Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
sudo-project
GitHub Repository: sudo-project/sudo
Path: blob/main/plugins/sudoers/def_data.c
1532 views
1
/* generated file, do not edit */
2
3
static struct def_values def_data_lecture[] = {
4
{ "never", never },
5
{ "once", once },
6
{ "always", always },
7
{ NULL, 0 },
8
};
9
10
static struct def_values def_data_listpw[] = {
11
{ "never", never },
12
{ "any", any },
13
{ "all", all },
14
{ "always", always },
15
{ NULL, 0 },
16
};
17
18
static struct def_values def_data_verifypw[] = {
19
{ "never", never },
20
{ "all", all },
21
{ "any", any },
22
{ "always", always },
23
{ NULL, 0 },
24
};
25
26
static struct def_values def_data_fdexec[] = {
27
{ "never", never },
28
{ "digest_only", digest_only },
29
{ "always", always },
30
{ NULL, 0 },
31
};
32
33
static struct def_values def_data_timestamp_type[] = {
34
{ "global", global },
35
{ "ppid", ppid },
36
{ "tty", tty },
37
{ "kernel", kernel },
38
{ NULL, 0 },
39
};
40
41
static struct def_values def_data_log_format[] = {
42
{ "sudo", sudo },
43
{ "json", json },
44
{ "json_compact", json_compact },
45
{ "json_pretty", json_pretty },
46
{ NULL, 0 },
47
};
48
49
static struct def_values def_data_intercept_type[] = {
50
{ "dso", dso },
51
{ "trace", trace },
52
{ NULL, 0 },
53
};
54
55
struct sudo_defs_types sudo_defs_table[] = {
56
{
57
"syslog", T_LOGFAC|T_BOOL,
58
N_("Syslog facility if syslog is being used for logging: %s"),
59
NULL,
60
}, {
61
"syslog_goodpri", T_LOGPRI|T_BOOL,
62
N_("Syslog priority to use when user authenticates successfully: %s"),
63
NULL,
64
}, {
65
"syslog_badpri", T_LOGPRI|T_BOOL,
66
N_("Syslog priority to use when user authenticates unsuccessfully: %s"),
67
NULL,
68
}, {
69
"long_otp_prompt", T_FLAG,
70
N_("Put OTP prompt on its own line"),
71
NULL,
72
}, {
73
"ignore_dot", T_FLAG,
74
N_("Ignore '.' in $PATH"),
75
NULL,
76
}, {
77
"mail_always", T_FLAG,
78
N_("Always send mail when sudo is run"),
79
NULL,
80
}, {
81
"mail_badpass", T_FLAG,
82
N_("Send mail if user authentication fails"),
83
NULL,
84
}, {
85
"mail_no_user", T_FLAG,
86
N_("Send mail if the user is not in sudoers"),
87
NULL,
88
}, {
89
"mail_no_host", T_FLAG,
90
N_("Send mail if the user is not in sudoers for this host"),
91
NULL,
92
}, {
93
"mail_no_perms", T_FLAG,
94
N_("Send mail if the user is not allowed to run a command"),
95
NULL,
96
}, {
97
"mail_all_cmnds", T_FLAG,
98
N_("Send mail if the user tries to run a command"),
99
NULL,
100
}, {
101
"tty_tickets", T_FLAG,
102
N_("Use a separate timestamp for each user/tty combo"),
103
NULL,
104
}, {
105
"lecture", T_TUPLE|T_BOOL,
106
N_("Lecture user the first time they run sudo"),
107
def_data_lecture,
108
}, {
109
"lecture_file", T_STR|T_PATH|T_BOOL,
110
N_("File containing the sudo lecture: %s"),
111
NULL,
112
}, {
113
"authenticate", T_FLAG,
114
N_("Require users to authenticate by default"),
115
NULL,
116
}, {
117
"root_sudo", T_FLAG,
118
N_("Root may run sudo"),
119
NULL,
120
}, {
121
"log_host", T_FLAG,
122
N_("Log the hostname in the (non-syslog) log file"),
123
NULL,
124
}, {
125
"log_year", T_FLAG,
126
N_("Log the year in the (non-syslog) log file"),
127
NULL,
128
}, {
129
"shell_noargs", T_FLAG,
130
N_("If sudo is invoked with no arguments, start a shell"),
131
NULL,
