2000-12-31 01:38:37 +00:00
|
|
|
#
|
|
|
|
# Format:
|
|
|
|
#
|
|
|
|
# var_name
|
|
|
|
# TYPE
|
|
|
|
# description (or NULL)
|
2003-12-30 22:31:30 +00:00
|
|
|
# array of struct def_values if TYPE == T_TUPLE
|
2000-12-31 01:38:37 +00:00
|
|
|
#
|
2004-11-26 19:21:08 +00:00
|
|
|
# NOTE: for tuples that can be used in a boolean context the first
|
|
|
|
# value corresponds to boolean FALSE and the second to TRUE.
|
|
|
|
#
|
2000-12-31 01:38:37 +00:00
|
|
|
|
|
|
|
syslog
|
|
|
|
T_LOGFAC|T_BOOL
|
|
|
|
"Syslog facility if syslog is being used for logging: %s"
|
|
|
|
syslog_goodpri
|
2016-11-30 16:26:10 -07:00
|
|
|
T_LOGPRI|T_BOOL
|
2000-12-31 01:38:37 +00:00
|
|
|
"Syslog priority to use when user authenticates successfully: %s"
|
|
|
|
syslog_badpri
|
2016-11-30 16:26:10 -07:00
|
|
|
T_LOGPRI|T_BOOL
|
2000-12-31 01:38:37 +00:00
|
|
|
"Syslog priority to use when user authenticates unsuccessfully: %s"
|
|
|
|
long_otp_prompt
|
|
|
|
T_FLAG
|
|
|
|
"Put OTP prompt on its own line"
|
|
|
|
ignore_dot
|
|
|
|
T_FLAG
|
|
|
|
"Ignore '.' in $PATH"
|
|
|
|
mail_always
|
|
|
|
T_FLAG
|
|
|
|
"Always send mail when sudo is run"
|
2001-11-12 18:13:03 +00:00
|
|
|
mail_badpass
|
|
|
|
T_FLAG
|
|
|
|
"Send mail if user authentication fails"
|
2000-12-31 01:38:37 +00:00
|
|
|
mail_no_user
|
|
|
|
T_FLAG
|
|
|
|
"Send mail if the user is not in sudoers"
|
|
|
|
mail_no_host
|
|
|
|
T_FLAG
|
|
|
|
"Send mail if the user is not in sudoers for this host"
|
|
|
|
mail_no_perms
|
|
|
|
T_FLAG
|
|
|
|
"Send mail if the user is not allowed to run a command"
|
2015-02-15 20:30:11 -07:00
|
|
|
mail_all_cmnds
|
|
|
|
T_FLAG
|
|
|
|
"Send mail if the user tries to run a command"
|
2000-12-31 01:38:37 +00:00
|
|
|
tty_tickets
|
|
|
|
T_FLAG
|
|
|
|
"Use a separate timestamp for each user/tty combo"
|
|
|
|
lecture
|
2003-12-30 22:31:30 +00:00
|
|
|
T_TUPLE|T_BOOL
|
2000-12-31 01:38:37 +00:00
|
|
|
"Lecture user the first time they run sudo"
|
2003-12-30 22:31:30 +00:00
|
|
|
never once always
|
2004-01-05 01:12:22 +00:00
|
|
|
lecture_file
|
|
|
|
T_STR|T_PATH|T_BOOL
|
2004-01-05 21:10:19 +00:00
|
|
|
"File containing the sudo lecture: %s"
|
2000-12-31 01:38:37 +00:00
|
|
|
authenticate
|
|
|
|
T_FLAG
|
|
|
|
"Require users to authenticate by default"
|
|
|
|
root_sudo
|
|
|
|
T_FLAG
|
|
|
|
"Root may run sudo"
|
|
|
|
log_host
|
|
|
|
T_FLAG
|
|
|
|
"Log the hostname in the (non-syslog) log file"
|
|
|
|
log_year
|
|
|
|
T_FLAG
|
|
|
|
"Log the year in the (non-syslog) log file"
|
|
|
|
shell_noargs
|
|
|
|
T_FLAG
|
|
|
|
"If sudo is invoked with no arguments, start a shell"
|
|
|
|
set_home
|
|
|
|
T_FLAG
|
|
|
|
"Set $HOME to the target user when starting a shell with -s"
|
|
|
|
always_set_home
|
|
|
|
T_FLAG
|
|
|
|
"Always set $HOME to the target user's home directory"
|
|
|
|
path_info
|
|
|
|
T_FLAG
|
|
|
|
"Allow some information gathering to give useful error messages"
|
|
|
|
fqdn
|
|
|
|
T_FLAG
|
|
|
|
"Require fully-qualified hostnames in the sudoers file"
|
|
|
|
insults
|
|
|
|
T_FLAG
|
|
|
|
"Insult the user when they enter an incorrect password"
|
|
|
|
requiretty
|
|
|
|
T_FLAG
