2222.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
2323.\"
2424.nr SL @SEMAN@
25+ .nr AA @AAMAN@
2526.nr BA @BAMAN@
2627.nr LC @LCMAN@
2728.nr PS @PSMAN@
@@ -1387,20 +1388,28 @@ Cmnd_Spec ::= Runas_Spec? Option_Spec* (Tag_Spec ':')* Cmnd
13871388Runas_Spec ::= '(' Runas_List? (':' Runas_List)? ')'
13881389
13891390.ie \n( SL \{\
1390- .ie \n( PS Option_Spec ::= (SELinux_Spec | Solaris_Priv_Spec | Date_Spec | Timeout_Spec)
1391- .el Option_Spec ::= (SELinux_Spec | Date_Spec | Timeout_Spec)
1391+ .ie \n( PS Option_Spec ::= (SELinux_Spec | Solaris_Priv_Spec | Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec )
1392+ .el Option_Spec ::= (SELinux_Spec | Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec )
13921393.\}
13931394.el \{\
1394- .ie \n( PS Option_Spec ::= (Solaris_Priv_Spec | Date_Spec | Timeout_Spec)
1395- .el Option_Spec ::= (Date_Spec | Timeout_Spec)
1395+ .ie \n( AA \{\
1396+ .ie \n( PS Option_Spec ::= (AppArmor_Spec | Solaris_Priv_Spec | Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec)
1397+ .el Option_Spec ::= (AppArmor_Spec | Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec)
1398+ .\}
1399+ .el \{\
1400+ .ie \n( PS Option_Spec ::= (Solaris_Priv_Spec | Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec)
1401+ .el Option_Spec ::= (Date_Spec | Timeout_Spec | Chdir_Spec | Chroot_Spec)
1402+ .\}
13961403.\}
13971404
13981405.if \n( SL \{\
13991406SELinux_Spec ::= ('ROLE=role' | 'TYPE=type')
14001407
14011408.\}
1409+ .if \n( AA \{\
14021410AppArmor_Spec ::= 'APPARMOR_PROFILE=profile'
14031411
1412+ .\}
14041413.if \n( PS \{\
14051414Solaris_Priv_Spec ::= ('PRIVS=privset' | 'LIMITPRIVS=privset')
14061415
@@ -1622,7 +1631,9 @@ Options may consist of
16221631.if \n( SL \{\
16231632SELinux roles and/or types,
16241633.\}
1634+ .if \n( AA \{\
16251635AppArmor profiles,
1636+ .\}
16261637.if \n( PS \{\
16271638Solaris privileges sets,
16281639.\}
@@ -1653,6 +1664,7 @@ A role or type specified on the command line,
16531664however, will supersede the values in
16541665\fI sudoers \fR .
16551666.\}
1667+ .if \n( AA \{\
16561668.SS "AppArmor_Spec"
16571669On systems supporting AppArmor,
16581670\fI sudoers \fR
@@ -1711,6 +1723,7 @@ and user
17111723to run
17121724\fI /bin/ls \fR
17131725without any confinement at all.
1726+ .\}
17141727.if \n( PS \{\
17151728.SS "Solaris_Priv_Spec"
17161729On Solaris systems,
@@ -4255,7 +4268,7 @@ will set the umask to be the union of the user's umask and what is specified in
42554268This flag is
42564269\fI @umask_override@ \fR
42574270by default.
4258- .if \n( BA \{\
4271+ .if \n( LC \{\
42594272.TP 18n
42604273use_loginclass
42614274If set,
@@ -4519,6 +4532,7 @@ The umask setting in PAM is not used for
45194532which does not create a new PAM session.
45204533.PP
45214534\fB Strings \fR :
4535+ .if \n( AA \{\
45224536.TP 18n
45234537apparmor_profile
45244538The default AppArmor profile to transition into when executing the
@@ -4532,6 +4546,7 @@ entries by specifying the
45324546option.
45334547This option is only available when sudo is built with AppArmor
45344548support.
4549+ .\}
45354550.TP 18n
45364551cmddenial_message
45374552.br
0 commit comments