summaryrefslogtreecommitdiffstats
path: root/man5/nsswitch.conf.5
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--man5/nsswitch.conf.540
1 files changed, 20 insertions, 20 deletions
diff --git a/man5/nsswitch.conf.5 b/man5/nsswitch.conf.5
index 49b288e..34dd7d7 100644
--- a/man5/nsswitch.conf.5
+++ b/man5/nsswitch.conf.5
@@ -3,7 +3,7 @@
.\"
.\" SPDX-License-Identifier: GPL-2.0-or-later
.\"
-.TH nsswitch.conf 5 2023-05-03 "Linux man-pages 6.05.01"
+.TH nsswitch.conf 5 2023-10-31 "Linux man-pages 6.7"
.SH NAME
nsswitch.conf \- Name Service Switch configuration file
.SH DESCRIPTION
@@ -14,13 +14,13 @@ the sources from which to obtain name-service information in
a range of categories,
and in what order.
Each category of information is identified by a database name.
-.PP
+.P
The file is plain ASCII text, with columns separated by spaces or tab
characters.
The first column specifies the database name.
The remaining columns describe the order of sources to query and a
limited set of actions that can be performed by lookup result.
-.PP
+.P
The following databases are understood by the GNU C Library:
.TP 12
.B aliases
@@ -82,7 +82,7 @@ and related functions.
Shadow user passwords, used by
.BR getspnam (3)
and related functions.
-.PP
+.P
The GNU C Library ignores databases with unknown names.
Some applications use this to implement special handling for their own
databases.
@@ -100,11 +100,11 @@ Refer to
and
.BR subgid (5)
for more details.
-.PP
+.P
Here is an example
.I /etc/nsswitch.conf
file:
-.PP
+.P
.in +4n
.EX
passwd: compat
@@ -119,7 +119,7 @@ rpc: nis [NOTFOUND=return] files
services: nis [NOTFOUND=return] files
.EE
.in
-.PP
+.P
The first column is the database name.
The remaining columns specify:
.IP \[bu] 3
@@ -129,7 +129,7 @@ those services will be queried, in turn, until a result is found.
.IP \[bu]
Optional actions to perform if a particular result is obtained
from the preceding service, for example, "[NOTFOUND=return]".
-.PP
+.P
The service specifications supported on your system depend on the
presence of shared libraries, and are therefore extensible.
Libraries called
@@ -155,20 +155,20 @@ The version number
may be 1 for glibc 2.0, or 2 for glibc 2.1 and later.
On systems with additional libraries installed, you may have access to
further services such as "hesiod", "ldap", "winbind", and "wins".
-.PP
+.P
An action may also be specified following a service specification.
The action modifies the behavior following a result obtained
from the preceding data source.
Action items take the general form:
-.PP
+.P
.RS 4
.RI [ STATUS = ACTION ]
.br
.RI [! STATUS = ACTION ]
.RE
-.PP
+.P
where
-.PP
+.P
.RS 4
.I STATUS
=>
@@ -188,11 +188,11 @@ where
|
.B merge
.RE
-.PP
+.P
The ! negates the test, matching all possible results except the
one specified.
The case of the keywords is not significant.
-.PP
+.P
The
.I STATUS
value is matched against the result of the lookup function called by
@@ -220,7 +220,7 @@ This could mean a file is
locked or a server currently cannot accept more connections.
The default action for this condition is "continue".
.RE
-.PP
+.P
The
.I ACTION
value can be one of:
@@ -261,7 +261,7 @@ additionally permits special entries in corresponding files
for granting users or members of netgroups access to the system.
The following entries are valid in this mode:
.RS 4
-.PP
+.P
For
.B passwd
and
@@ -291,7 +291,7 @@ Exclude all users in the given
Include every user, except previously excluded ones, from the
NIS passwd/shadow map.
.RE
-.PP
+.P
For
.B group
database:
@@ -312,7 +312,7 @@ Include every group, except previously excluded ones, from the
NIS group map.
.RE
.RE
-.PP
+.P
By default, the source is "nis", but this may be
overridden by specifying any NSS service except "compat" itself
as the source for the pseudo-databases
@@ -355,7 +355,7 @@ implements "nis" source.
implements "nisplus" source.
.PD
.RE
-.PP
+.P
The following files are read when "files" source is specified
for respective databases:
.RS 4
@@ -409,7 +409,7 @@ is automatically reloaded if the file is changed.
In earlier versions, the entire file was read only once within each process.
If the file was later changed,
the process would continue using the old configuration.
-.PP
+.P
Traditionally, there was only a single source for service information,
often in the form of a single configuration
file (e.g., \fI/etc/passwd\fP).