[BACK]Return to def_data.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / sudo

Diff for /src/usr.bin/sudo/Attic/def_data.c between version 1.1 and 1.2

version 1.1, 2004/01/15 21:32:03 version 1.2, 2004/09/28 15:10:51
Line 1 
Line 1 
   static struct def_values def_data_lecture[] = {
       { "never", never },
       { "once", once },
       { "always", always },
       { NULL, 0 },
   };
   
   static struct def_values def_data_listpw[] = {
       { "never", never },
       { "any", any },
       { "all", all },
       { "always", always },
       { NULL, 0 },
   };
   
   static struct def_values def_data_verifypw[] = {
       { "never", never },
       { "any", any },
       { "all", all },
       { "always", always },
       { NULL, 0 },
   };
   
 struct sudo_defs_types sudo_defs_table[] = {  struct sudo_defs_types sudo_defs_table[] = {
     {      {
         "syslog_ifac", T_UINT,  
         NULL  
     }, {  
         "syslog_igoodpri", T_UINT,  
         NULL  
     }, {  
         "syslog_ibadpri", T_UINT,  
         NULL  
     }, {  
         "syslog", T_LOGFAC|T_BOOL,          "syslog", T_LOGFAC|T_BOOL,
         "Syslog facility if syslog is being used for logging: %s"          "Syslog facility if syslog is being used for logging: %s",
           NULL,
     }, {      }, {
         "syslog_goodpri", T_LOGPRI,          "syslog_goodpri", T_LOGPRI,
         "Syslog priority to use when user authenticates successfully: %s"          "Syslog priority to use when user authenticates successfully: %s",
           NULL,
     }, {      }, {
         "syslog_badpri", T_LOGPRI,          "syslog_badpri", T_LOGPRI,
         "Syslog priority to use when user authenticates unsuccessfully: %s"          "Syslog priority to use when user authenticates unsuccessfully: %s",
           NULL,
     }, {      }, {
         "long_otp_prompt", T_FLAG,          "long_otp_prompt", T_FLAG,
         "Put OTP prompt on its own line"          "Put OTP prompt on its own line",
           NULL,
     }, {      }, {
         "ignore_dot", T_FLAG,          "ignore_dot", T_FLAG,
         "Ignore '.' in $PATH"          "Ignore '.' in $PATH",
           NULL,
     }, {      }, {
         "mail_always", T_FLAG,          "mail_always", T_FLAG,
         "Always send mail when sudo is run"          "Always send mail when sudo is run",
           NULL,
     }, {      }, {
         "mail_badpass", T_FLAG,          "mail_badpass", T_FLAG,
         "Send mail if user authentication fails"          "Send mail if user authentication fails",
           NULL,
     }, {      }, {
         "mail_no_user", T_FLAG,          "mail_no_user", T_FLAG,
         "Send mail if the user is not in sudoers"          "Send mail if the user is not in sudoers",
           NULL,
     }, {      }, {
         "mail_no_host", T_FLAG,          "mail_no_host", T_FLAG,
         "Send mail if the user is not in sudoers for this host"          "Send mail if the user is not in sudoers for this host",
           NULL,
     }, {      }, {
         "mail_no_perms", T_FLAG,          "mail_no_perms", T_FLAG,
         "Send mail if the user is not allowed to run a command"          "Send mail if the user is not allowed to run a command",
           NULL,
     }, {      }, {
         "tty_tickets", T_FLAG,          "tty_tickets", T_FLAG,
         "Use a separate timestamp for each user/tty combo"          "Use a separate timestamp for each user/tty combo",
           NULL,
     }, {      }, {
         "lecture", T_FLAG,          "lecture", T_TUPLE|T_BOOL,
         "Lecture user the first time they run sudo"          "Lecture user the first time they run sudo",
           def_data_lecture,
     }, {      }, {
           "lecture_file", T_STR|T_PATH|T_BOOL,
           "File containing the sudo lecture: %s",
           NULL,
       }, {
         "authenticate", T_FLAG,          "authenticate", T_FLAG,
         "Require users to authenticate by default"          "Require users to authenticate by default",
           NULL,
     }, {      }, {
         "root_sudo", T_FLAG,          "root_sudo", T_FLAG,
         "Root may run sudo"          "Root may run sudo",
           NULL,
     }, {      }, {
         "log_host", T_FLAG,          "log_host", T_FLAG,
         "Log the hostname in the (non-syslog) log file"          "Log the hostname in the (non-syslog) log file",
           NULL,
     }, {      }, {
         "log_year", T_FLAG,          "log_year", T_FLAG,
         "Log the year in the (non-syslog) log file"          "Log the year in the (non-syslog) log file",
