X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fsource%2Fprivoxy-man-page.sgml;h=cd4f78147d36262ea53847c583b04d0d7ba63ea3;hp=0d24c78aa02986bb1c02577f7d85bdb6ffc9ea84;hb=9e8218ff00c020b0d3216744fb3f26242326ada5;hpb=0428133610c525457cb16f7ac6a54203a2743d6c diff --git a/doc/source/privoxy-man-page.sgml b/doc/source/privoxy-man-page.sgml index 0d24c78a..cd4f7814 100644 --- a/doc/source/privoxy-man-page.sgml +++ b/doc/source/privoxy-man-page.sgml @@ -5,9 +5,9 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: privoxy-man-page.sgml,v 2.37 2011/08/17 10:40:07 fabiankeil Exp $ + $Id: privoxy-man-page.sgml,v 2.48 2013/03/01 17:44:24 fabiankeil Exp $ - Copyright (C) 2001-2009 Privoxy Developers http://www.privoxy.org/ + Copyright (C) 2001-2012 Privoxy Developers http://www.privoxy.org/ See LICENSE. ======================================================================== @@ -42,7 +42,7 @@ - + @@ -54,7 +54,7 @@ - 2009-02-15 + 2012-11-08 privoxy @@ -72,13 +72,14 @@ privoxy + + - pidfile - user[.group] - hostname + user[.group] + configfile @@ -93,20 +94,48 @@ + - --help + --chroot + + + Before changing to the user ID given in the --user option, chroot to + that user's home directory, i.e. make the kernel pretend to the + Privoxy process that the directory tree starts + there. If set up carefully, this can limit the impact of possible + vulnerabilities in Privoxy to the files contained in + that hierarchy. + + + + + + --config-test - Print brief usage info and exit. + Exit after loading the configuration files before binding to + the listen address. The exit code signals whether or not the + configuration files have been successfully loaded. + + + If the exit code is 1, at least one of the configuration files + is invalid, if it is 0, all the configuration files have been + successfully loaded (but may still contain errors that can + currently only be detected at run time). + + This option doesn't affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn't + be used. + - --version + --help - Print version info and exit. + Print brief usage info and exit. @@ -133,6 +162,17 @@ + + --pre-chroot-nslookup hostname + + + Initialize the resolver library using hostname + before chroot'ing. On some systems this reduces the number of files + that must be copied into the chroot tree. + + + + --user user[.group] @@ -148,29 +188,16 @@ + - --chroot - - - Before changing to the user ID given in the --user option, chroot to - that user's home directory, i.e. make the kernel pretend to the - Privoxy process that the directory tree starts - there. If set up carefully, this can limit the impact of possible - vulnerabilities in Privoxy to the files contained in - that hierarchy. - - - - - --pre-chroot-nslookup hostname - - - Initialize the resolver library using hostname - before chroot'ing. On some systems this reduces the number of files - that must be copied into the chroot tree. - - + --version + + + Print version info and exit. + + + @@ -294,13 +321,14 @@ Signals - Privoxy terminates on the SIGINT, - SIGTERM and SIGABRT signals. Log + Privoxy terminates on the SIGINT + and SIGTERM signals. Log rotation scripts may cause a re-opening of the logfile by sending a SIGHUP to Privoxy. Note that unlike other daemons, Privoxy does not need to be made aware of config file changes by SIGHUP -- it will detect them - automatically. + automatically. Signals other than the ones listed above aren't explicitly + handled and result in the default action defined by the operating system.