command sudo is running dies due to a signal, sudo will
28272827
now send itself that same signal with the default signal handler
28282828
installed instead of exiting. The bash shell appears to ignore
2829-
some signals, e.g. SIGINT, unless the command being run is killed
2829+
some signals, e.g., SIGINT, unless the command being run is killed
28302830
by that signal. This makes the behavior of commands run under
28312831
sudo the same as without sudo when bash is the shell. Bug #722
28322832

@@ -3758,15 +3758,15 @@ What's new in Sudo 1.8.5?
37583758

37593759
* On systems with an SVR4-style /proc file system, the /proc/pid/psinfo
37603760
file is now uses to determine the controlling terminal, if possible.
3761-
This allows tty-based tickets to work properly even when, e.g.
3761+
This allows tty-based tickets to work properly even when, e.g.,
37623762
standard input, output and error are redirected to /dev/null.
37633763

37643764
* The output of "sudoreplay -l" is now sorted by file name (or
37653765
sequence number). Previously, entries were displayed in the
37663766
order in which they were found on the file system.
37673767

37683768
* Sudo now behaves properly when I/O logging is enabled and the
3769-
controlling terminal is revoked (e.g. the running sshd is killed).
3769+
controlling terminal is revoked (e.g., the running sshd is killed).
37703770
Previously, sudo may have exited without calling the I/O plugin's
37713771
close function which can lead to an incomplete I/O log.
37723772

@@ -3877,19 +3877,19 @@ What's new in Sudo 1.8.4?
38773877
* The deprecated "noexec_file" sudoers option is no longer supported.
38783878

38793879
* Fixed a race condition when I/O logging is not enabled that could
3880-
result in tty-generated signals (e.g. control-C) being received
3880+
result in tty-generated signals (e.g., control-C) being received
38813881
by the command twice.
38823882

38833883
* If none of the standard input, output or error are connected to
38843884
a tty device, sudo will now check its parent's standard input,
38853885
output or error for the tty name on systems with /proc and BSD
38863886
systems that support the KERN_PROC_PID sysctl. This allows
3887-
tty-based tickets to work properly even when, e.g. standard
3887+
tty-based tickets to work properly even when, e.g., standard
38883888
input, output and error are redirected to /dev/null.
38893889

38903890
* Added the --enable-kerb5-instance configure option to allow
38913891
people using Kerberos V authentication to specify a custom
3892-
instance so the principal name can be, e.g. "username/sudo"
3892+
instance so the principal name can be, e.g., "username/sudo"
38933893
similar to how ksu uses "username/root".
38943894

38953895
* Fixed a bug where a pattern like "/usr/*" included /usr/bin/ in
@@ -4076,7 +4076,7 @@ What's new in Sudo 1.8.1?
40764076
fixed.
40774077

40784078
* Sudo will now create an entry in the utmp (or utmpx) file when
4079-
allocating a pseudo-tty (e.g. when logging I/O). The "set_utmp"
4079+
allocating a pseudo-tty (e.g., when logging I/O). The "set_utmp"
40804080
and "utmp_runas" sudoers file options can be used to control this.
40814081
Other policy plugins may use the "set_utmp" and "utmp_user"
40824082
entries in the command_info list.
@@ -4377,7 +4377,7 @@ What's new in Sudo 1.7.3?
43774377
now taken into account when looking up users and groups. Sudo
43784378
now applies the correct the user and group ids when running a
43794379
command as a user whose account details come from a different
4380-
source (e.g. LDAP or DCE vs. local files).
4380+
source (e.g., LDAP or DCE versus local files).
43814381

43824382
* Support for multiple 'sudoers_base' and 'uri' entries in ldap.conf.
43834383
When multiple entries are listed, sudo will try each one in the

README.LDAP.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ can store sudoers content.
6060
For OpenLDAP, there are two options, depending on how slapd is configured.
6161

6262
The first option is to copy the file schema.OpenLDAP to the schema
63-
directory (e.g. /etc/openldap/schema). You must then edit your
63+
directory (e.g., /etc/openldap/schema). You must then edit your
6464
slapd.conf and add an include line the new schema, for example:
6565

6666
# Sudo LDAP schema

docs/Makefile.in

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -102,18 +102,20 @@ PACKAGE_TARNAME = @PACKAGE_TARNAME@
102102