132
}, {
133
"set_home", T_FLAG,
134
N_("Set $HOME to the target user when starting a shell with -s"),
135
NULL,
136
}, {
137
"always_set_home", T_FLAG,
138
N_("Always set $HOME to the target user's home directory"),
139
NULL,
140
}, {
141
"path_info", T_FLAG,
142
N_("Allow some information gathering to give useful error messages"),
143
NULL,
144
}, {
145
"fqdn", T_FLAG,
146
N_("Require fully-qualified hostnames in the sudoers file"),
147
NULL,
148
}, {
149
"insults", T_FLAG,
150
N_("Insult the user when they enter an incorrect password"),
151
NULL,
152
}, {
153
"requiretty", T_FLAG,
154
N_("Only allow the user to run sudo if they have a tty"),
155
NULL,
156
}, {
157
"env_editor", T_FLAG,
158
N_("Visudo will honor the EDITOR environment variable"),
159
NULL,
160
}, {
161
"rootpw", T_FLAG,
162
N_("Prompt for root's password, not the user's"),
163
NULL,
164
}, {
165
"runaspw", T_FLAG,
166
N_("Prompt for the runas_default user's password, not the user's"),
167
NULL,
168
}, {
169
"targetpw", T_FLAG,
170
N_("Prompt for the target user's password, not the user's"),
171
NULL,
172
}, {
173
"use_loginclass", T_FLAG,
174
N_("Apply defaults in the target user's login class if there is one"),
175
NULL,
176
}, {
177
"set_logname", T_FLAG,
178
N_("Set the LOGNAME and USER environment variables"),
179
NULL,
180
}, {
181
"stay_setuid", T_FLAG,
182
N_("Only set the effective uid to the target user, not the real uid"),
183
NULL,
184
}, {
185
"preserve_groups", T_FLAG,
186
N_("Don't initialize the group vector to that of the target user"),
187
NULL,
188
}, {
189
"loglinelen", T_UINT|T_BOOL,
190
N_("Length at which to wrap log file lines (0 for no wrap): %u"),
191
NULL,
192
}, {
193
"timestamp_timeout", T_TIMESPEC|T_BOOL,
194
N_("Authentication timestamp timeout: %d.%d minutes"),
195
NULL,
196
}, {
197
"passwd_timeout", T_TIMESPEC|T_BOOL,
198
N_("Password prompt timeout: %d.%d minutes"),
199
NULL,
200
}, {
201
"passwd_tries", T_UINT,
202
N_("Number of tries to enter a password: %u"),
203
NULL,
204
}, {
205
"umask", T_MODE|T_BOOL,
206
N_("Umask to use or 0777 to use user's: 0%o"),
207
NULL,
208
}, {
209
"logfile", T_STR|T_BOOL|T_PATH,
210
N_("Path to log file: %s"),
211
NULL,
212
}, {
213
"mailerpath", T_STR|T_BOOL|T_PATH,
214
N_("Path to mail program: %s"),
215
NULL,
216
}, {
217
"mailerflags", T_STR|T_BOOL,
218
N_("Flags for mail program: %s"),
219
NULL,
220
}, {
221
"mailto", T_STR|T_BOOL,
222
N_("Address to send mail to: %s"),
223
NULL,
224
}, {
225
"mailfrom", T_STR|T_BOOL,
226
N_("Address to send mail from: %s"),
227
NULL,
228
}, {
229
"mailsub", T_STR,
230
N_("Subject line for mail messages: %s"),
231
NULL,
232
}, {
233
"badpass_message", T_STR,
234
N_("Incorrect password message: %s"),
235
NULL,
236
}, {
237
"lecture_status_dir", T_STR|T_PATH,
238
N_("Path to lecture status dir: %s"),
239
NULL,
240
}, {
241
"timestampdir", T_STR|T_PATH,
242
N_("Path to authentication timestamp dir: %s"),
243
NULL,
244
}, {
245
"timestampowner", T_STR,
246
N_("Owner of the authentication timestamp dir: %s"),
247
NULL,
248
}, {
249
"exempt_group", T_STR|T_BOOL,
250
N_("Users in this group are exempt from password and PATH requirements: %s"),
251
NULL,
252
}, {
253
"passprompt", T_STR,
254
N_("Default password prompt: %s"),
255
NULL,
256
}, {
257
