1
0
mirror of https://github.com/rd235/cado synced 2024-12-26 14:03:07 +01:00

Fix spelling and grammar errors

This commit is contained in:
Mattia Biondi 2020-05-03 15:37:15 +02:00
parent 792020b65d
commit c3bc6f56dd
4 changed files with 5 additions and 5 deletions

View File

@ -15,7 +15,7 @@ cado \- Capability Ambient DO
]
.SH DESCRIPTION
Cado permits to delegate capabilities to users.
Cado allows the system administrator to delegate capabilities to users.
Cado is a capability based sudo. Sudo allows authorized users to run programs as root (or as another user),
cado allows authorized users to run programs with specific (ambient) capabilities.

View File

@ -14,7 +14,7 @@ cadrop \- Capability Ambient Drop
]
.SH DESCRIPTION
Cadrop permits to drop (ambient) capabilities.
Cadrop allows users to drop (ambient) capabilities.
Cadrop launches the command indicated as a parameter ($SHELL if omitted) dropping all the capabilities
listed in the capability_list.

View File

@ -20,8 +20,8 @@ scado \- Script Capability Ambient DO
.SH DESCRIPTION
\fBcado(1)\fR permits to delegate capabilities to users.
Users can grant a subset of these ambient capabilities to trusted programs.
\fBcado(1)\fR allows the system administrator to delegate capabilities to users.
Users can grant a subset of these ambient capabilities to trusted programs.
Each user can define their own list of trusted programs and which capabilities to grant, using a scado file.
\fBcado -S\fR or \fBcado --scado\fR run those trusted programs without any further authentication.
In this way it is also possible to run programs requiring specific capabilities within a bash script.

View File

@ -71,7 +71,7 @@ void usage(char *progname) {
fprintf(stderr," -f, --force do not display warnings, do what is allowed\n");
fprintf(stderr," -v, --verbose generate extra output\n");
fprintf(stderr," -S, --scado check scado pre-authorization for scripts\n");
fprintf(stderr," -s, --setcap set the minimun caps for %s (root access)\n",progname);
fprintf(stderr," -s, --setcap set the minimum caps for %s (root access)\n",progname);
exit(1);
}