mdoc(7) police: fix markup and some spelling.

This commit is contained in:
Ruslan Ermilov 2001-03-23 08:14:27 +00:00
parent 468255abf1
commit 03035079c0
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=74676
2 changed files with 99 additions and 66 deletions

View File

@ -30,20 +30,20 @@
.Os
.Sh NAME
.Nm getfacl
.Nd Get ACL Information
.Nd get ACL Information
.Sh SYNOPSIS
.Nm getfacl
.Nm
.Op Fl d
.Op Ar file ...
.Op Ar
.Sh DESCRIPTION
The
.Nm
utility writes discretionary access control information associated with
the specified file(s) to standard output.
If the
.Xr getconf 8
.Xr getconf 1
utility indicates that
.Va {_POSIX_ACL_EXTENDED}
.Eq { } Va _POSIX_ACL_EXTENDED
is not in effect for a
.Ar file
then the standard discretionary access permissions are interpreted as
@ -54,8 +54,8 @@ The following option is available:
.It Fl d
The operation applies to the default ACL of a directory instead of the
access ACL.
An error shall be generated if a default ACL cannot be associated with
.Op Ar file .
An error is generated if a default ACL cannot be associated with
.Ar file .
.El
.Pp
The following operand is available:
@ -63,24 +63,27 @@ The following operand is available:
.It Ar file
A pathname of a file whose ACL shall be retrieved.
If
.Op Ar file
.Ar file
is not specified, or a
.Op Ar file
is specified as "-", then
.Ar file
is specified as
.Fl ,
then
.Nm
shall read a list of pathnames, each terminated by one <newline> character,
reads a list of pathnames, each terminated by one newline character,
from the standard input.
.El
.Pp
.Sh EXAMPLES
.Pp
.Dl getfacl /
.Pp
Retrieve ACL for the directory "/".
Retrieve ACL for the directory
.Pa / .
.Pp
.Dl getfacl -d /
.Pp
Retrieve the default ACL for the directory "/", if any.
Retrieve the default ACL for the directory
.Pa / ,
if any.
.Sh SEE ALSO
.Xr setfacl 1 ,
.Xr acl 3 ,
@ -91,10 +94,14 @@ Retrieve the default ACL for the directory "/", if any.
.Sh STANDARDS
The
.Nm
utility is expected to be IEEE Std 1003.2c compliant.
utility is expected to be
.Tn IEEE
Std 1003.2c compliant.
.Sh HISTORY
Extended Attribute and Access Control List support was developed as part
of the TrustedBSD Project and introduced in
.Fx 5.0
of the
.Tn TrustedBSD
Project and introduced in
.Fx 5.0 .
.Sh AUTHORS
Robert N M Watson
.An Robert N M Watson

