diff options
author | Aura Herrero Ruiz <aura.herreroruiz@outlook.es> | 2024-01-19 16:41:32 +0100 |
---|---|---|
committer | Dmitry V. Levin <ldv@strace.io> | 2024-04-02 14:00:00 +0000 |
commit | 88eccaedc65b00a6c6c85ae2e667e427de22c3de (patch) | |
tree | 416565b27c880e30458d355504086f4494260ad1 /modules | |
parent | ce8aa213b03cc12f10d20d82dbf4aa355123e5c5 (diff) | |
download | pam-88eccaedc65b00a6c6c85ae2e667e427de22c3de.tar.gz pam-88eccaedc65b00a6c6c85ae2e667e427de22c3de.tar.bz2 pam-88eccaedc65b00a6c6c85ae2e667e427de22c3de.zip |
doc: fix uses of non-neutral gender pronouns
Diffstat (limited to 'modules')
-rw-r--r-- | modules/pam_env/pam_env.conf.5.xml | 2 | ||||
-rw-r--r-- | modules/pam_lastlog/pam_lastlog.8.xml | 4 | ||||
-rw-r--r-- | modules/pam_lastlog/pam_lastlog.c | 2 | ||||
-rw-r--r-- | modules/pam_limits/limits.conf.5.xml | 4 | ||||
-rw-r--r-- | modules/pam_sepermit/pam_sepermit.8.xml | 8 | ||||
-rw-r--r-- | modules/pam_timestamp/pam_timestamp_check.8.xml | 4 |
6 files changed, 12 insertions, 12 deletions
diff --git a/modules/pam_env/pam_env.conf.5.xml b/modules/pam_env/pam_env.conf.5.xml index 81fc9613..46df480f 100644 --- a/modules/pam_env/pam_env.conf.5.xml +++ b/modules/pam_env/pam_env.conf.5.xml @@ -58,7 +58,7 @@ For example, ${HOME} is used below several times, but many PAM applications don't make it available by the time you need it. The special variables @{HOME} and @{SHELL} are expanded to the values - for the user from his <emphasis>passwd</emphasis> entry. + for the user from the corresponding <emphasis>passwd</emphasis> entry. </para> <para> diff --git a/modules/pam_lastlog/pam_lastlog.8.xml b/modules/pam_lastlog/pam_lastlog.8.xml index 1fd9d9dd..d9909787 100644 --- a/modules/pam_lastlog/pam_lastlog.8.xml +++ b/modules/pam_lastlog/pam_lastlog.8.xml @@ -289,7 +289,7 @@ session required pam_lastlog.so nowtmp </programlisting> <para> - To reject the user if he did not login during the previous 50 days + To reject users if they did not login during the previous 50 days the following line can be used: </para> <programlisting> @@ -337,4 +337,4 @@ </para> </refsect1> -</refentry>
\ No newline at end of file +</refentry> diff --git a/modules/pam_lastlog/pam_lastlog.c b/modules/pam_lastlog/pam_lastlog.c index 02828033..43cc4b7d 100644 --- a/modules/pam_lastlog/pam_lastlog.c +++ b/modules/pam_lastlog/pam_lastlog.c @@ -677,7 +677,7 @@ pam_auth(pam_handle_t *pamh, int flags, int argc, const char **argv) int last_fd; /* - * Lock out the user if he did not login recently enough. + * Lock out users if they did not login recently enough. */ ctrl = _pam_auth_parse(pamh, flags, argc, argv, &inactive_days); diff --git a/modules/pam_limits/limits.conf.5.xml b/modules/pam_limits/limits.conf.5.xml index 2177da1f..dd8d68bc 100644 --- a/modules/pam_limits/limits.conf.5.xml +++ b/modules/pam_limits/limits.conf.5.xml @@ -104,7 +104,7 @@ <para> for enforcing <emphasis remap="B">hard</emphasis> resource limits. These limits are set by the superuser and enforced by the Kernel. - The user cannot raise his requirement of system resources above such values. + Users cannot raise their own requirement of system resources above such values. </para> </listitem> </varlistentry> @@ -350,4 +350,4 @@ ftp hard nproc 0 pam_limits was initially written by Cristian Gafton <gafton@redhat.com> </para> </refsect1> -</refentry>
\ No newline at end of file +</refentry> diff --git a/modules/pam_sepermit/pam_sepermit.8.xml b/modules/pam_sepermit/pam_sepermit.8.xml index 791d2bbe..114864a7 100644 --- a/modules/pam_sepermit/pam_sepermit.8.xml +++ b/modules/pam_sepermit/pam_sepermit.8.xml @@ -31,9 +31,9 @@ enforcement state. </para> <para> - When the user which is logging in matches an entry in the config file - he is allowed access only when the SELinux is in enforcing mode. Otherwise - he is denied access. For users not matching any entry in the config file + When the users which are logging in match an entry in the config file + they are allowed access only when SELinux is in enforcing mode. Otherwise + they are denied access. For users not matching any entry in the config file the pam_sepermit module returns PAM_IGNORE return value. </para> <para> @@ -192,4 +192,4 @@ session required pam_permit.so </para> </refsect1> -</refentry>
\ No newline at end of file +</refentry> diff --git a/modules/pam_timestamp/pam_timestamp_check.8.xml b/modules/pam_timestamp/pam_timestamp_check.8.xml index f0c09560..7f850ae0 100644 --- a/modules/pam_timestamp/pam_timestamp_check.8.xml +++ b/modules/pam_timestamp/pam_timestamp_check.8.xml @@ -72,7 +72,7 @@ see if the default timestamp is valid, or optionally remove it. <para> By default <command>pam_timestamp_check</command> checks or removes timestamps generated by <emphasis>pam_timestamp</emphasis> when - the user authenticates as herself. When the user authenticates as a + users authenticate as themselves. When the user authenticates as a different user, the name of the timestamp file changes to accommodate this. <replaceable>target_user</replaceable> allows one to specify this user name. @@ -201,4 +201,4 @@ session optional pam_timestamp.so </para> </refsect1> -</refentry>
\ No newline at end of file +</refentry> |