Relevant BUGIDs:

Purpose of commit: cleanup

Commit summary:
---------------
2009-06-01  Ville Skyttä <ville.skytta@iki.fi>

        * modules/pam_limits/pam_limits.8.xml: Only *.conf
        files are parsed. Spelling fixes.
        * modules/pam_access/pam_access.8.xml: Spelling fixes.
        * modules/pam_cracklib/pam_cracklib.8.xml: Likewise.
        * modules/pam_echo/pam_echo.8.xml: Likewise.
        * modules/pam_env/pam_env.8.xml: Likewise.
        * modules/pam_exec/pam_exec.8.xml: Likewise.
        * modules/pam_filter/pam_filter.8.xml: Likewise.
        * modules/pam_ftp/pam_ftp.8.xml: Likewise.
        * modules/pam_group/pam_group.8.xml: Likewise.
        * modules/pam_issue/pam_issue.8.xml: Likewise.
        * modules/pam_lastlog/pam_lastlog.8.xml: Likewise.
        * modules/pam_listfile/pam_listfile.8.xml: Likewise.
        * modules/pam_localuser/pam_localuser.8.xml: Likewise.
        * modules/pam_loginuid/pam_loginuid.8.xml: Likewise.
        * modules/pam_mkhomedir/pam_mkhomedir.8.xml: Likewise.
        * modules/pam_motd/pam_motd.8.xml: Likewise.
        * modules/pam_namespace/pam_namespace.8.xml: Likewise.
        * modules/pam_pwhistory/pam_pwhistory.8.xml: Likewise.
        * modules/pam_selinux/pam_selinux.8.xml: Likewise.
        * modules/pam_succeed_if/pam_succeed_if.8.xml: Likewise.
        * modules/pam_tally/pam_tally.8.xml: Likewise.
        * modules/pam_tally2/pam_tally2.8.xml: Likewise.
        * modules/pam_time/pam_time.8.xml: Likewise.
        * modules/pam_timestamp/pam_timestamp.8.xml: Likewise.
        * modules/pam_timestamp/pam_timestamp_check.8.xml: Likewise.
        * modules/pam_tty_audit/pam_tty_audit.8.xml: Likewise.
        * modules/pam_umask/pam_umask.8.xml: Likewise.
        * modules/pam_unix/pam_unix.8.xml: Likewise.
        * modules/pam_xauth/pam_xauth.8.xml: Likewise.
This commit is contained in:
Tomas Mraz 2009-06-01 07:03:19 +00:00
parent 354c766d69
commit fbd40f8764
30 changed files with 85 additions and 52 deletions

View File

@ -1,3 +1,36 @@
2009-06-01 Ville Skyttä <ville.skytta@iki.fi>
* modules/pam_limits/pam_limits.8.xml: Only *.conf
files are parsed. Spelling fixes.
* modules/pam_access/pam_access.8.xml: Spelling fixes.
* modules/pam_cracklib/pam_cracklib.8.xml: Likewise.
* modules/pam_echo/pam_echo.8.xml: Likewise.
* modules/pam_env/pam_env.8.xml: Likewise.
* modules/pam_exec/pam_exec.8.xml: Likewise.
* modules/pam_filter/pam_filter.8.xml: Likewise.
* modules/pam_ftp/pam_ftp.8.xml: Likewise.
* modules/pam_group/pam_group.8.xml: Likewise.
* modules/pam_issue/pam_issue.8.xml: Likewise.
* modules/pam_lastlog/pam_lastlog.8.xml: Likewise.
* modules/pam_listfile/pam_listfile.8.xml: Likewise.
* modules/pam_localuser/pam_localuser.8.xml: Likewise.
* modules/pam_loginuid/pam_loginuid.8.xml: Likewise.
* modules/pam_mkhomedir/pam_mkhomedir.8.xml: Likewise.
* modules/pam_motd/pam_motd.8.xml: Likewise.
* modules/pam_namespace/pam_namespace.8.xml: Likewise.
* modules/pam_pwhistory/pam_pwhistory.8.xml: Likewise.
* modules/pam_selinux/pam_selinux.8.xml: Likewise.
* modules/pam_succeed_if/pam_succeed_if.8.xml: Likewise.
* modules/pam_tally/pam_tally.8.xml: Likewise.
* modules/pam_tally2/pam_tally2.8.xml: Likewise.
* modules/pam_time/pam_time.8.xml: Likewise.
* modules/pam_timestamp/pam_timestamp.8.xml: Likewise.
* modules/pam_timestamp/pam_timestamp_check.8.xml: Likewise.
* modules/pam_tty_audit/pam_tty_audit.8.xml: Likewise.
* modules/pam_umask/pam_umask.8.xml: Likewise.
* modules/pam_unix/pam_unix.8.xml: Likewise.
* modules/pam_xauth/pam_xauth.8.xml: Likewise.
2009-05-28 Jaswinder Singh <jsingh@redhat.com>
* po/pa.po: Updated translations.