|
|
|
|
"Only allow the user to run sudo if they have a tty"
|
|
|
|
env_editor
|
|
|
|
T_FLAG
|
|
|
|
"Visudo will honor the EDITOR environment variable"
|
|
|
|
rootpw
|
|
|
|
T_FLAG
|
|
|
|
"Prompt for root's password, not the users's"
|
|
|
|
runaspw
|
|
|
|
T_FLAG
|
|
|
|
"Prompt for the runas_default user's password, not the users's"
|
|
|
|
targetpw
|
|
|
|
T_FLAG
|
|
|
|
"Prompt for the target user's password, not the users's"
|
|
|
|
use_loginclass
|
|
|
|
T_FLAG
|
|
|
|
"Apply defaults in the target user's login class if there is one"
|
|
|
|
set_logname
|
|
|
|
T_FLAG
|
|
|
|
"Set the LOGNAME and USER environment variables"
|
|
|
|
stay_setuid
|
|
|
|
T_FLAG
|
|
|
|
"Only set the effective uid to the target user, not the real uid"
|
2001-12-15 00:24:27 +00:00
|
|
|
preserve_groups
|
|
|
|
T_FLAG
|
|
|
|
"Don't initialize the group vector to that of the target user"
|
2000-12-31 01:38:37 +00:00
|
|
|
loglinelen
|
2001-11-02 20:51:43 +00:00
|
|
|
T_UINT|T_BOOL
|
2013-12-11 14:43:04 -07:00
|
|
|
"Length at which to wrap log file lines (0 for no wrap): %u"
|
2000-12-31 01:38:37 +00:00
|
|
|
timestamp_timeout
|
2018-01-22 12:18:48 -07:00
|
|
|
T_TIMESPEC|T_BOOL
|
2009-12-08 21:49:53 +00:00
|
|
|
"Authentication timestamp timeout: %.1f minutes"
|
2000-12-31 01:38:37 +00:00
|
|
|
passwd_timeout
|
2018-01-22 12:18:48 -07:00
|
|
|
T_TIMESPEC|T_BOOL
|
2009-12-08 21:49:53 +00:00
|
|
|
"Password prompt timeout: %.1f minutes"
|
2000-12-31 01:38:37 +00:00
|
|
|
passwd_tries
|
2001-11-02 20:51:43 +00:00
|
|
|
T_UINT
|
2013-12-11 14:43:04 -07:00
|
|
|
"Number of tries to enter a password: %u"
|
2000-12-31 01:38:37 +00:00
|
|
|
umask
|
|
|
|
T_MODE|T_BOOL
|
|
|
|
"Umask to use or 0777 to use user's: 0%o"
|
|
|
|
logfile
|
|
|
|
T_STR|T_BOOL|T_PATH
|
|
|
|
"Path to log file: %s"
|
|
|
|
mailerpath
|
|
|
|
T_STR|T_BOOL|T_PATH
|
|
|
|
"Path to mail program: %s"
|
|
|
|
mailerflags
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Flags for mail program: %s"
|
|
|
|
mailto
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Address to send mail to: %s"
|
2008-03-05 21:52:19 +00:00
|
|
|
mailfrom
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Address to send mail from: %s"
|
2000-12-31 01:38:37 +00:00
|
|
|
mailsub
|
|
|
|
T_STR
|
|
|
|
"Subject line for mail messages: %s"
|
|
|
|
badpass_message
|
|
|
|
T_STR
|
|
|
|
"Incorrect password message: %s"
|
2014-01-30 15:50:40 -07:00
|
|
|
lecture_status_dir
|
|
|
|
T_STR|T_PATH
|
|
|
|
"Path to lecture status dir: %s"
|
2000-12-31 01:38:37 +00:00
|
|
|
timestampdir
|
|
|
|
T_STR|T_PATH
|
|
|
|
"Path to authentication timestamp dir: %s"
|
2002-05-03 22:47:29 +00:00
|
|
|
timestampowner
|
|
|
|
T_STR
|
|
|
|
"Owner of the authentication timestamp dir: %s"
|
2000-12-31 01:38:37 +00:00
|
|
|
exempt_group
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Users in this group are exempt from password and PATH requirements: %s"
|
|
|
|
passprompt
|
|
|
|
T_STR
|
|
|
|
"Default password prompt: %s"
|
2007-12-02 17:13:48 +00:00
|
|
|
passprompt_override
|
|
|
|
T_FLAG
|
|
|
|
"If set, passprompt will override system prompt in all cases."
