summaryrefslogtreecommitdiff
path: root/src/etc/sudoers.d
AgeCommit message (Collapse)Author
2024-12-01sudo: T6926: remove spam messages to syslogChristian Breunig
Right now every command that's executed via op-mode/conf-mode is logged with a session entry/exit and command execution into syslog. sudo[1082396]: vyos : TTY=pts/1 ; PWD=/home/vyos ; USER=root ; COMMAND=/usr/bin/mv /tmp/config.boot.1082388 /opt/vyatta/etc/config/archive/config.boot sudo[1082396]: pam_unix(sudo:session): session opened for user root(uid=0) by vyos(uid=1002) sudo[1082396]: pam_unix(sudo:session): session closed for user root sudo[1082399]: vyos : TTY=pts/1 ; PWD=/home/vyos ; USER=root ; COMMAND=/usr/sbin/logrotate -f -s /opt/vyatta/etc/config/archive/lr.state /opt/vyatta/etc/config/archive/lr.conf sudo[1082399]: pam_unix(sudo:session): session opened for user root(uid=0) by vyos(uid=1002) sudo[1082399]: pam_unix(sudo:session): session closed for user root This heavily bloats remote logging services - remove the log entries
2024-09-16T861: op-mode: "show version" will display secure boot stateChristian Breunig
vyos@vyos:~$ show ver ... Architecture: x86_64 Boot via: installed image System type: KVM guest Secure Boot: enabled ...
2024-01-24dhcpv6: T3771: Allow installation of routes for delegated prefixessarthurdev
2023-11-09op-mode: T5658: add VRF support for "monitor traceroute"bbabich
2022-10-14T4533: Allow basic permissions to unprivileged RADIUS usersViacheslav Hletenko
Unprivileged RADIUS users cannot do simple diagnostics like ping or traceroute. Allow them such tools. Ability to execute op-mode commands for them. It is not new 'operator mode' feature but it allows RADIUS users execute op-mode commands
2021-06-26Import sudoers configuration from vyatta-cfg-systemChristian Poessinger