summaryrefslogtreecommitdiff
path: root/man
diff options
context:
space:
mode:
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2023-02-05 21:41:24 +0100
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2023-02-06 09:19:04 +0100
commit7a17e41dcfad2a45d3acced2596f7359bbcd1075 (patch)
tree1014afaf36886db05f222ff495b75bf2827b3142 /man
parentecf4be2952ed13fc1521ae13fcc9543c2f873efe (diff)
downloadsystemd-7a17e41dcfad2a45d3acced2596f7359bbcd1075.tar.gz
test: drop whitespace after shell redirection operators
(The one case that is left unchanged is '< <(subcommand)'.) This way, the style with no gap was already dominant. This way, the reader immediately knows that ' < ' is a comparison operator and ' << ' is a shift. In a few cases, replace custom EOF replacement by just EOF. There is no point in using someting like "_EOL" unless "EOF" appears in the text.
Diffstat (limited to 'man')
-rw-r--r--man/fido2-crypttab.sh2
-rw-r--r--man/loader.conf.xml6
-rw-r--r--man/systemd-creds.xml2
-rw-r--r--man/systemd-dissect.xml2
-rw-r--r--man/systemd-measure.xml2
-rw-r--r--man/systemd-run.xml2
-rw-r--r--man/tpm2-crypttab.sh2
-rw-r--r--man/yubikey-crypttab.sh2
8 files changed, 10 insertions, 10 deletions
diff --git a/man/fido2-crypttab.sh b/man/fido2-crypttab.sh
index acb2e177ef..b584a13bdf 100644
--- a/man/fido2-crypttab.sh
+++ b/man/fido2-crypttab.sh
@@ -9,4 +9,4 @@ sudo /usr/lib/systemd/systemd-cryptsetup attach mytest /dev/sdXn - fido2-device=
# If that worked, let's now add the same line persistently to /etc/crypttab,
# for the future.
-sudo bash -c 'echo "mytest /dev/sdXn - fido2-device=auto" >> /etc/crypttab'
+sudo bash -c 'echo "mytest /dev/sdXn - fido2-device=auto" >>/etc/crypttab'
diff --git a/man/loader.conf.xml b/man/loader.conf.xml
index 22f4644d9e..c6cc4ffe37 100644
--- a/man/loader.conf.xml
+++ b/man/loader.conf.xml
@@ -285,17 +285,17 @@ for key in MicWinProPCA2011_2011-10-19.crt MicCorUEFCA2011_2011-06-27.crt MicCor
done
# Optionally add Microsoft Windows Production CA 2011 (needed to boot into Windows).
-cat MicWinProPCA2011_2011-10-19.esl >> db.esl
+cat MicWinProPCA2011_2011-10-19.esl >>db.esl
# Optionally add Microsoft Corporation UEFI CA 2011 for firmware drivers / option ROMs
# and third-party boot loaders (including shim). This is highly recommended on real
# hardware as not including this may soft-brick your device (see next paragraph).
-cat MicCorUEFCA2011_2011-06-27.esl >> db.esl
+cat MicCorUEFCA2011_2011-06-27.esl >>db.esl
# Optionally add Microsoft Corporation KEK CA 2011. Recommended if either of the
# Microsoft keys is used as the official UEFI revocation database is signed with this
# key. The revocation database can be updated with <citerefentry><refentrytitle>fwupdmgr</refentrytitle><manvolnum>1</manvolnum></citerefentry>.