|
2000-12-31 01:38:37 +00:00
|
|
|
runas_default
|
|
|
|
T_STR
|
|
|
|
"Default user to run commands as: %s"
|
2004-11-12 16:19:19 +00:00
|
|
|
secure_path
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Value to override user's $PATH with: %s"
|
2000-12-31 01:38:37 +00:00
|
|
|
editor
|
|
|
|
T_STR|T_PATH
|
|
|
|
"Path to the editor for use by visudo: %s"
|
|
|
|
listpw
|
2003-12-30 22:31:30 +00:00
|
|
|
T_TUPLE|T_BOOL
|
2000-12-31 01:38:37 +00:00
|
|
|
"When to require a password for 'list' pseudocommand: %s"
|
2003-12-30 22:31:30 +00:00
|
|
|
never any all always
|
2000-12-31 01:38:37 +00:00
|
|
|
verifypw
|
2003-12-30 22:31:30 +00:00
|
|
|
T_TUPLE|T_BOOL
|
2000-12-31 01:38:37 +00:00
|
|
|
"When to require a password for 'verify' pseudocommand: %s"
|
2004-11-28 21:05:38 +00:00
|
|
|
never all any always
|
2004-01-05 02:48:09 +00:00
|
|
|
noexec
|
|
|
|
T_FLAG
|
2020-10-30 10:15:30 -06:00
|
|
|
"Preload the sudo_noexec library which replaces the exec functions"
|
2004-12-16 18:33:49 +00:00
|
|
|
ignore_local_sudoers
|
|
|
|
T_FLAG
|
|
|
|
"If LDAP directory is up, do we ignore local sudoers file"
|
|
|
|
closefrom
|
|
|
|
T_INT
|
|
|
|
"File descriptors >= %d will be closed before executing a command"
|
|
|
|
closefrom_override
|
|
|
|
T_FLAG
|
2020-06-24 05:40:18 -06:00
|
|
|
"If set, users may override the value of "closefrom" with the -C option"
|
2007-09-15 20:07:50 +00:00
|
|
|
setenv
|
|
|
|
T_FLAG
|
|
|
|
"Allow users to set arbitrary environment variables"
|
|
|
|
env_reset
|
|
|
|
T_FLAG
|
|
|
|
"Reset the environment to a default set of variables"
|
2004-01-05 21:10:19 +00:00
|
|
|
env_check
|
|
|
|
T_LIST|T_BOOL
|
2020-10-30 10:15:30 -06:00
|
|
|
"Environment variables to check for safety:"
|
2004-01-05 21:10:19 +00:00
|
|
|
env_delete
|
|
|
|
T_LIST|T_BOOL
|
|
|
|
"Environment variables to remove:"
|
|
|
|
env_keep
|
|
|
|
T_LIST|T_BOOL
|
|
|
|
"Environment variables to preserve:"
|
2008-02-09 14:30:06 +00:00
|
|
|
role
|
|
|
|
T_STR
|
2008-03-02 13:38:46 +00:00
|
|
|
"SELinux role to use in the new security context: %s"
|
2008-02-09 14:30:06 +00:00
|
|
|
type
|
|
|
|
T_STR
|
2008-03-02 13:38:46 +00:00
|
|
|
"SELinux type to use in the new security context: %s"
|
2008-05-03 00:53:21 +00:00
|
|
|
env_file
|
|
|
|
T_STR|T_PATH|T_BOOL
|
|
|
|
"Path to the sudo-specific environment file: %s"
|
2017-03-22 13:39:25 -06:00
|
|
|
restricted_env_file
|
|
|
|
T_STR|T_PATH|T_BOOL
|
|
|
|
"Path to the restricted sudo-specific environment file: %s"
|
2008-09-14 00:45:24 +00:00
|
|
|
sudoers_locale
|
|
|
|
T_STR
|
|
|
|
"Locale to use while parsing sudoers: %s"
|
2008-11-07 02:06:48 +00:00
|
|
|
visiblepw
|
|
|
|
T_FLAG
|
2011-12-18 14:20:56 -05:00
|
|
|
"Allow sudo to prompt for a password even if it would be visible"
