Merge pull request #24 from stoeckmann/typos
Fixed typos in new{g,u}idmap tools.
			
			
This commit is contained in:
		@@ -80,7 +80,7 @@
 | 
			
		||||
  <refsect1 id='description'>
 | 
			
		||||
    <title>DESCRIPTION</title>
 | 
			
		||||
    <para>
 | 
			
		||||
      The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on it's
 | 
			
		||||
      The <command>newgidmap</command> sets <filename>/proc/[pid]/gid_map</filename> based on its
 | 
			
		||||
      command line arguments and the gids allowed in <filename>/etc/subgid</filename>.
 | 
			
		||||
      Note that the root user is not exempted from the requirement for a valid
 | 
			
		||||
      <filename>/etc/subgid</filename> entry.
 | 
			
		||||
@@ -101,7 +101,7 @@
 | 
			
		||||
	  <term>lowergid</term>
 | 
			
		||||
	  <listitem>
 | 
			
		||||
	    <para>
 | 
			
		||||
	      Begining of the range of GIDs outside the user namespace.
 | 
			
		||||
	      Beginning of the range of GIDs outside the user namespace.
 | 
			
		||||
	    </para>
 | 
			
		||||
	  </listitem>
 | 
			
		||||
	</varlistentry>
 | 
			
		||||
@@ -145,7 +145,7 @@
 | 
			
		||||
      <varlistentry>
 | 
			
		||||
	<term><filename>/etc/subgid</filename></term>
 | 
			
		||||
	<listitem>
 | 
			
		||||
	  <para>List of users subordinate group IDs.</para>
 | 
			
		||||
	  <para>List of user's subordinate group IDs.</para>
 | 
			
		||||
	</listitem>
 | 
			
		||||
      </varlistentry>
 | 
			
		||||
      <varlistentry>
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,7 @@
 | 
			
		||||
  <refsect1 id='description'>
 | 
			
		||||
    <title>DESCRIPTION</title>
 | 
			
		||||
    <para>
 | 
			
		||||
      The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on it's
 | 
			
		||||
      The <command>newuidmap</command> sets <filename>/proc/[pid]/uid_map</filename> based on its
 | 
			
		||||
      command line arguments and the uids allowed in <filename>/etc/subuid</filename>.
 | 
			
		||||
      Note that the root user is not exempted from the requirement for a valid
 | 
			
		||||
      <filename>/etc/subuid</filename> entry.
 | 
			
		||||
@@ -93,7 +93,7 @@
 | 
			
		||||
	  <term>uid</term>
 | 
			
		||||
	  <listitem>
 | 
			
		||||
	    <para>
 | 
			
		||||
	      Begining of the range of UIDs inside the user namespace.
 | 
			
		||||
	      Beginning of the range of UIDs inside the user namespace.
 | 
			
		||||
	    </para>
 | 
			
		||||
	  </listitem>
 | 
			
		||||
	</varlistentry>
 | 
			
		||||
@@ -101,7 +101,7 @@
 | 
			
		||||
	  <term>loweruid</term>
 | 
			
		||||
	  <listitem>
 | 
			
		||||
	    <para>
 | 
			
		||||
	      Begining of the range of UIDs outside the user namespace.
 | 
			
		||||
	      Beginning of the range of UIDs outside the user namespace.
 | 
			
		||||
	    </para>
 | 
			
		||||
	  </listitem>
 | 
			
		||||
	</varlistentry>
 | 
			
		||||
@@ -144,7 +144,7 @@
 | 
			
		||||
      <varlistentry>
 | 
			
		||||
	<term><filename>/etc/subuid</filename></term>
 | 
			
		||||
	<listitem>
 | 
			
		||||
	  <para>List of users subordinate user IDs.</para>
 | 
			
		||||
	  <para>List of user's subordinate user IDs.</para>
 | 
			
		||||
	</listitem>
 | 
			
		||||
      </varlistentry>
 | 
			
		||||
      <varlistentry>
 | 
			
		||||
 
 | 
			
		||||
@@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
 | 
			
		||||
	if (have_sub_gids(pw->pw_name, range->lower, range->count))
 | 
			
		||||
		return true;
 | 
			
		||||
 | 
			
		||||
	/* Allow a process to map it's own gid */
 | 
			
		||||
	/* Allow a process to map its own gid */
 | 
			
		||||
	if ((range->count == 1) && (pw->pw_gid == range->lower))
 | 
			
		||||
		return true;
 | 
			
		||||
 | 
			
		||||
@@ -113,7 +113,7 @@ int main(int argc, char **argv)
 | 
			
		||||
	if (argc < 2)
 | 
			
		||||
		usage();
 | 
			
		||||
 | 
			
		||||
	/* Find the process that needs it's user namespace
 | 
			
		||||
	/* Find the process that needs its user namespace
 | 
			
		||||
	 * gid mapping set.
 | 
			
		||||
	 */
 | 
			
		||||
	target_str = argv[1];
 | 
			
		||||
 
 | 
			
		||||
@@ -56,7 +56,7 @@ static bool verify_range(struct passwd *pw, struct map_range *range)
 | 
			
		||||
	if (have_sub_uids(pw->pw_name, range->lower, range->count))
 | 
			
		||||
		return true;
 | 
			
		||||
 | 
			
		||||
	/* Allow a process to map it's own uid */
 | 
			
		||||
	/* Allow a process to map its own uid */
 | 
			
		||||
	if ((range->count == 1) && (pw->pw_uid == range->lower))
 | 
			
		||||
		return true;
 | 
			
		||||
 | 
			
		||||
@@ -113,7 +113,7 @@ int main(int argc, char **argv)
 | 
			
		||||
	if (argc < 2)
 | 
			
		||||
		usage();
 | 
			
		||||
 | 
			
		||||
	/* Find the process that needs it's user namespace
 | 
			
		||||
	/* Find the process that needs its user namespace
 | 
			
		||||
	 * uid mapping set.
 | 
			
		||||
	 */
 | 
			
		||||
	target_str = argv[1];
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user