Enable Fedora 34
This commit is contained in:
		
							
								
								
									
										1
									
								
								templates/Fedora/34/etc/dnf/protected.d/sudo.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								templates/Fedora/34/etc/dnf/protected.d/sudo.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1 @@ | ||||
| sudo | ||||
							
								
								
									
										7
									
								
								templates/Fedora/34/etc/pam.d/sudo
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										7
									
								
								templates/Fedora/34/etc/pam.d/sudo
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,7 @@ | ||||
| #%PAM-1.0 | ||||
| auth       include      system-auth | ||||
| account    include      system-auth | ||||
| password   include      system-auth | ||||
| session    optional     pam_keyinit.so revoke | ||||
| session    required     pam_limits.so | ||||
| session    include      system-auth | ||||
							
								
								
									
										6
									
								
								templates/Fedora/34/etc/pam.d/sudo-i
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								templates/Fedora/34/etc/pam.d/sudo-i
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,6 @@ | ||||
| #%PAM-1.0 | ||||
| auth       include      sudo | ||||
| account    include      sudo | ||||
| password   include      sudo | ||||
| session    optional     pam_keyinit.so force revoke | ||||
| session    include      sudo | ||||
							
								
								
									
										124
									
								
								templates/Fedora/34/etc/sudo.conf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										124
									
								
								templates/Fedora/34/etc/sudo.conf
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,124 @@ | ||||
| # | ||||
| # Default /etc/sudo.conf file | ||||
| # | ||||
| # Sudo plugins: | ||||
| #   Plugin plugin_name plugin_path plugin_options ... | ||||
| # | ||||
| # The plugin_path is relative to /usr/libexec/sudo unless | ||||
| #   fully qualified. | ||||
| # The plugin_name corresponds to a global symbol in the plugin | ||||
| #   that contains the plugin interface structure. | ||||
| # The plugin_options are optional. | ||||
| # | ||||
| # The sudoers plugin is used by default if no Plugin lines are present. | ||||
| #Plugin sudoers_policy sudoers.so | ||||
| #Plugin sudoers_io sudoers.so | ||||
| #Plugin sudoers_audit sudoers.so | ||||
|  | ||||
| # | ||||
| # Sudo askpass: | ||||
| #   Path askpass /path/to/askpass | ||||
| # | ||||
| # An askpass helper program may be specified to provide a graphical | ||||
| # password prompt for "sudo -A" support.  Sudo does not ship with its | ||||
| # own askpass program but can use the OpenSSH askpass. | ||||
| # | ||||
| # Use the OpenSSH askpass | ||||
| #Path askpass /usr/X11R6/bin/ssh-askpass | ||||
| # | ||||
| # Use the Gnome OpenSSH askpass | ||||
| #Path askpass /usr/libexec/openssh/gnome-ssh-askpass | ||||
|  | ||||
| # | ||||
| # Sudo device search path: | ||||
| #   Path devsearch /dev/path1:/dev/path2:/dev | ||||
| # | ||||
| # A colon-separated list of paths to check when searching for a user's | ||||
| # terminal device. | ||||
| # | ||||
| #Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev | ||||
|  | ||||
| # | ||||
| # Sudo noexec: | ||||
| #   Path noexec /path/to/sudo_noexec.so | ||||
| # | ||||
| # Path to a shared library containing replacements for the execv(), | ||||
| # execve() and fexecve() library functions that just return an error. | ||||
| # This is used to implement the "noexec" functionality on systems that | ||||
| # support LD_PRELOAD or its equivalent. | ||||
| # | ||||
| # The compiled-in value is usually sufficient and should only be changed | ||||
| # if you rename or move the sudo_noexec.so file. | ||||
| # | ||||
| #Path noexec /usr/libexec/sudo/sudo_noexec.so | ||||
|  | ||||
| # | ||||
| # Sudo plugin directory: | ||||
| #   Path plugin_dir /path/to/plugins | ||||
| # | ||||
| # The default directory to use when searching for plugins that are | ||||
| # specified without a fully qualified path name. | ||||
| # | ||||
| #Path plugin_dir /usr/libexec/sudo | ||||
|  | ||||
| # | ||||
| # Sudo developer mode: | ||||
| #   Set developer_mode true|false | ||||
| # | ||||
| # Allow loading of plugins that are owned by non-root or are writable | ||||
| # by "group" or "other".  Should only be used during plugin development. | ||||
| #Set developer_mode true | ||||
|  | ||||
| # | ||||
| # Core dumps: | ||||
| #   Set disable_coredump true|false | ||||
| # | ||||
| # By default, sudo disables core dumps while it is executing (they | ||||
| # are re-enabled for the command that is run). | ||||
| # To aid in debugging sudo problems, you may wish to enable core | ||||
| # dumps by setting "disable_coredump" to false. | ||||
| # | ||||
| #Set disable_coredump false | ||||
|  | ||||
| # | ||||
| # User groups: | ||||
| #   Set group_source static|dynamic|adaptive | ||||
| # | ||||
| # Sudo passes the user's group list to the policy plugin. | ||||
| # If the user is a member of the maximum number of groups (usually 16), | ||||
| # sudo will query the group database directly to be sure to include | ||||
| # the full list of groups. | ||||
| # | ||||
| # On some systems, this can be expensive so the behavior is configurable. | ||||
| # The "group_source" setting has three possible values: | ||||
| #   static   - use the user's list of groups returned by the kernel. | ||||
| #   dynamic  - query the group database to find the list of groups. | ||||
| #   adaptive - if user is in less than the maximum number of groups. | ||||
| #	       use the kernel list, else query the group database. | ||||
| # | ||||
| #Set group_source static | ||||
|  | ||||
| # | ||||
| # Sudo interface probing: | ||||
| #   Set probe_interfaces true|false | ||||
| # | ||||
| # By default, sudo will probe the system's network interfaces and | ||||
| # pass the IP address of each enabled interface to the policy plugin. | ||||
| # On systems with a large number of virtual interfaces this may take | ||||
| # a noticeable amount of time. | ||||
| # | ||||
| #Set probe_interfaces false | ||||
|  | ||||
| # | ||||
| # Sudo debug files: | ||||
| #   Debug program /path/to/debug_log subsystem@priority[,subsyste@priority] | ||||
| # | ||||
| # Sudo and related programs support logging debug information to a file. | ||||
| # The program is typically sudo, sudoers.so, sudoreplay or visudo. | ||||
| # | ||||
| # Subsystems vary based on the program; "all" matches all subsystems. | ||||
| # Priority may be crit, err, warn, notice, diag, info, trace or debug. | ||||
| # Multiple subsystem@priority may be specified, separated by a comma. | ||||
| # | ||||
| #Debug sudo /var/log/sudo_debug all@debug | ||||
| #Debug sudoers.so /var/log/sudoers_debug all@debug | ||||
							