|
2009-02-15 20:53:49 +00:00
|
|
|
pwfeedback
|
2009-02-08 00:50:48 +00:00
|
|
|
T_FLAG
|
2009-02-15 20:53:49 +00:00
|
|
|
"Provide visual feedback at the password prompt when there is user input"
|
2009-02-10 19:04:02 +00:00
|
|
|
fast_glob
|
2009-02-10 13:09:14 +00:00
|
|
|
T_FLAG
|
2009-02-10 19:04:02 +00:00
|
|
|
"Use faster globbing that is less accurate but does not access the filesystem"
|
2009-02-21 22:03:47 +00:00
|
|
|
umask_override
|
|
|
|
T_FLAG
|
|
|
|
"The umask specified in sudoers will override the user's, even if it is more permissive"
|
2010-05-30 10:31:38 -04:00
|
|
|
log_input
|
2009-08-06 00:04:14 +00:00
|
|
|
T_FLAG
|
2010-05-30 10:31:38 -04:00
|
|
|
"Log user's input for the command being run"
|
|
|
|
log_output
|
2009-12-14 01:49:50 +00:00
|
|
|
T_FLAG
|
2010-05-30 10:31:38 -04:00
|
|
|
"Log the output of the command being run"
|
|
|
|
compress_io
|
|
|
|
T_FLAG
|
|
|
|
"Compress I/O logs using zlib"
|
2010-06-08 11:25:33 -04:00
|
|
|
use_pty
|
|
|
|
T_FLAG
|
|
|
|
"Always run commands in a pseudo-tty"
|
2010-07-02 11:11:25 -04:00
|
|
|
group_plugin
|
|
|
|
T_STR
|
2011-12-20 08:38:47 -05:00
|
|
|
"Plugin for non-Unix group support: %s"
|
2010-12-10 14:14:35 -05:00
|
|
|
iolog_dir
|
|
|
|
T_STR|T_PATH
|
2011-12-20 08:38:47 -05:00
|
|
|
"Directory in which to store input/output logs: %s"
|
2010-12-27 12:18:32 -05:00
|
|
|
iolog_file
|
|
|
|
T_STR
|
2011-12-20 08:38:47 -05:00
|
|
|
"File in which to store the input/output log: %s"
|
2011-03-15 15:53:49 -04:00
|
|
|
set_utmp
|
|
|
|
T_FLAG
|
|
|
|
"Add an entry to the utmp/utmpx file when allocating a pty"
|
|
|
|
utmp_runas
|
|
|
|
T_FLAG
|
|
|
|
"Set the user in utmp to the runas user, not the invoking user"
|
2012-07-26 13:49:21 -04:00
|
|
|
privs
|
|
|
|
T_STR
|
2017-07-20 13:58:54 -06:00
|
|
|
"Set of permitted privileges: %s"
|
2012-07-26 13:49:21 -04:00
|
|
|
limitprivs
|
|
|
|
T_STR
|
2017-07-20 13:58:54 -06:00
|
|
|
"Set of limit privileges: %s"
|
2013-01-11 14:34:09 -05:00
|
|
|
exec_background
|
|
|
|
T_FLAG
|
|
|
|
"Run commands on a pty in the background"
|
2013-08-06 11:01:36 -06:00
|
|
|
pam_service
|
|
|
|
T_STR
|
2017-07-20 13:58:54 -06:00
|
|
|
"PAM service name to use: %s"
|
2013-08-06 11:01:36 -06:00
|
|
|
pam_login_service
|
|
|
|
T_STR
|
2017-07-20 13:58:54 -06:00
|
|
|
"PAM service name to use for login shells: %s"
|
2013-08-06 14:44:21 -06:00
|
|
|
pam_setcred
|
|
|
|
T_FLAG
|
|
|
|
"Attempt to establish PAM credentials for the target user"
|
2013-02-24 06:15:37 -05:00
|
|
|
pam_session
|
|
|
|
T_FLAG
|
|
|
|
"Create a new PAM session for the command to run in"
|
2019-04-29 19:44:13 -06:00
|
|
|
pam_acct_mgmt
|
|
|
|
T_FLAG
|
|
|
|
"Perform PAM account validation management"
|
2013-02-18 15:06:23 -05:00