View File

@ -30,15 +30,15 @@
.Os
.Sh NAME
.Nm setfacl
.Nd Set ACL Information
.Nd set ACL Information
.Sh SYNOPSIS
.Nm setfacl
.Nm
.Op Fl bdkn
.Op Fl m Ar entries
.Op Fl M Ar file1
.Op Fl x Ar entries
.Op Fl X Ar file1
.Op Ar file ...
.Op Ar
.Sh DESCRIPTION
The
.Nm
@ -57,7 +57,7 @@ default ACL's.
Delete any default ACL entries on the specified files. It
is not considered an error if the specified files do not have
any default ACL entries. An error will be reported if any of
the specified files cannot have a default entry (i.e.
the specified files cannot have a default entry (i.e.\&
non-directories).
.It Fl m Ar entries
Modify the ACL entries on the specified files by adding new
@ -71,7 +71,9 @@ entries specified in the file
.Ar file .
If
.Ar file
is "-", the input is taken from stdin.
is
.Fl ,
the input is taken from stdin.
.It Fl n
Do not recalculate the permissions associated with the ACL
mask entry.
@ -88,70 +90,89 @@ from the access or default ACL of the specified files.
The above options are evaluated in the order specified
on the command-line.
.Pp
Multiple ACL entries specified on the command line shall be
Multiple ACL entries specified on the command line are
separated by commas.
.Sh ACL ENTRIES
An ACL entry shall contain three colon-separated fields:
An ACL entry contains three colon-separated fields:
an ACL tag, an ACL qualifier, and discretionary access
permissions:
.Pp
.Bl -tag -width indent
.It Ar ACL tag
The ACL tag specifies the ACL entry type and shall consist of
one of the following: ``user'' or ``u'' specifying the access
granted to the owner of the file or a specified user; ``group''
or ``g'' specifying the access granted to the file owning group
or a specified group; ``other'' or ``o'' specifying the access
.It Ar "ACL tag"
The ACL tag specifies the ACL entry type and consists of
one of the following:
.Dq Li user
or
.Ql u
specifying the access
granted to the owner of the file or a specified user;
.Dq Li group
or
.Ql g
specifying the access granted to the file owning group
or a specified group;
.Dq Li other
or
.Ql o
specifying the access
granted to any process that does not match any user or group
ACL entry; ``mask'' or ``m'' specifying the maximum access
ACL entry;
.Dq Li mask
or
.Ql m
specifying the maximum access
granted to any ACL entry except the
.Ar user
.Dq Li user
ACL entry for the file owner and the
.Ar other
.Dq Li other
ACL entry.
.Pp
.It Ar ACL qualifier
.It Ar "ACL qualifier"
The ACL qualifier field describes the user or group associated with
the ACL entry. It may consist of one of the following: uid or
user name, gid or group name, or empty. For
.Ar user
ACL entries, an empty field shall specify access granted to the
.Dq Li user
ACL entries, an empty field specifies access granted to the
file owner. For
.Ar group
ACL entries, an empty field shall specify access granted to the
.Dq Li group
ACL entries, an empty field specifies access granted to the
file owning group.
.Ar mask
.Dq Li mask
and
.Ar other
.Dq Li other
ACL entries do not use this field.
.Pp
.It Ar access permissions
The access permissions field shall contain up to one of each of
the following: ``r'', ``w'', and ``x'' to set read, write, and
.It Ar "access permissions"
The access permissions field contains up to one of each of
the following:
.Ql r ,
.Ql w ,
and
.Ql x
to set read, write, and
execute permissions, respectively. Each of these may be excluded
or replaced with a ``-'' character to indicate no access.
or replaced with a
.Ql -
character to indicate no access.
.El
.Pp
A
.Ar mask
.Dq Li mask
ACL entry is required on a file with any ACL entries other than
the default
.Ar user ,
.Ar group ,
.Dq Li user ,
.Dq Li group ,
and
.Ar other
.Dq Li other
ACL entries. If the
.Fl n
option is not specified and no
.Ar mask
.Dq Li mask
ACL entry was specified, the
.Nm
utility
will apply a
.Ar mask
.Dq Li mask
ACL entry consisting of the union of the permissions associated
with all
.Ar group
.Dq Li group
ACL entries in the resulting ACL.
.Pp
ACL entries applied from a file using the
@ -159,21 +180,22 @@ ACL entries applied from a file using the
or
.Fl X
options shall be of the following form: one ACL entry per line, as
previously specified; whitespace is ignored; any text after a # is
ignored (comments).
previously specified; whitespace is ignored; any text after a
.Ql #
is ignored (comments).
.Pp
When ACL entries are evaluated, the access check algorithm checks
the ACL entries in the following order: file owner,
.Ar user
.Dq Li user
ACL entries, file owning group,
.Ar group
.Dq Li group
ACL entries, and
.Ar other
.Dq Li other
ACL entry.
.Sh RETURN VALUES
.Sh DIAGNOSTICS
The
.Nm
utility returns 0 on success and > 0 if an error occurs.
utility returns 0 on success and >0 if an error occurs.
.Sh EXAMPLES
.Dl setfacl -m u::rwx,g:mail:rw file
.Pp
@ -213,14 +235,18 @@ to
.Xr getextattr 8 ,
.Xr setextattr 8 ,
.Xr acl 9 ,
.Xr extattr 9 .
.Xr extattr 9
.Sh STANDARDS
The
.Nm
utility is expected to be IEEE Std 1003.2c compliant.
utility is expected to be
.Tn IEEE
Std 1003.2c compliant.
.Sh HISTORY
Extended Attribute and Access Control List support was developed
as part of the TrustedBSD Project and introduced in
as part of the
.Tn TrustedBSD
Project and introduced in
.Fx 5.0 .
.Sh AUTHORS
The