Fixed typos in new{g,u}idmap tools.
Fixed small typos in manual pages and code comments. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
This commit is contained in:
parent
a4dee3d1ad
commit
a84b0cafdd
@ -80,7 +80,7 @@
|
|||||||
<refsect1 id='description'>
|
<refsect1 id='description'>
|
||||||
<title>DESCRIPTION</title>
|
<title>DESCRIPTION</title>
|
||||||
<para>
|
<para>
|
||||||
The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on it's
|
The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on its
|
||||||
command line arguments and the gids allowed in <filename>/etc/subgid</filename>.
|
command line arguments and the gids allowed in <filename>/etc/subgid</filename>.
|
||||||
Note that the root user is not exempted from the requirement for a valid
|
Note that the root user is not exempted from the requirement for a valid
|
||||||
<filename>/etc/subgid</filename> entry.
|
<filename>/etc/subgid</filename> entry.
|
||||||
@ -101,7 +101,7 @@
|
|||||||
<term>lowergid</term>
|
<term>lowergid</term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>
|
<para>
|
||||||
Begining of the range of GIDs outside the user namespace.
|
Beginning of the range of GIDs outside the user namespace.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -145,7 +145,7 @@
|
|||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><filename>/etc/subgid</filename></term>
|
<term><filename>/etc/subgid</filename></term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>List of users subordinate group IDs.</para>
|
<para>List of user's subordinate group IDs.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
@ -80,7 +80,7 @@
|
|||||||
<refsect1 id='description'>
|
<refsect1 id='description'>
|
||||||
<title>DESCRIPTION</title>
|
<title>DESCRIPTION</title>
|
||||||
<para>
|
<para>
|
||||||
The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on it's
|
The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on its
|
||||||
command line arguments and the uids allowed in <filename>/etc/subuid</filename>.
|
command line arguments and the uids allowed in <filename>/etc/subuid</filename>.
|
||||||
Note that the root user is not exempted from the requirement for a valid
|
Note that the root user is not exempted from the requirement for a valid
|
||||||
<filename>/etc/subuid</filename> entry.
|
<filename>/etc/subuid</filename> entry.
|
||||||
@ -93,7 +93,7 @@
|
|||||||
<term>uid</term>
|
<term>uid</term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>
|
<para>
|
||||||
Begining of the range of UIDs inside the user namespace.
|
Beginning of the range of UIDs inside the user namespace.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -101,7 +101,7 @@
|
|||||||
<term>loweruid</term>
|
<term>loweruid</term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>
|
<para>
|
||||||
Begining of the range of UIDs outside the user namespace.
|
Beginning of the range of UIDs outside the user namespace.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -144,7 +144,7 @@
|
|||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><filename>/etc/subuid</filename></term>
|
<term><filename>/etc/subuid</filename></term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>List of users subordinate user IDs.</para>
|
<para>List of user's subordinate user IDs.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
|
|||||||
if (have_sub_gids(pw->pw_name, range->lower, range->count))
|
if (have_sub_gids(pw->pw_name, range->lower, range->count))
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
/* Allow a process to map it's own gid */
|
/* Allow a process to map its own gid */
|
||||||
if ((range->count == 1) && (pw->pw_gid == range->lower))
|
if ((range->count == 1) && (pw->pw_gid == range->lower))
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
@ -113,7 +113,7 @@ int main(int argc, char **argv)
|
|||||||
if (argc < 2)
|
if (argc < 2)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
/* Find the process that needs it's user namespace
|
/* Find the process that needs its user namespace
|
||||||
* gid mapping set.
|
* gid mapping set.
|
||||||
*/
|
*/
|
||||||
target_str = argv[1];
|
target_str = argv[1];
|
||||||
|
@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
|
|||||||
if (have_sub_uids(pw->pw_name, range->lower, range->count))
|
if (have_sub_uids(pw->pw_name, range->lower, range->count))
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
/* Allow a process to map it's own uid */
|
/* Allow a process to map its own uid */
|
||||||
if ((range->count == 1) && (pw->pw_uid == range->lower))
|
if ((range->count == 1) && (pw->pw_uid == range->lower))
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
@ -113,7 +113,7 @@ int main(int argc, char **argv)
|
|||||||
if (argc < 2)
|
if (argc < 2)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
/* Find the process that needs it's user namespace
|
/* Find the process that needs its user namespace
|
||||||
* uid mapping set.
|
* uid mapping set.
|
||||||
*/
|
*/
|
||||||
target_str = argv[1];
|
target_str = argv[1];
|
||||||
|
Loading…
Reference in New Issue
Block a user