View File

@ -86,7 +86,7 @@
</term>
<listitem>
<para>
A lot of debug informations are printed with
A lot of debug information is printed with
<citerefentry><refentrytitle>syslog</refentrytitle><manvolnum>3</manvolnum></citerefentry>.
</para>
</listitem>
@ -115,7 +115,7 @@
<emphasis remap='B'>fieldsep=|</emphasis> will cause the
default `:' character to be treated as part of a field value
and `|' becomes the field separator. Doing this may be
useful in conjuction with a system that wants to use
useful in conjunction with a system that wants to use
pam_access with X based applications, since the
<emphasis remap='B'>PAM_TTY</emphasis> item is likely to be
of the form "hostname:0" which includes a `:' character in

View File

@ -458,7 +458,7 @@
<term>PAM_SERVICE_ERR</term>
<listitem>
<para>
A internal error occured.
A internal error occurred.
</para>
</listitem>
</varlistentry>

View File

@ -141,7 +141,7 @@
<title>EXAMPLES</title>
<para>
For an example of the use of this module, we show how it may be
used to print informations about good passwords:
used to print information about good passwords:
<programlisting>
password optional pam_echo.so file=/usr/share/doc/good-password.txt
password required pam_unix.so

View File

@ -90,7 +90,7 @@
</term>
<listitem>
<para>
A lot of debug informations are printed with
A lot of debug information is printed with
<citerefentry><refentrytitle>syslog</refentrytitle><manvolnum>3</manvolnum></citerefentry>.
</para>
</listitem>
@ -130,7 +130,7 @@
<para>
Indicate an alternative <filename>.pam_environment</filename>
file to override the default. This can be useful when different
services need different environments. The filename is relativ to
services need different environments. The filename is relative to
the user home directory.
</para>
</listitem>

View File

@ -161,7 +161,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The external command runs successfull.
The external command was run successfully.
</para>
</listitem>
</varlistentry>
@ -179,7 +179,7 @@
<term>PAM_SYSTEM_ERR</term>
<listitem>
<para>
A system error occured or the command to execute failed.
A system error occurred or the command to execute failed.
</para>
</listitem>
</varlistentry>

View File

@ -205,7 +205,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The new filter was set successfull.
The new filter was set successfully.
</para>
</listitem>
</varlistentry>

View File

@ -121,7 +121,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The authentication was successfull.
The authentication was successful.
</para>
</listitem>
</varlistentry>

View File

@ -52,7 +52,7 @@
access to should be mounted <emphasis>nosuid</emphasis>.
</para>
<para>
The pam_group module fuctions in parallel with the
The pam_group module functions in parallel with the
<filename>/etc/group</filename> file. If the user is granted any groups
based on the behavior of this module, they are granted
<emphasis>in addition</emphasis> to those entries

View File

@ -180,7 +180,7 @@
<term>PAM_SERVICE_ERR</term>
<listitem>
<para>
A service module error occured.
A service module error occurred.
</para>
</listitem>
</varlistentry>
@ -189,7 +189,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The new prompt was set successfull.
The new prompt was set successfully.
</para>
</listitem>
</varlistentry>

View File

@ -84,7 +84,7 @@
<listitem>
<para>
Don't inform the user about any previous login,
just upate the <filename>/var/log/lastlog</filename> file.
just update the <filename>/var/log/lastlog</filename> file.
</para>
</listitem>
</varlistentry>
@ -184,7 +184,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
Everything was successfull.
Everything was successful.
</para>
</listitem>
</varlistentry>

View File

@ -50,11 +50,11 @@
</para>
<para>
By default limits are taken from the <filename>/etc/security/limits.conf</filename>
config file. Then individual files from the <filename>/etc/security/limits.d/</filename>
config file. Then individual *.conf files from the <filename>/etc/security/limits.d/</filename>
directory are read. The files are parsed one after another in the order of "C" locale.
The effect of the individual files is the same as if all the files were
concatenated together in the order of parsing.
If a config file is explicitely specified with a module option then the
If a config file is explicitly specified with a module option then the
files in the above directory are not parsed.
</para>
<para>
@ -175,7 +175,7 @@
</listitem>
</varlistentry>
<varlistentry>
<term>PAM_SESSEION_ERR</term>
<term>PAM_SESSION_ERR</term>
<listitem>
<para>
Error recovering account name.