								
								
									
										120
									
								
								templates/Fedora/34/etc/sudoers
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										120
									
								
								templates/Fedora/34/etc/sudoers
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,120 @@ | ||||
| ## Sudoers allows particular users to run various commands as | ||||
| ## the root user, without needing the root password. | ||||
| ## | ||||
| ## Examples are provided at the bottom of the file for collections | ||||
| ## of related commands, which can then be delegated out to particular | ||||
| ## users or groups. | ||||
| ##  | ||||
| ## This file must be edited with the 'visudo' command. | ||||
|  | ||||
| ## Host Aliases | ||||
| ## Groups of machines. You may prefer to use hostnames (perhaps using  | ||||
| ## wildcards for entire domains) or IP addresses instead. | ||||
| # Host_Alias     FILESERVERS = fs1, fs2 | ||||
| # Host_Alias     MAILSERVERS = smtp, smtp2 | ||||
|  | ||||
| ## User Aliases | ||||
| ## These aren't often necessary, as you can use regular groups | ||||
| ## (ie, from files, LDAP, NIS, etc) in this file - just use %groupname  | ||||
| ## rather than USERALIAS | ||||
| # User_Alias ADMINS = jsmith, mikem | ||||
|  | ||||
|  | ||||
| ## Command Aliases | ||||
| ## These are groups of related commands... | ||||
|  | ||||
| ## Networking | ||||
| # Cmnd_Alias NETWORKING = /sbin/route, /sbin/ifconfig, /bin/ping, /sbin/dhclient, /usr/bin/net, /sbin/iptables, /usr/bin/rfcomm, /usr/bin/wvdial, /sbin/iwconfig, /sbin/mii-tool | ||||
|  | ||||
| ## Installation and management of software | ||||
| # Cmnd_Alias SOFTWARE = /bin/rpm, /usr/bin/up2date, /usr/bin/yum | ||||
|  | ||||
| ## Services | ||||
| # Cmnd_Alias SERVICES = /sbin/service, /sbin/chkconfig, /usr/bin/systemctl start, /usr/bin/systemctl stop, /usr/bin/systemctl reload, /usr/bin/systemctl restart, /usr/bin/systemctl status, /usr/bin/systemctl enable, /usr/bin/systemctl disable | ||||
|  | ||||
| ## Updating the locate database | ||||
| # Cmnd_Alias LOCATE = /usr/bin/updatedb | ||||
|  | ||||
| ## Storage | ||||
| # Cmnd_Alias STORAGE = /sbin/fdisk, /sbin/sfdisk, /sbin/parted, /sbin/partprobe, /bin/mount, /bin/umount | ||||
|  | ||||
| ## Delegating permissions | ||||
| # Cmnd_Alias DELEGATING = /usr/sbin/visudo, /bin/chown, /bin/chmod, /bin/chgrp  | ||||
|  | ||||
| ## Processes | ||||
| # Cmnd_Alias PROCESSES = /bin/nice, /bin/kill, /usr/bin/kill, /usr/bin/killall | ||||
|  | ||||
| ## Drivers | ||||
| # Cmnd_Alias DRIVERS = /sbin/modprobe | ||||
|  | ||||
| # Defaults specification | ||||
|  | ||||
| # | ||||
| # Refuse to run if unable to disable echo on the tty. | ||||
| # | ||||
| Defaults   !visiblepw | ||||
|  | ||||
| # | ||||
| # Preserving HOME has security implications since many programs | ||||
| # use it when searching for configuration files. Note that HOME | ||||
| # is already set when the the env_reset option is enabled, so | ||||
| # this option is only effective for configurations where either | ||||
| # env_reset is disabled or HOME is present in the env_keep list. | ||||