|
|
|
maxseq
|
2019-10-24 20:04:31 -06:00
|
|
|
T_STR
|
|
|
|
"Maximum I/O log sequence number: %s"
|
2014-02-07 14:58:48 -07:00
|
|
|
use_netgroups
|
|
|
|
T_FLAG
|
|
|
|
"Enable sudoers netgroup support"
|
2015-10-23 14:04:35 -06:00
|
|
|
sudoedit_checkdir
|
|
|
|
T_FLAG
|
2016-01-11 15:09:08 -07:00
|
|
|
"Check parent directories for writability when editing files with sudoedit"
|
2015-08-06 13:20:01 -06:00
|
|
|
sudoedit_follow
|
|
|
|
T_FLAG
|
|
|
|
"Follow symbolic links when editing files with sudoedit"
|
2015-10-24 05:43:07 -06:00
|
|
|
always_query_group_plugin
|
|
|
|
T_FLAG
|
|
|
|
"Query the group plugin for unknown system groups"
|
2016-01-12 14:59:44 -07:00
|
|
|
netgroup_tuple
|
|
|
|
T_FLAG
|
|
|
|
"Match netgroups based on the entire tuple: user, host and domain"
|
2016-08-17 07:22:51 -06:00
|
|
|
ignore_audit_errors
|
|
|
|
T_FLAG
|
|
|
|
"Allow commands to be run even if sudo cannot write to the audit log"
|
|
|
|
ignore_iolog_errors
|
|
|
|
T_FLAG
|
|
|
|
"Allow commands to be run even if sudo cannot write to the I/O log"
|
|
|
|
ignore_logfile_errors
|
|
|
|
T_FLAG
|
|
|
|
"Allow commands to be run even if sudo cannot write to the log file"
|
2016-08-30 13:42:42 -06:00
|
|
|
match_group_by_gid
|
|
|
|
T_FLAG
|
|
|
|
"Resolve groups in sudoers and match on the group ID, not the name"
|
2016-10-18 15:51:47 -06:00
|
|
|
syslog_maxlen
|
|
|
|
T_UINT
|
2017-02-10 15:08:44 -07:00
|
|
|
"Log entries larger than this value will be split into multiple syslog messages: %u"
|
2016-10-29 12:45:55 -06:00
|
|
|
iolog_user
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"User that will own the I/O log files: %s"
|
|
|
|
iolog_group
|
|
|
|
T_STR|T_BOOL
|
|
|
|
"Group that will own the I/O log files: %s"
|
|
|
|
iolog_mode
|
|
|
|
T_MODE
|
|
|
|
"File mode to use for the I/O log files: 0%o"
|
2017-01-22 18:56:16 -08:00
|
|
|
fdexec
|
|
|
|
T_TUPLE|T_BOOL
|
|
|
|
"Execute commands by file descriptor instead of by path: %s"
|
|
|
|
never digest_only always
|
2017-02-06 05:41:57 -07:00
|
|
|
ignore_unknown_defaults
|
|
|
|
T_FLAG
|
|
|
|
"Ignore unknown Defaults entries in sudoers instead of producing a warning"
|
2017-02-14 15:56:34 -07:00
|
|
|
command_timeout
|
|
|
|
T_TIMEOUT|T_BOOL
|
|
|
|
"Time in seconds after which the command will be terminated: %u"
|
2017-02-16 09:58:18 -07:00
|
|
|
user_command_timeouts
|
|
|
|
T_FLAG
|
|
|
|
"Allow the user to specify a timeout on the command line"
|
2017-03-20 10:25:58 -06:00
|
|
|
iolog_flush
|
|
|
|
T_FLAG
|
|
|
|
"Flush I/O log data to disk immediately instead of buffering it"
|
2017-07-20 16:33:12 -06:00
|
|
|
syslog_pid
|
|
|
|
T_FLAG
|
|
|
|
"Include the process ID when logging via syslog"
|
2017-08-01 16:14:54 -06:00
|
|
|
timestamp_type
|
|
|
|