"passprompt_override", T_FLAG,
258
N_("If set, passprompt will override system prompt in all cases."),
259
NULL,
260
}, {
261
"runas_default", T_STR,
262
N_("Default user to run commands as: %s"),
263
NULL,
264
}, {
265
"secure_path", T_STR|T_BOOL,
266
N_("Value to override user's $PATH with: %s"),
267
NULL,
268
}, {
269
"editor", T_STR|T_PATH,
270
N_("Path to the editor for use by visudo: %s"),
271
NULL,
272
}, {
273
"listpw", T_TUPLE|T_BOOL,
274
N_("When to require a password for 'list' pseudocommand: %s"),
275
def_data_listpw,
276
}, {
277
"verifypw", T_TUPLE|T_BOOL,
278
N_("When to require a password for 'verify' pseudocommand: %s"),
279
def_data_verifypw,
280
}, {
281
"noexec", T_FLAG,
282
N_("Preload the sudo_noexec library which replaces the exec functions"),
283
NULL,
284
}, {
285
"ignore_local_sudoers", T_FLAG,
286
N_("If LDAP directory is up, do we ignore local sudoers file"),
287
NULL,
288
}, {
289
"closefrom", T_INT,
290
N_("File descriptors >= %d will be closed before executing a command"),
291
NULL,
292
}, {
293
"closefrom_override", T_FLAG,
294
N_("If set, users may override the value of \"closefrom\" with the -C option"),
295
NULL,
296
}, {
297
"setenv", T_FLAG,
298
N_("Allow users to set arbitrary environment variables"),
299
NULL,
300
}, {
301
"env_reset", T_FLAG,
302
N_("Reset the environment to a default set of variables"),
303
NULL,
304
}, {
305
"env_check", T_LIST|T_BOOL,
306
N_("Environment variables to check for safety:"),
307
NULL,
308
}, {
309
"env_delete", T_LIST|T_BOOL,
310
N_("Environment variables to remove:"),
311
NULL,
312
}, {
313
"env_keep", T_LIST|T_BOOL,
314
N_("Environment variables to preserve:"),
315
NULL,
316
}, {
317
"role", T_STR,
318
N_("SELinux role to use in the new security context: %s"),
319
NULL,
320
}, {
321
"type", T_STR,
322
N_("SELinux type to use in the new security context: %s"),
323
NULL,
324
}, {
325
"env_file", T_STR|T_PATH|T_BOOL,
326
N_("Path to the sudo-specific environment file: %s"),
327
NULL,
328
}, {
329
"restricted_env_file", T_STR|T_PATH|T_BOOL,
330
N_("Path to the restricted sudo-specific environment file: %s"),
331
NULL,
332
}, {
333
"sudoers_locale", T_STR,
334
N_("Locale to use while parsing sudoers: %s"),
335
NULL,
336
}, {
337
"visiblepw", T_FLAG,
338
N_("Allow sudo to prompt for a password even if it would be visible"),
339
NULL,
340
}, {
341
"pwfeedback", T_FLAG,
342
N_("Provide visual feedback at the password prompt when there is user input"),
343
NULL,
344
}, {
345
"fast_glob", T_FLAG,
346
N_("Use faster globbing that is less accurate but does not access the filesystem"),
347
NULL,
348
}, {
349
"umask_override", T_FLAG,
350
N_("The umask specified in sudoers will override the user's, even if it is more permissive"),
351
NULL,
352
}, {
353
"log_input", T_FLAG,
354
N_("Log user's input for the command being run"),
355
NULL,
356
}, {
357
"log_stdin", T_FLAG,
358
N_("Log the command's standard input if not connected to a terminal"),
359
NULL,
360
}, {
361
"log_ttyin", T_FLAG,
362
N_("Log the user's terminal input for the command being run"),
363
NULL,
364
}, {
365
"log_output", T_FLAG,
366
N_("Log the output of the command being run"),
367
NULL,
368
}, {
369
"log_stdout", T_FLAG,
370
N_("Log the command's standard output if not connected to a terminal"),
371