103103
all: $(DEVDOCS) $(DOCS)
104104

105-
igor: all
106-
@if [ "$(mantype)" != "mdoc" ]; then \
107-
echo "make igor only supported for mdoc manuals" 1>&2; \
108-
exit 1; \
109-
else \
110-
rval=0; \
111-
for m in $(DOCS); do \
112-
echo $(IGOR) -D $$m; \
113-
$(IGOR) -D $$m || rval=`expr $$rval + $$?`; \
114-
done; \
115-
exit $$rval; \
116-
fi
105+
igor:
106+
@rval=0; \
107+
for f in *.mdoc.in; do \
108+
echo $(IGOR) -D $$f; \
109+
$(IGOR) -D $$f || rval=`expr $$rval + $$?`; \
110+
done; \
111+
for f in $(OTHER_DOCS) $(OTHER_DOCS_LDAP); do \
112+
case `basename $$f` in \
113+
[A-Z][A-Z]*) \
114+
echo $(IGOR) -abrw $$f; \
115+
$(IGOR) -abrw $$f || rval=`expr $$rval + $$?`;; \
116+
esac; \
117+
done; \
118+
exit $$rval
117119

118120
lint: all
119121
@if [ "$(mantype)" != "mdoc" ]; then \

docs/SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ We try to respond to security issues in a timely manner but understand that Sudo
1313

1414
Include as much of the following information as possible to help us better understand the nature and scope of the potential issue:
1515

16-
* Type of issue (e.g. buffer overflow, privilege escalation, etc.)
16+
* Type of issue (e.g., buffer overflow, privilege escalation, etc.)
1717
* Full paths of source file(s) related to the issue
1818
* The location of the affected source code (tag/branch/commit or direct URL)
1919
* Any special configuration required to reproduce the issue

docs/TROUBLESHOOTING.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -95,10 +95,10 @@ It just says "Sorry, try again." three times and exits.
9595
> Don't forget to send a SIGHUP to your syslogd so that it re-reads
9696
> its conf file. Also, remember that syslogd does *not* create
9797
> log files, you need to create the file before syslogd will log
98-
> to it (e.g.: touch /var/log/sudo).
98+
> to it (e.g., `touch /var/log/sudo`).
9999
100-
> The facility (e.g. 'auth.debug') must be separated from
101-
> the destination (e.g. '/var/log/auth' or '@loghost') by tabs,
100+
> The facility (e.g., 'auth.debug') must be separated from
101+
> the destination (e.g., '/var/log/auth' or '@loghost') by tabs,
102102
> *not* spaces. This is a common error.
103103
104104
#### Sudo won't accept my password, even when entered correctly
@@ -137,9 +137,9 @@ It just says "Sorry, try again." three times and exits.
137137
> site you may be interested in sudo's LDAP sudoers support, see
138138
> [README.LDAP.md](../README.LDAP.md) and the sudoers.ldap manual.
139139
140-
#### I don't run sendmail, does this mean that I cannot use sudo?
140+
#### I don't run sendmail, can I still use sudo?
141141

142-
> No, you just need to disable mailing with a line like:
142+
> Yes, you just need to disable mailing with a line like:
143143
144144
Defaults !mailerpath
145145

docs/UPGRADE.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -294,8 +294,8 @@ Notes on upgrading from an older release
294294
important that the time stamp files not persist when the system
295295
reboots. For this reason, the default location for the time
296296
stamp files has changed back to a directory located in `/var/run`.
297-
Systems that do not have `/var/run` (e.g. AIX) or that do not clear
298-
it on boot (e.g. HP-UX) will need to clear the time stamp
297+
Systems that do not have `/var/run` (e.g., AIX) or that do not clear
298+
it on boot (e.g., HP-UX) will need to clear the time stamp
299299
directory via a start up script. Such a script is installed by
300300
default on AIX and HP-UX systems.
301301

@@ -504,7 +504,7 @@ Notes on upgrading from an older release
504504
When sudo is build with LDAP support the `/etc/nsswitch.conf` file is
505505
now used to determine the sudoers sea ch order. sudo will default to
506506
only using `/etc/sudoers` unless `/etc/nsswitch.conf` says otherwise.
507-
This can be changed with an nsswitch.conf line, e.g.:
507+
This can be changed with an nsswitch.conf line, for example:
508508

509509
sudoers: ldap files
510510

@@ -548,7 +548,7 @@ Notes on upgrading from an older release
548548
Prior to sudo 1.6.9, the TERM and PATH environment variables
549549
would always be preserved even if the env_keep option was
550550
redefined. That is no longer the case. Consequently, if
551-
env_keep is set with "=" and not simply appended to (i.e. using
551+
env_keep is set with "=" and not simply appended to (i.e., using
552552
"+="), PATH and TERM must be explicitly included in the list
553553
of environment variables to keep. The LOGNAME, SHELL, USER,
554554
and USERNAME environment variables are still always set.

0 commit comments

Comments
 (0)