krb5 commit: Use '---' for em dashes in rst source

Benjamin Kaduk kaduk at MIT.EDU
Mon Aug 6 16:25:18 EDT 2012


https://github.com/krb5/krb5/commit/184b9bce22f062532d7c67a64fc3896ff3d5f234
commit 184b9bce22f062532d7c67a64fc3896ff3d5f234
Author: Ben Kaduk <kaduk at mit.edu>
Date:   Tue Jul 3 11:41:56 2012 -0400

    Use '---' for em dashes in rst source
    
    Our sphinx configuration uses SmartyPants, which produces smart
    quotes and dashes in HTML output, using '--' for en dash and
    '---' for em dash.  (This is also the LaTeX convention.)
    These points in the text are meant to be em dashes, so format them
    as such.  Also standardize on no spaces around the dash per
    Chicago Manual of Style (and others).

 doc/rst_source/krb_admins/conf_files/krb5_conf.rst |    2 +-
 doc/rst_source/krb_appldev/init_creds.rst          |    2 +-
 doc/rst_source/krb_users/pwd_mgmt.rst              |    4 ++--
 3 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/doc/rst_source/krb_admins/conf_files/krb5_conf.rst b/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
index c111647..4abcc25 100644
--- a/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
+++ b/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
@@ -298,7 +298,7 @@ The libdefaults section may contain any of the following relations:
     host's domain itself, 1 means to also try the domain's immediate
     parent, and so forth.  The library's usual mechanism for locating
     Kerberos realms is used to determine whether a domain is a valid
-    realm--which may involve consulting DNS if **dns_lookup_kdc** is
+    realm---which may involve consulting DNS if **dns_lookup_kdc** is
     set.  The default is not to search domain components.
 
 **renew_lifetime**
diff --git a/doc/rst_source/krb_appldev/init_creds.rst b/doc/rst_source/krb_appldev/init_creds.rst
index 0750bd8..b9528e7 100644
--- a/doc/rst_source/krb_appldev/init_creds.rst
+++ b/doc/rst_source/krb_appldev/init_creds.rst
@@ -55,5 +55,5 @@ setting.)
 This accommodates a use case where a large number of unkeyed shared
 desktop workstations need to allow users to log in using Kerberos.
 The security risks from this practice are mitigated by the absence of
-valuable state on the shared workstations -- any valuable resources
+valuable state on the shared workstations---any valuable resources
 that the users would access reside on networked servers.
diff --git a/doc/rst_source/krb_users/pwd_mgmt.rst b/doc/rst_source/krb_users/pwd_mgmt.rst
index c0d2109..ed7d459 100644
--- a/doc/rst_source/krb_users/pwd_mgmt.rst
+++ b/doc/rst_source/krb_users/pwd_mgmt.rst
@@ -3,8 +3,8 @@ Password management
 
 Your password is the only way Kerberos has of verifying your identity.
 If someone finds out your password, that person can masquerade as
-you--send email that comes from you, read, edit, or delete your files,
-or log into other hosts as you--and no one will be able to tell the
+you---send email that comes from you, read, edit, or delete your files,
+or log into other hosts as you---and no one will be able to tell the
 difference.  For this reason, it is important that you choose a good
 password, and keep it secret.  If you need to give access to your
 account to someone else, you can do so through Kerberos (see


More information about the cvs-krb5 mailing list