View File

@ -129,7 +129,7 @@
<listitem>
<para>
File containing one item per line. The file needs to be a plain
file and not world writeable.
file and not world writable.
</para>
</listitem>
</varlistentry>

View File

@ -97,7 +97,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The new localuser was set successfull.
The new localuser was set successfully.
</para>
</listitem>
</varlistentry>

View File

@ -72,7 +72,7 @@
<term>PAM_SESSION_ERR</term>
<listitem>
<para>
An error occured during session management.
An error occurred during session management.
</para>
</listitem>
</varlistentry>

View File

@ -44,7 +44,7 @@
without using a distributed file system or pre-creating a large
number of directories. The skeleton directory (usually
<filename>/etc/skel/</filename>) is used to copy default files
and also set's a umask for the creation.
and also sets a umask for the creation.
</para>
<para>
The new users home directory will not be removed after logout

View File

@ -30,7 +30,7 @@
<para>
pam_motd is a PAM module that can be used to display
arbitrary motd (message of the day) files after a succesful
arbitrary motd (message of the day) files after a successful
login. By default the <filename>/etc/motd</filename> file is
shown. The message size is limited to 64KB.
</para>

View File

@ -65,7 +65,7 @@
using SELinux, user name, security context or both. If an executable
script <filename>/etc/security/namespace.init</filename> exists, it
is used to initialize the instance directory after it is set up
and mounted on the polyinstantiated direcory. The script receives the
and mounted on the polyinstantiated directory. The script receives the
polyinstantiated directory path, the instance directory path, flag
whether the instance directory was newly created (0 for no, 1 for yes),
and the user name as its arguments.
@ -197,7 +197,7 @@
<listitem>
<para>
For certain trusted programs such as newrole, open session
is called from a child process while the parent perfoms
is called from a child process while the parent performs
close session and pam end functions. For these commands
use this option to instruct pam_close_session to not
unmount the bind mounted polyinstantiated directory in the

View File

@ -50,8 +50,8 @@
alternating between the same password too frequently.
</para>
<para>
This module does not work togehter with kerberos. In general,
it does not make much sense to use this module in conjuction
This module does not work together with kerberos. In general,
it does not make much sense to use this module in conjunction
with NIS or LDAP, since the old passwords are stored on the
local machine and are not available on another machine for
password history checking.

View File

@ -162,7 +162,7 @@
<listitem>
<para>
Use the sensitivity level of the current process for the user context
instead of the default level. Also supresses asking of the
instead of the default level. Also suppresses asking of the
sensitivity level from the user or obtaining it from PAM environment.
</para>
</listitem>
@ -192,7 +192,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The security context was set successfull.
The security context was set successfully.
</para>
</listitem>
</varlistentry>

View File

@ -249,7 +249,7 @@
<term>PAM_SERVICE_ERR</term>
<listitem>
<para>
A service error occured or the arguments can't be
A service error occurred or the arguments can't be
parsed correctly.
</para>
</listitem>

View File

@ -129,7 +129,7 @@
<listitem>
<para>
If something weird happens (like unable to open the file),
return with <errorcode>PAM_SUCESS</errorcode> if
return with <errorcode>PAM_SUCCESS</errorcode> if
<option>onerr=<replaceable>succeed</replaceable></option>
is given, else with the corresponding PAM error code.
</para>
@ -237,7 +237,7 @@
<listitem>
<para>
If the module is invoked by a user with uid=0 the
counter is not incremented. The sys-admin should use this
counter is not incremented. The sysadmin should use this
for user launched services, like <command>su</command>,
otherwise this argument should be omitted.
</para>
@ -312,7 +312,7 @@
<para>
Account phase resets attempts counter if the user is
<emphasis remap='B'>not</emphasis> magic root.
This phase can be used optionaly for services which don't call
This phase can be used optionally for services which don't call
<citerefentry>
<refentrytitle>pam_setcred</refentrytitle><manvolnum>3</manvolnum>
</citerefentry> correctly or if the reset should be done regardless
@ -326,7 +326,7 @@
<listitem>
<para>
If the module is invoked by a user with uid=0 the
counter is not incremented. The sys-admin should use this
counter is not incremented. The sysadmin should use this
for user launched services, like <command>su</command>,
otherwise this argument should be omitted.
</para>
@ -364,7 +364,7 @@
<listitem>
<para>
A invalid option was given, the module was not able
to retrive the user name, no valid counter file
to retrieve the user name, no valid counter file
was found, or too many failed logins.
</para>
</listitem>
@ -373,7 +373,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
Everything was successfull.
Everything was successful.
</para>
</listitem>
</varlistentry>