T_TUPLE
|
|
|
|
"Type of authentication timestamp record: %s"
|
2017-12-20 16:19:54 -07:00
|
|
|
global ppid tty kernel
|
2017-12-11 12:43:58 -07:00
|
|
|
authfail_message
|
|
|
|
T_STR
|
|
|
|
"Authentication failure message: %s"
|
2018-03-05 10:42:02 -07:00
|
|
|
case_insensitive_user
|
|
|
|
T_FLAG
|
|
|
|
"Ignore case when matching user names"
|
|
|
|
case_insensitive_group
|
|
|
|
T_FLAG
|
|
|
|
"Ignore case when matching group names"
|
2019-10-17 13:43:04 -06:00
|
|
|
log_allowed
|
|
|
|
T_FLAG
|
|
|
|
"Log when a command is allowed by sudoers"
|
|
|
|
log_denied
|
|
|
|
T_FLAG
|
|
|
|
"Log when a command is denied by sudoers"
|
2019-11-18 09:39:03 -07:00
|
|
|
log_servers
|
2019-11-15 13:41:51 -07:00
|
|
|
T_LIST|T_BOOL
|
|
|
|
"Sudo log server(s) to connect to with optional port"
|
|
|
|
log_server_timeout
|
|
|
|
T_TIMEOUT|T_BOOL
|
|
|
|
"Sudo log server timeout in seconds: %u"
|
2020-01-21 15:18:27 +01:00
|
|
|
log_server_keepalive
|
|
|
|
T_FLAG
|
|
|
|
"Enable SO_KEEPALIVE socket option on the socket connected to the logserver"
|
2019-11-28 11:16:54 +01:00
|
|
|
log_server_cabundle
|
|
|
|
T_STR|T_BOOL|T_PATH
|
|
|
|
"Path to the audit server's CA bundle file: %s"
|
|
|
|
log_server_peer_cert
|
|
|
|
T_STR|T_BOOL|T_PATH
|
|
|
|
"Path to the sudoers certificate file: %s"
|
|
|
|
log_server_peer_key
|
|
|
|
T_STR|T_BOOL|T_PATH
|
|
|
|
"Path to the sudoers private key file: %s"
|
2020-05-04 11:28:54 -06:00
|
|
|
log_server_verify
|
|
|
|
T_FLAG
|
|
|
|
"Verify that the log server's certificate is valid"
|
2019-12-09 17:14:06 -07:00
|
|
|
runas_allow_unknown_id
|
|
|
|
T_FLAG
|
|
|
|
"Allow the use of unknown runas user and/or group ID"
|
2019-12-09 19:29:45 -07:00
|
|
|
runas_check_shell
|
|
|
|
T_FLAG
|
|
|
|
"Only permit running commands as a user with a valid shell"
|
2020-03-01 13:37:00 -07:00
|
|
|
pam_ruser
|
|
|
|
T_FLAG
|
|
|
|
"Set the pam remote user to the user running sudo"
|
|
|
|
pam_rhost
|
|
|
|
T_FLAG
|
|
|
|
"Set the pam remote host to the local host name"
|
2020-09-01 06:26:00 -06:00
|
|
|
runcwd
|
2020-09-01 14:10:02 -06:00
|
|
|
T_STR|T_BOOL|T_CHPATH
|
2020-09-01 06:26:00 -06:00
|
|
|
"Working directory to change to before executing the command: %s"
|
|
|
|
runchroot
|
2020-09-01 14:10:02 -06:00
|
|
|
T_STR|T_BOOL|T_CHPATH
|
2020-09-01 06:26:00 -06:00
|
|
|
"Root directory to change to before executing the command: %s"
|
2020-10-27 15:26:02 -06:00
|
|
|
log_format
|
|
|
|
T_TUPLE
|
|
|
|
"The format of logs to produce: %s"
|
|
|
|
sudo json
|
2021-01-08 19:29:17 -07:00
|
|
|
selinux
|
|
|
|
T_FLAG
|
|
|
|
"Enable SELinux RBAC support"
|
2021-02-16 13:20:02 -07:00
|
|
|
admin_flag
|
|
|
|
T_STR|T_BOOL|T_CHPATH
|
|
|
|
"Path to the file that is created the first time sudo is run: %s"
|