-
Notifications
You must be signed in to change notification settings - Fork 252
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tests: sudo defaults rule #7255
Conversation
c350896
to
740315f
Compare
124c446
to
8a4cf9c
Compare
8a4cf9c
to
c5654ec
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi Shridhar, there is flake error:
./tests/test_sudo.py:575:120: E501 line too long (122 > 119 characters)
Otherwise it looks good to me. Thank you.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
non-root
9884f2b
to
1856bef
Compare
19e4f9d
to
6e90832
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice clear and simple tests.
Changed doc-strings and steps for more clarity
6e90832
to
3ec5277
Compare
A sudo rule with specifically 'defaults' as cn is being tested. The addition option '!authenticate' has been added. The man 5 sudoers.ldap says:
Sudo first looks for the ‘cn=defaults’ entry in the SUDOers container. If found, the multi-valued sudoOption attribute is parsed in the same manner as a global Defaults line in /etc/sudoers. In the following example, the SSH_AUTH_SOCK variable will be preserved in the environment for all users.