X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Fprivoxy-man-page.sgml;h=dbc918002ce6954aa6f7f63146c648a44db953fb;hb=15e948c1a62d809d13c3f66376d9eea6254ea14e;hp=c190d38add93768da6a647155eea2e7d8c6163c3;hpb=c01ca2fed6ffe149fba107a7896d80528dc9fbea;p=privoxy.git diff --git a/doc/source/privoxy-man-page.sgml b/doc/source/privoxy-man-page.sgml index c190d38a..dbc91800 100644 --- a/doc/source/privoxy-man-page.sgml +++ b/doc/source/privoxy-man-page.sgml @@ -5,9 +5,9 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: privoxy-man-page.sgml,v 2.38 2011/09/04 11:10:12 fabiankeil Exp $ + $Id: privoxy-man-page.sgml,v 2.47 2013/02/26 15:09:35 fabiankeil Exp $ - Copyright (C) 2001-2009 Privoxy Developers http://www.privoxy.org/ + Copyright (C) 2001-2012 Privoxy Developers http://www.privoxy.org/ See LICENSE. ======================================================================== @@ -42,7 +42,7 @@ - + @@ -54,7 +54,7 @@ - 2009-02-15 + 2012-11-08 privoxy @@ -72,13 +72,14 @@ privoxy + + - pidfile - user[.group] - hostname + user[.group] + configfile @@ -93,20 +94,48 @@ + - --help + --chroot + + + Before changing to the user ID given in the --user option, chroot to + that user's home directory, i.e. make the kernel pretend to the + Privoxy process that the directory tree starts + there. If set up carefully, this can limit the impact of possible + vulnerabilities in Privoxy to the files contained in + that hierarchy. + + + + + + --config-test - Print brief usage info and exit. + Exit after loading the configuration files before binding to + the listen address. The exit code signals whether or not the + configuration files have been successfully loaded. + + + If the exit code is 1, at least one of the configuration files + is invalid, if it is 0, all the configuration files have been + successfully loaded (but may still contain errors that can + currently only be detected at run time). + + This option doesn't affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn't + be used. + - --version + --help - Print version info and exit. + Print brief usage info and exit. @@ -133,6 +162,17 @@ + + --pre-chroot-nslookup hostname + + + Initialize the resolver library using hostname + before chroot'ing. On some systems this reduces the number of files + that must be copied into the chroot tree. + + + + --user user[.group] @@ -148,29 +188,16 @@ + - --chroot - - - Before changing to the user ID given in the --user option, chroot to - that user's home directory, i.e. make the kernel pretend to the - Privoxy process that the directory tree starts - there. If set up carefully, this can limit the impact of possible - vulnerabilities in Privoxy to the files contained in - that hierarchy. - - - - - --pre-chroot-nslookup hostname - - - Initialize the resolver library using hostname - before chroot'ing. On some systems this reduces the number of files - that must be copied into the chroot tree. - - + --version + + + Print version info and exit. + + + @@ -294,13 +321,14 @@ Signals - Privoxy terminates on the SIGINT, - SIGTERM and SIGABRT signals. Log + Privoxy terminates on the SIGINT + and SIGTERM signals. Log rotation scripts may cause a re-opening of the logfile by sending a SIGHUP to Privoxy. Note that unlike other daemons, Privoxy does not need to be made aware of config file changes by SIGHUP -- it will detect them - automatically. + automatically. Signals other than the ones listed above aren't explicitly + handled and result in the default action defined by the operating system.