head	1.10;
access;
symbols;
locks; strict;
comment	@# @;


1.10
date	2009.03.30.15.11.48;	author flameeyes;	state dead;
branches;
next	1.9;
commitid	34a749d0e1324567;

1.9
date	2006.11.15.21.29.29;	author taviso;	state Exp;
branches;
next	1.8;
commitid	250c455b86b84567;

1.8
date	2006.11.12.11.50.16;	author taviso;	state Exp;
branches;
next	1.7;
commitid	6c4145570a774567;

1.7
date	2005.06.09.09.10.19;	author taviso;	state Exp;
branches;
next	1.6;

1.6
date	2005.06.06.22.57.30;	author taviso;	state Exp;
branches;
next	1.5;

1.5
date	2005.06.05.19.46.28;	author taviso;	state Exp;
branches;
next	1.4;

1.4
date	2005.01.09.18.54.02;	author taviso;	state Exp;
branches;
next	1.3;

1.3
date	2004.12.18.11.22.28;	author taviso;	state Exp;
branches;
next	1.2;

1.2
date	2004.11.13.09.44.29;	author taviso;	state Exp;
branches;
next	1.1;

1.1
date	2004.11.11.23.15.15;	author taviso;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	2005.11.30.10.00.05;	author chriswhite;	state Exp;
branches;
next	;


desc
@@


1.10
log
@Remove old version.
(Portage version: 2.2_rc27/cvs/Linux x86_64)
@
text
@# sudoers file.
#
# This file MUST be edited with the 'visudo' command as root.
#
# See the sudoers man page for the details on how to write a sudoers file.
#

# Host alias specification

# User alias specification

# Cmnd alias specification

# Defaults specification

# Reset environment by default
Defaults	env_reset

# Uncomment to allow users in group wheel to export variables
# Defaults:%wheel	!env_reset

# Allow users in group users to export specific variables
# Defaults:%users	env_keep=TZ

# Allow specific user to bypass env_delete for TERMCAP
# Defaults:user     env_delete-=TERMCAP

# Set default EDITOR to vi, and do not allow visudo to use EDITOR/VISUAL.
# Defaults	editor=/usr/bin/vim, !env_editor

# Runas alias specification

# *** REMEMBER ***************************************************
# * GIVING SUDO ACCESS TO USERS ALLOWS THEM TO RUN THE SPECIFIED *
# * COMMANDS WITH ELEVATED PRIVILEGES.                           *
# *                                                              *
# * NEVER PERMIT UNTRUSTED USERS TO ACCESS SUDO.                 *
# ****************************************************************

# User privilege specification
root	ALL=(ALL) ALL

# Uncomment to allow people in group wheel to run all commands
# %wheel	ALL=(ALL)	ALL

# Same thing without a password
# %wheel	ALL=(ALL)	NOPASSWD: ALL

# Users in group www are allowed to edit httpd.conf using sudoedit, or
# sudo -e, without a password.
# %www		ALL=(ALL)	NOPASSWD: sudoedit /etc/httpd.conf

# Samples
# %users  ALL=/bin/mount /cdrom,/bin/umount /cdrom
# %users  localhost=/sbin/shutdown -h now
@


1.9
log
@fix #155298, wrong path in samples for mount command.
(Portage version: 2.1.1-r1)
@
text
@@


1.8
log
@multiple sudoedit targets dont work, correct example.
(Portage version: 2.1.1-r1)
@
text
@d54 1
a54 1
# %users  ALL=/sbin/mount /cdrom,/sbin/umount /cdrom
@


1.7
log
@add examples
(Portage version: 2.0.51.19)
@
text
@d49 3
a51 3
# Users in group www are allowed to  edit httpd.conf and ftpd.conf
# using sudoedit, or sudo -e, without a password.
# %www		ALL=(ALL)	NOPASSWD: sudoedit /etc/httpd.conf, /etc/ftpd.conf
@


1.6
log
@remove stale patch.
(Portage version: 2.0.51.19)
@
text
@d28 3
d49 4
@


1.5
log
@bump, +secure_path now enabled.
(Portage version: 2.0.51.19)
@
text
@d18 2
a19 1
# Uncomment to allow people in group wheel to export variables
d22 1
a22 1
# Allow people in group users to export specific variables
d25 3
@


1.4
log
@reword warning
@
text
@d30 1
a30 2
# * ONLY PERMIT SUDO ACCESS SPARINGLY, AND NEVER ALLOW ACCESS TO *
# * UNTRUSTED USERS.                                             *
@


1.3
log
@add sudoers warnings
@
text
@d30 2
a31 6
# * ONLY PERMIT SUDO ACCESS SPARINGLY.                           *
# *                                                              *
# * NEVER ALLOW ACCESS TO UNTRUSTED USERS.                       *
# *                                                              *
# * IF YOU DON'T KNOW A COMMAND IS SAFE TO USE WITH SUDO, ASSUME *
# * IT ISNT, AND PERMIT ACCESS ACCORDINGLY.                      *
@


1.2
log
@new version
@
text
@d26 12
@


1.1
log
@add env_reset to the default
@
text
@d22 1
a22 1
# Defaults:%users	env_keep=POSIXLY_CORRECT
@


1.1.1.1
log
@*** empty log message ***
@
text
@d18 1
a18 2

# Uncomment to allow users in group wheel to export variables
d21 2
a22 8
# Allow users in group users to export specific variables
# Defaults:%users	env_keep=TZ

# Allow specific user to bypass env_delete for TERMCAP
# Defaults:user     env_delete-=TERMCAP

# Set default EDITOR to vi, and do not allow visudo to use EDITOR/VISUAL.
# Defaults	editor=/usr/bin/vim, !env_editor
a25 7
# *** REMEMBER ***************************************************
# * GIVING SUDO ACCESS TO USERS ALLOWS THEM TO RUN THE SPECIFIED *
# * COMMANDS WITH ELEVATED PRIVILEGES.                           *
# *                                                              *
# * NEVER PERMIT UNTRUSTED USERS TO ACCESS SUDO.                 *
# ****************************************************************

a34 4
# Users in group www are allowed to  edit httpd.conf and ftpd.conf
# using sudoedit, or sudo -e, without a password.
# %www		ALL=(ALL)	NOPASSWD: sudoedit /etc/httpd.conf, /etc/ftpd.conf

@