           NULL,
     }, {      }, {
         "shell_noargs", T_FLAG,          "shell_noargs", T_FLAG,
         "If sudo is invoked with no arguments, start a shell"          "If sudo is invoked with no arguments, start a shell",
           NULL,
     }, {      }, {
         "set_home", T_FLAG,          "set_home", T_FLAG,
         "Set $HOME to the target user when starting a shell with -s"          "Set $HOME to the target user when starting a shell with -s",
           NULL,
     }, {      }, {
         "always_set_home", T_FLAG,          "always_set_home", T_FLAG,
         "Always set $HOME to the target user's home directory"          "Always set $HOME to the target user's home directory",
           NULL,
     }, {      }, {
         "path_info", T_FLAG,          "path_info", T_FLAG,
         "Allow some information gathering to give useful error messages"          "Allow some information gathering to give useful error messages",
           NULL,
     }, {      }, {
         "fqdn", T_FLAG,          "fqdn", T_FLAG,
         "Require fully-qualified hostnames in the sudoers file"          "Require fully-qualified hostnames in the sudoers file",
           NULL,
     }, {      }, {
         "insults", T_FLAG,          "insults", T_FLAG,
         "Insult the user when they enter an incorrect password"          "Insult the user when they enter an incorrect password",
           NULL,
     }, {      }, {
         "requiretty", T_FLAG,          "requiretty", T_FLAG,
         "Only allow the user to run sudo if they have a tty"          "Only allow the user to run sudo if they have a tty",
           NULL,
     }, {      }, {
         "env_editor", T_FLAG,          "env_editor", T_FLAG,
         "Visudo will honor the EDITOR environment variable"          "Visudo will honor the EDITOR environment variable",
           NULL,
     }, {      }, {
         "rootpw", T_FLAG,          "rootpw", T_FLAG,
         "Prompt for root's password, not the users's"          "Prompt for root's password, not the users's",
           NULL,
     }, {      }, {
         "runaspw", T_FLAG,          "runaspw", T_FLAG,
         "Prompt for the runas_default user's password, not the users's"          "Prompt for the runas_default user's password, not the users's",
           NULL,
     }, {      }, {
         "targetpw", T_FLAG,          "targetpw", T_FLAG,
         "Prompt for the target user's password, not the users's"          "Prompt for the target user's password, not the users's",
           NULL,
     }, {      }, {
         "use_loginclass", T_FLAG,          "use_loginclass", T_FLAG,
         "Apply defaults in the target user's login class if there is one"          "Apply defaults in the target user's login class if there is one",
           NULL,
     }, {      }, {
         "set_logname", T_FLAG,          "set_logname", T_FLAG,
         "Set the LOGNAME and USER environment variables"          "Set the LOGNAME and USER environment variables",
           NULL,
     }, {      }, {
         "stay_setuid", T_FLAG,          "stay_setuid", T_FLAG,
         "Only set the effective uid to the target user, not the real uid"          "Only set the effective uid to the target user, not the real uid",
           NULL,
     }, {      }, {
         "env_reset", T_FLAG,          "env_reset", T_FLAG,
         "Reset the environment to a default set of variables"          "Reset the environment to a default set of variables",
           NULL,
     }, {      }, {
         "preserve_groups", T_FLAG,          "preserve_groups", T_FLAG,
         "Don't initialize the group vector to that of the target user"          "Don't initialize the group vector to that of the target user",
           NULL,
     }, {      }, {
         "loglinelen", T_UINT|T_BOOL,          "loglinelen", T_UINT|T_BOOL,
         "Length at which to wrap log file lines (0 for no wrap): %d"          "Length at which to wrap log file lines (0 for no wrap): %d",
           NULL,
     }, {      }, {
         "timestamp_timeout", T_INT|T_BOOL,          "timestamp_timeout", T_INT|T_BOOL,
         "Authentication timestamp timeout: %d minutes"          "Authentication timestamp timeout: %d minutes",
           NULL,
     }, {      }, {
         "passwd_timeout", T_UINT|T_BOOL,          "passwd_timeout", T_UINT|T_BOOL,
         "Password prompt timeout: %d minutes"          "Password prompt timeout: %d minutes",
           NULL,
     }, {      }, {
         "passwd_tries", T_UINT,          "passwd_tries", T_UINT,