-cat MicCorKEKCA2011_2011-06-24.esl >> KEK.esl
+cat MicCorKEKCA2011_2011-06-24.esl >>KEK.esl
attr=NON_VOLATILE,RUNTIME_ACCESS,BOOTSERVICE_ACCESS,TIME_BASED_AUTHENTICATED_WRITE_ACCESS
sbvarsign --attr ${attr} --key PK.key --cert PK.crt --output PK.auth PK PK.esl
diff --git a/man/systemd-creds.xml b/man/systemd-creds.xml
index 49d78ee7fc..b16ee09cee 100644
--- a/man/systemd-creds.xml
+++ b/man/systemd-creds.xml
@@ -436,7 +436,7 @@ SetCredentialEncrypted=mysql-password: \
<filename>xyz.service</filename>:</para>
<programlisting># mkdir -p /etc/systemd/system/xyz.service.d
-# systemd-ask-password -n | systemd-creds encrypt --name=mysql-password -p - - > /etc/systemd/system/xyz.service.d/50-password.conf
+# systemd-ask-password -n | systemd-creds encrypt --name=mysql-password -p - - >/etc/systemd/system/xyz.service.d/50-password.conf
# systemctl daemon-reload
# systemctl restart xyz.service</programlisting>
</example>
diff --git a/man/systemd-dissect.xml b/man/systemd-dissect.xml
index 3b014b47b8..6549aa92c8 100644
--- a/man/systemd-dissect.xml
+++ b/man/systemd-dissect.xml
@@ -366,7 +366,7 @@
<example>
<title>Generate a tarball from an OS disk image</title>
- <programlisting>$ systemd-dissect --with foo.raw tar cz . > foo.tar.gz</programlisting>
+ <programlisting>$ systemd-dissect --with foo.raw tar cz . >foo.tar.gz</programlisting>
</example>
</refsect1>
diff --git a/man/systemd-measure.xml b/man/systemd-measure.xml
index 6c53d61d54..05966f264f 100644
--- a/man/systemd-measure.xml
+++ b/man/systemd-measure.xml
@@ -240,7 +240,7 @@
--bank=sha1 \
--bank=sha256 \
--private-key=tpm2-pcr-private.pem \
- --public-key=tpm2-pcr-public.pem > tpm2-pcr-signature.json
+ --public-key=tpm2-pcr-public.pem >tpm2-pcr-signature.json
# ukify --output foo.efi \
--os-release @os-release.txt \
--cmdline @cmdline.txt \
diff --git a/man/systemd-run.xml b/man/systemd-run.xml
index 0c91d61d76..cd9e50d5b8 100644
--- a/man/systemd-run.xml
+++ b/man/systemd-run.xml
@@ -289,7 +289,7 @@
to the service processes as-is. If the service runs with different privileges than
<command>systemd-run</command>, this means the service might not be able to re-open the passed file
descriptors, due to normal file descriptor access restrictions. If the invoked process is a shell script that
- uses the <command>echo "hello" > /dev/stderr</command> construct for writing messages to stderr, this might
+ uses the <command>echo "hello" >/dev/stderr</command> construct for writing messages to stderr, this might
cause problems, as this only works if stderr can be re-opened. To mitigate this use the construct <command>echo
"hello" >&amp;2</command> instead, which is mostly equivalent and avoids this pitfall.</para></listitem>
</varlistentry>
diff --git a/man/tpm2-crypttab.sh b/man/tpm2-crypttab.sh
index d109eb40cd..c2c7405b26 100644
--- a/man/tpm2-crypttab.sh
+++ b/man/tpm2-crypttab.sh
@@ -9,4 +9,4 @@ sudo /usr/lib/systemd/systemd-cryptsetup attach mytest /dev/sdXn - tpm2-device=a
# If that worked, let's now add the same line persistently to /etc/crypttab,
# for the future.
-sudo bash -c 'echo "mytest /dev/sdXn - tpm2-device=auto" >> /etc/crypttab'
+sudo bash -c 'echo "mytest /dev/sdXn - tpm2-device=auto" >>/etc/crypttab'
diff --git a/man/yubikey-crypttab.sh b/man/yubikey-crypttab.sh
index ce9c2917c5..d74dfa5cc2 100644
--- a/man/yubikey-crypttab.sh
+++ b/man/yubikey-crypttab.sh
@@ -25,4 +25,4 @@ sudo /usr/lib/systemd/systemd-cryptsetup attach mytest /dev/sdXn - pkcs11-uri=au
# If that worked, let's now add the same line persistently to /etc/crypttab,
# for the future.
-sudo bash -c 'echo "mytest /dev/sdXn - pkcs11-uri=auto" >> /etc/crypttab'
+sudo bash -c 'echo "mytest /dev/sdXn - pkcs11-uri=auto" >>/etc/crypttab'