| # | ||||
| Defaults    always_set_home | ||||
| Defaults    match_group_by_gid | ||||
|  | ||||
| # Prior to version 1.8.15, groups listed in sudoers that were not | ||||
| # found in the system group database were passed to the group | ||||
| # plugin, if any. Starting with 1.8.15, only groups of the form | ||||
| # %:group are resolved via the group plugin by default. | ||||
| # We enable always_query_group_plugin to restore old behavior. | ||||
| # Disable this option for new behavior. | ||||
| Defaults    always_query_group_plugin | ||||
|  | ||||
| Defaults    env_reset | ||||
| Defaults    env_keep =  "COLORS DISPLAY HOSTNAME HISTSIZE KDEDIR LS_COLORS" | ||||
| Defaults    env_keep += "MAIL QTDIR USERNAME LANG LC_ADDRESS LC_CTYPE" | ||||
| Defaults    env_keep += "LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES" | ||||
| Defaults    env_keep += "LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE" | ||||
| Defaults    env_keep += "LC_TIME LC_ALL LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY" | ||||
|  | ||||
| # | ||||
| # Adding HOME to env_keep may enable a user to run unrestricted | ||||
| # commands via sudo. | ||||
| # | ||||
| # Defaults   env_keep += "HOME" | ||||
|  | ||||
| Defaults    secure_path = /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/var/lib/snapd/snap/bin | ||||
|  | ||||
| ## Next comes the main part: which users can run what software on  | ||||
| ## which machines (the sudoers file can be shared between multiple | ||||
| ## systems). | ||||
| ## Syntax: | ||||
| ## | ||||
| ## 	user	MACHINE=COMMANDS | ||||
| ## | ||||
| ## The COMMANDS section may have other options added to it. | ||||
| ## | ||||
| ## Allow root to run any commands anywhere  | ||||
| root	ALL=(ALL) 	ALL | ||||
|  | ||||
| ## Allows members of the 'sys' group to run networking, software,  | ||||
| ## service management apps and more. | ||||
| # %sys ALL = NETWORKING, SOFTWARE, SERVICES, STORAGE, DELEGATING, PROCESSES, LOCATE, DRIVERS | ||||
|  | ||||
| ## Allows people in group wheel to run all commands | ||||
| %wheel	ALL=(ALL)	ALL | ||||
|  | ||||
| ## Same thing without a password | ||||
| # %wheel	ALL=(ALL)	NOPASSWD: ALL | ||||
|  | ||||
| ## Allows members of the users group to mount and unmount the  | ||||
| ## cdrom as root | ||||
| # %users  ALL=/sbin/mount /mnt/cdrom, /sbin/umount /mnt/cdrom | ||||
|  | ||||
| ## Allows members of the users group to shutdown this system | ||||
| # %users  localhost=/sbin/shutdown -h now | ||||
|  | ||||
| ## Read drop-in files from /etc/sudoers.d (the # here does not mean a comment) | ||||
| #includedir /etc/sudoers.d | ||||
							
								
								
									
										6
									
								
								templates/Fedora/34/etc/sudoers.d/session_log.j2
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								templates/Fedora/34/etc/sudoers.d/session_log.j2
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,6 @@ | ||||
| # | ||||
| # {{ ansible_managed }} | ||||
| # | ||||
| Defaults log_input | ||||
| Defaults log_output | ||||
|  | ||||
		Reference in New Issue
	
	Block a user