View File

@ -122,7 +122,7 @@
<listitem>
<para>
If something weird happens (like unable to open the file),
return with <errorcode>PAM_SUCESS</errorcode> if
return with <errorcode>PAM_SUCCESS</errorcode> if
<option>onerr=<replaceable>succeed</replaceable></option>
is given, else with the corresponding PAM error code.
</para>
@ -230,7 +230,7 @@
<listitem>
<para>
If the module is invoked by a user with uid=0 the
counter is not incremented. The sys-admin should use this
counter is not incremented. The sysadmin should use this
for user launched services, like <command>su</command>,
otherwise this argument should be omitted.
</para>
@ -265,7 +265,7 @@
<para>
This option implies <option>even_deny_root</option> option.
Allow access after <replaceable>n</replaceable> seconds
to root acccount after failed attempt. If this option is used
to root account after failed attempt. If this option is used
the root user will be locked out for the specified amount of
time after he exceeded his maximum allowed attempts.
</para>
@ -301,7 +301,7 @@
<para>
Account phase resets attempts counter if the user is
<emphasis remap='B'>not</emphasis> magic root.
This phase can be used optionaly for services which don't call
This phase can be used optionally for services which don't call
<citerefentry>
<refentrytitle>pam_setcred</refentrytitle><manvolnum>3</manvolnum>
</citerefentry> correctly or if the reset should be done regardless
@ -315,7 +315,7 @@
<listitem>
<para>
If the module is invoked by a user with uid=0 the
counter is not changed. The sys-admin should use this
counter is not changed. The sysadmin should use this
for user launched services, like <command>su</command>,
otherwise this argument should be omitted.
</para>
@ -343,7 +343,7 @@
<listitem>
<para>
A invalid option was given, the module was not able
to retrive the user name, no valid counter file
to retrieve the user name, no valid counter file
was found, or too many failed logins.
</para>
</listitem>
@ -352,7 +352,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
Everything was successfull.
Everything was successful.
</para>
</listitem>
</varlistentry>

View File

@ -63,7 +63,7 @@
</term>
<listitem>
<para>
Some debug informations are printed with
Some debug information is printed with
<citerefentry><refentrytitle>syslog</refentrytitle><manvolnum>3</manvolnum></citerefentry>.
</para>
</listitem>

View File

@ -104,7 +104,7 @@ file as grounds for succeeding.
<term>PAM_AUTH_ERR</term>
<listitem>
<para>
The module was not able to retrive the user name or
The module was not able to retrieve the user name or
no valid timestamp file was found.
</para>
</listitem>
@ -113,7 +113,7 @@ file as grounds for succeeding.
<term>PAM_SUCCESS</term>
<listitem>
<para>
Everything was successfull.
Everything was successful.
</para>
</listitem>
</varlistentry>

View File

@ -77,7 +77,7 @@ see if the default timestamp is valid, or optionally remove it.
timestamps generated by <emphasis>pam_timestamp</emphasis> when
the user authenticates as herself. When the user authenticates as a
different user, the name of the timestamp file changes to
accomodate this. <replaceable>target_user</replaceable> allows
accommodate this. <replaceable>target_user</replaceable> allows
to specify this user name.
</para>
</listitem>

View File

@ -47,7 +47,7 @@
For each user matching one of comma-separated glob
<option><replaceable>patterns</replaceable></option>, disable
TTY auditing. This overrides any previous <option>enable</option>
option matchin the same user name on the command line.
option matching the same user name on the command line.
</para>
</listitem>
</varlistentry>

View File

@ -157,7 +157,7 @@
<term>PAM_SUCCESS</term>
<listitem>
<para>
The new umask was set successfull.
The new umask was set successfully.
</para>
</listitem>
</varlistentry>

View File

@ -321,7 +321,7 @@
</term>
<listitem>
<para>
Ignore errors reading shadow inforation for
Ignore errors reading shadow information for
users in the account management module.
</para>
</listitem>

View File

@ -43,7 +43,7 @@
Without pam_xauth, when xauth is enabled and a user uses the
<citerefentry>
<refentrytitle>su</refentrytitle><manvolnum>1</manvolnum>
</citerefentry> command to assume another user's priviledges,
</citerefentry> command to assume another user's privileges,
that user is no longer able to access the original user's X display
because the new user does not have the key needed to access the
display. pam_xauth solves the problem by forwarding the key from
@ -55,7 +55,7 @@
This means, for example, that when you run
<citerefentry>
<refentrytitle>su</refentrytitle><manvolnum>1</manvolnum>
</citerefentry> from an xterm sesssion, you will be able to run
</citerefentry> from an xterm session, you will be able to run
X programs without explicitly dealing with the
<citerefentry>
<refentrytitle>xauth</refentrytitle><manvolnum>1</manvolnum>