NULL,
372
}, {
373
"log_stderr", T_FLAG,
374
N_("Log the command's standard error if not connected to a terminal"),
375
NULL,
376
}, {
377
"log_ttyout", T_FLAG,
378
N_("Log the terminal output of the command being run"),
379
NULL,
380
}, {
381
"compress_io", T_FLAG,
382
N_("Compress I/O logs using zlib"),
383
NULL,
384
}, {
385
"use_pty", T_FLAG,
386
N_("Always run commands in a pseudo-tty"),
387
NULL,
388
}, {
389
"group_plugin", T_STR,
390
N_("Plugin for non-Unix group support: %s"),
391
NULL,
392
}, {
393
"iolog_dir", T_STR|T_PATH,
394
N_("Directory in which to store input/output logs: %s"),
395
NULL,
396
}, {
397
"iolog_file", T_STR,
398
N_("File in which to store the input/output log: %s"),
399
NULL,
400
}, {
401
"set_utmp", T_FLAG,
402
N_("Add an entry to the utmp/utmpx file when allocating a pty"),
403
NULL,
404
}, {
405
"utmp_runas", T_FLAG,
406
N_("Set the user in utmp to the runas user, not the invoking user"),
407
NULL,
408
}, {
409
"privs", T_STR,
410
N_("Set of permitted privileges: %s"),
411
NULL,
412
}, {
413
"limitprivs", T_STR,
414
N_("Set of limit privileges: %s"),
415
NULL,
416
}, {
417
"exec_background", T_FLAG,
418
N_("Run commands on a pty in the background"),
419
NULL,
420
}, {
421
"pam_service", T_STR,
422
N_("PAM service name to use: %s"),
423
NULL,
424
}, {
425
"pam_login_service", T_STR,
426
N_("PAM service name to use for login shells: %s"),
427
NULL,
428
}, {
429
"pam_askpass_service", T_STR,
430
N_("PAM service name to use when sudo is run with the -A option: %s"),
431
NULL,
432
}, {
433
"pam_setcred", T_FLAG,
434
N_("Attempt to establish PAM credentials for the target user"),
435
NULL,
436
}, {
437
"pam_session", T_FLAG,
438
N_("Create a new PAM session for the command to run in"),
439
NULL,
440
}, {
441
"pam_acct_mgmt", T_FLAG,
442
N_("Perform PAM account validation management"),
443
NULL,
444
}, {
445
"pam_silent", T_FLAG,
446
N_("Do not allow PAM authentication modules to generate output"),
447
NULL,
448
}, {
449
"maxseq", T_STR,
450
N_("Maximum I/O log sequence number: %s"),
451
NULL,
452
}, {
453
"use_netgroups", T_FLAG,
454
N_("Enable sudoers netgroup support"),
455
NULL,
456
}, {
457
"sudoedit_checkdir", T_FLAG,
458
N_("Check parent directories for writability when editing files with sudoedit"),
459
NULL,
460
}, {
461
"sudoedit_follow", T_FLAG,
462
N_("Follow symbolic links when editing files with sudoedit"),
463
NULL,
464
}, {
465
"always_query_group_plugin", T_FLAG,
466
N_("Query the group plugin for unknown system groups"),
467
NULL,
468
}, {
469
"netgroup_tuple", T_FLAG,
470
N_("Match netgroups based on the entire tuple: user, host and domain"),
471
NULL,
472
}, {
473
"ignore_audit_errors", T_FLAG,
474
N_("Allow commands to be run even if sudo cannot write to the audit log"),
475
NULL,
476
}, {
477
"ignore_iolog_errors", T_FLAG,
478
N_("Allow commands to be run even if sudo cannot write to the I/O log"),
479
NULL,
480
}, {
481
"ignore_logfile_errors", T_FLAG,
482
N_("Allow commands to be run even if sudo cannot write to the log file"),
483
NULL,
484
}, {
485
"match_group_by_gid", T_FLAG,
486
N_("Resolve groups in sudoers and match on the group ID, not the name"),
487
NULL,
488
}, {
489
"syslog_maxlen", T_UINT,
490
N_("Log entries larger than this value will be split into multiple syslog messages: %u"),