         "Number of tries to enter a password: %d"          "Number of tries to enter a password: %d",
           NULL,
     }, {      }, {
         "umask", T_MODE|T_BOOL,          "umask", T_MODE|T_BOOL,
         "Umask to use or 0777 to use user's: 0%o"          "Umask to use or 0777 to use user's: 0%o",
           NULL,
     }, {      }, {
         "logfile", T_STR|T_BOOL|T_PATH,          "logfile", T_STR|T_BOOL|T_PATH,
         "Path to log file: %s"          "Path to log file: %s",
           NULL,
     }, {      }, {
         "mailerpath", T_STR|T_BOOL|T_PATH,          "mailerpath", T_STR|T_BOOL|T_PATH,
         "Path to mail program: %s"          "Path to mail program: %s",
           NULL,
     }, {      }, {
         "mailerflags", T_STR|T_BOOL,          "mailerflags", T_STR|T_BOOL,
         "Flags for mail program: %s"          "Flags for mail program: %s",
           NULL,
     }, {      }, {
         "mailto", T_STR|T_BOOL,          "mailto", T_STR|T_BOOL,
         "Address to send mail to: %s"          "Address to send mail to: %s",
           NULL,
     }, {      }, {
         "mailsub", T_STR,          "mailsub", T_STR,
         "Subject line for mail messages: %s"          "Subject line for mail messages: %s",
           NULL,
     }, {      }, {
         "badpass_message", T_STR,          "badpass_message", T_STR,
         "Incorrect password message: %s"          "Incorrect password message: %s",
           NULL,
     }, {      }, {
         "timestampdir", T_STR|T_PATH,          "timestampdir", T_STR|T_PATH,
         "Path to authentication timestamp dir: %s"          "Path to authentication timestamp dir: %s",
           NULL,
     }, {      }, {
         "timestampowner", T_STR,          "timestampowner", T_STR,
         "Owner of the authentication timestamp dir: %s"          "Owner of the authentication timestamp dir: %s",
           NULL,
     }, {      }, {
         "exempt_group", T_STR|T_BOOL,          "exempt_group", T_STR|T_BOOL,
         "Users in this group are exempt from password and PATH requirements: %s"          "Users in this group are exempt from password and PATH requirements: %s",
           NULL,
     }, {      }, {
         "passprompt", T_STR,          "passprompt", T_STR,
         "Default password prompt: %s"          "Default password prompt: %s",
           NULL,
     }, {      }, {
         "runas_default", T_STR,          "runas_default", T_STR,
         "Default user to run commands as: %s"          "Default user to run commands as: %s",
           NULL,
           set_runaspw,
     }, {      }, {
         "editor", T_STR|T_PATH,          "editor", T_STR|T_PATH,
         "Path to the editor for use by visudo: %s"          "Path to the editor for use by visudo: %s",
           NULL,
     }, {      }, {
         "env_check", T_LIST|T_BOOL,          "listpw", T_TUPLE|T_BOOL,
         "Environment variables to check for sanity:"          "When to require a password for 'list' pseudocommand: %s",
           def_data_listpw,
     }, {      }, {
         "env_delete", T_LIST|T_BOOL,          "verifypw", T_TUPLE|T_BOOL,
         "Environment variables to remove:"          "When to require a password for 'verify' pseudocommand: %s",
           def_data_verifypw,
     }, {      }, {
         "env_keep", T_LIST|T_BOOL,          "noexec", T_FLAG,
         "Environment variables to preserve:"          "Preload the dummy exec functions contained in 'noexec_file'",
           NULL,
     }, {      }, {
         "listpw_i", T_UINT,          "noexec_file", T_STR|T_PATH,
         NULL          "File containing dummy exec functions: %s",
           NULL,
     }, {      }, {
         "verifypw_i", T_UINT,          "env_check", T_LIST|T_BOOL,
         NULL          "Environment variables to check for sanity:",
           NULL,
     }, {      }, {
         "listpw", T_PWFLAG,          "env_delete", T_LIST|T_BOOL,
         "When to require a password for 'list' pseudocommand: %s"          "Environment variables to remove:",
           NULL,
     }, {      }, {
         "verifypw", T_PWFLAG,          "env_keep", T_LIST|T_BOOL,
         "When to require a password for 'verify' pseudocommand: %s"          "Environment variables to preserve:",
           NULL,
       }, {
           "ignore_local_sudoers", T_FLAG,
           "If LDAP directory is up, do we ignore local sudoers file",
           NULL,
     }, {      }, {
         NULL, 0, NULL          NULL, 0, NULL
     }      }

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.2