491
NULL,
492
}, {
493
"iolog_user", T_STR|T_BOOL,
494
N_("User that will own the I/O log files: %s"),
495
NULL,
496
}, {
497
"iolog_group", T_STR|T_BOOL,
498
N_("Group that will own the I/O log files: %s"),
499
NULL,
500
}, {
501
"iolog_mode", T_MODE,
502
N_("File mode to use for the I/O log files: 0%o"),
503
NULL,
504
}, {
505
"fdexec", T_TUPLE|T_BOOL,
506
N_("Execute commands by file descriptor instead of by path: %s"),
507
def_data_fdexec,
508
}, {
509
"ignore_unknown_defaults", T_FLAG,
510
N_("Ignore unknown Defaults entries in sudoers instead of producing a warning"),
511
NULL,
512
}, {
513
"command_timeout", T_TIMEOUT|T_BOOL,
514
N_("Time in seconds after which the command will be terminated: %u"),
515
NULL,
516
}, {
517
"user_command_timeouts", T_FLAG,
518
N_("Allow the user to specify a timeout on the command line"),
519
NULL,
520
}, {
521
"iolog_flush", T_FLAG,
522
N_("Flush I/O log data to disk immediately instead of buffering it"),
523
NULL,
524
}, {
525
"syslog_pid", T_FLAG,
526
N_("Include the process ID when logging via syslog"),
527
NULL,
528
}, {
529
"timestamp_type", T_TUPLE,
530
N_("Type of authentication timestamp record: %s"),
531
def_data_timestamp_type,
532
}, {
533
"authfail_message", T_STR,
534
N_("Authentication failure message: %s"),
535
NULL,
536
}, {
537
"case_insensitive_user", T_FLAG,
538
N_("Ignore case when matching user names"),
539
NULL,
540
}, {
541
"case_insensitive_group", T_FLAG,
542
N_("Ignore case when matching group names"),
543
NULL,
544
}, {
545
"log_allowed", T_FLAG,
546
N_("Log when a command is allowed by sudoers"),
547
NULL,
548
}, {
549
"log_denied", T_FLAG,
550
N_("Log when a command is denied by sudoers"),
551
NULL,
552
}, {
553
"log_servers", T_LIST|T_BOOL,
554
N_("Sudo log server(s) to connect to with optional port"),
555
NULL,
556
}, {
557
"log_server_timeout", T_TIMEOUT|T_BOOL,
558
N_("Sudo log server timeout in seconds: %u"),
559
NULL,
560
}, {
561
"log_server_keepalive", T_FLAG,
562
N_("Enable SO_KEEPALIVE socket option on the socket connected to the logserver"),
563
NULL,
564
}, {
565
"log_server_cabundle", T_STR|T_BOOL|T_PATH,
566
N_("Path to the audit server's CA bundle file: %s"),
567
NULL,
568
}, {
569
"log_server_peer_cert", T_STR|T_BOOL|T_PATH,
570
N_("Path to the sudoers certificate file: %s"),
571
NULL,
572
}, {
573
"log_server_peer_key", T_STR|T_BOOL|T_PATH,
574
N_("Path to the sudoers private key file: %s"),
575
NULL,
576
}, {
577
"log_server_verify", T_FLAG,
578
N_("Verify that the log server's certificate is valid"),
579
NULL,
580
}, {
581
"runas_allow_unknown_id", T_FLAG,
582
N_("Allow the use of unknown runas user and/or group ID"),
583
NULL,
584
}, {
585
"runas_check_shell", T_FLAG,
586
N_("Only permit running commands as a user with a valid shell"),
587
NULL,
588
}, {
589
"pam_ruser", T_FLAG,
590
N_("Set the pam remote user to the user running sudo"),
591
NULL,
592
}, {
593
"pam_rhost", T_FLAG,
594
N_("Set the pam remote host to the local host name"),
595
NULL,
596
}, {
597
"runcwd", T_STR|T_BOOL|T_CHPATH,
598
N_("Working directory to change to before executing the command: %s"),
599
NULL,
600
}, {
601
"runchroot", T_STR|T_BOOL|T_CHPATH,
602
N_("Root directory to change to before executing the command: %s"),
603
NULL,
604
}, {
605
"log_format", T_TUPLE,
606
N_("The format of logs to produce: %s"),
607
def_data_log_format,
608
}, {
609
"selinux", T_FLAG,
610
N_("Enable SELinux RBAC support"),
611
NULL,
612
}, {
613
"admin_flag", T_STR|T_BOOL|T_CHPATH,
614
N_("Path to the file that is created the first time sudo is run: %s"),
615
NULL,
616
}, {
617
"intercept", T_FLAG,
618
N_("Intercept further commands and apply sudoers restrictions to them"),
619
NULL,
620
}, {
621
"log_subcmds", T_FLAG,
622
N_("Log sub-commands run by the original command"),
623
NULL,
624
}, {
625
"log_exit_status", T_FLAG,
626
N_("Log the exit status of commands"),
627
NULL,
628
}, {
629
"intercept_authenticate", T_FLAG,
630
N_("Subsequent commands in an intercepted session must be authenticated"),
631
NULL,
632
}, {
633
"intercept_allow_setid", T_FLAG,
634
N_("Allow an intercepted command to run set setuid or setgid programs"),
635
NULL,
636
}, {
637
"rlimit_as", T_RLIMIT|T_BOOL,
638
N_("The maximum size to which the process's address space may grow (in bytes): %s"),
639
NULL,
640
}, {
641
"rlimit_core", T_RLIMIT|T_BOOL,
642
N_("The largest size core dump file that may be created (in bytes): %s"),
643
NULL,
644
}, {
645
"rlimit_cpu", T_RLIMIT|T_BOOL,
646
N_("The maximum amount of CPU time that the process may use (in seconds): %s"),
647
NULL,
648
}, {
649
"rlimit_data", T_RLIMIT|T_BOOL,
650
N_("The maximum size of the data segment for the process (in bytes): %s"),
651
NULL,
652
}, {
653
"rlimit_fsize", T_RLIMIT|T_BOOL,
654
N_("The largest size file that the process may create (in bytes): %s"),
655
NULL,
656
}, {
657
"rlimit_locks", T_RLIMIT|T_BOOL,
658
N_("The maximum number of locks that the process may establish: %s"),
659
NULL,
660
}, {
661
"rlimit_memlock", T_RLIMIT|T_BOOL,
662
N_("The maximum size that the process may lock in memory (in bytes): %s"),
663
NULL,
664
}, {
665
"rlimit_nofile", T_RLIMIT|T_BOOL,
666
N_("The maximum number of files that the process may have open: %s"),
667
NULL,
668
}, {
669
"rlimit_nproc", T_RLIMIT|T_BOOL,
670
N_("The maximum number of processes that the user may run simultaneously: %s"),
671
NULL,
672
}, {
673
"rlimit_rss", T_RLIMIT|T_BOOL,
674
N_("The maximum size to which the process's resident set size may grow (in bytes): %s"),
675
NULL,
676
}, {
677
"rlimit_stack", T_RLIMIT|T_BOOL,
678
N_("The maximum size to which the process's stack may grow (in bytes): %s"),
679
NULL,
680
}, {
681
"noninteractive_auth", T_FLAG,
682
N_("Attempt authentication even when in non-interactive mode"),
683
NULL,
684
}, {
685
"log_passwords", T_FLAG,
686
N_("Store plaintext passwords in I/O log input"),
687
NULL,
688
}, {
689
"passprompt_regex", T_LIST|T_SPACE|T_BOOL,
690
N_("List of regular expressions to use when matching a password prompt"),
691
NULL,
692
}, {
693
"intercept_type", T_TUPLE,
694
N_("The mechanism used by the intercept and log_subcmds options: %s"),
695
def_data_intercept_type,
696
}, {
697
"intercept_verify", T_FLAG,
698
N_("Attempt to verify the command and arguments after execution"),
699
NULL,
700
}, {
701
"apparmor_profile", T_STR,
702
N_("AppArmor profile to use in the new security context: %s"),
703
NULL,
704
}, {
705
"cmddenial_message", T_STR,
706
N_("Command denial message: %s"),
707
NULL,
708
}, {
709
NULL, 0, NULL
710
}
711
};
712
713