Skip to content
This repository was archived by the owner on Feb 12, 2021. It is now read-only.

Comments

os: add section on visudo usage to adding-users doc#898

Merged
joshix merged 2 commits intocoreos:masterfrom
kbrwn:add-sudo-user
Oct 22, 2016
Merged

os: add section on visudo usage to adding-users doc#898
joshix merged 2 commits intocoreos:masterfrom
kbrwn:add-sudo-user

Conversation

@kbrwn
Copy link
Contributor

@kbrwn kbrwn commented Oct 18, 2016

Visudo on CoreOS requires the file be specified or an error is thrown.
Issue: coreos/bugs#1617

Visudo on CoreOS requires the file be specified or an error is thrown.
Issue: coreos/bugs#1617
Copy link
Contributor

@joshix joshix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only 2 nits about formatting so it's clear the command name and file name is literal. LGTM with or without the changes.


## Grant sudo Access

If you trust the user you can grant administrative privileges using visudo. visudo checks the file syntax before actually overwriting the sudoers file. This command should be ran as root to avoid losing sudo access in the event of a failure. Instead of editing /etc/sudo.conf directly you will create a new file under the `/etc/sudoers.d/` directory. When you run visudo it is required that you specify which file you are attempting to edit with the -f argument: 
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

backticks: visudo.
backticks: sudoers


## Grant sudo Access

If you trust the user you can grant administrative privileges using visudo. visudo checks the file syntax before actually overwriting the sudoers file. This command should be ran as root to avoid losing sudo access in the event of a failure. Instead of editing /etc/sudo.conf directly you will create a new file under the `/etc/sudoers.d/` directory. When you run visudo it is required that you specify which file you are attempting to edit with the -f argument: 
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"If you trust the user, you..."


## Grant sudo Access

If you trust the user you can grant administrative privileges using visudo. visudo checks the file syntax before actually overwriting the sudoers file. This command should be ran as root to avoid losing sudo access in the event of a failure. Instead of editing /etc/sudo.conf directly you will create a new file under the `/etc/sudoers.d/` directory. When you run visudo it is required that you specify which file you are attempting to edit with the -f argument: 
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"This command should be run as root..."


## Grant sudo Access

If you trust the user you can grant administrative privileges using visudo. visudo checks the file syntax before actually overwriting the sudoers file. This command should be ran as root to avoid losing sudo access in the event of a failure. Instead of editing /etc/sudo.conf directly you will create a new file under the `/etc/sudoers.d/` directory. When you run visudo it is required that you specify which file you are attempting to edit with the -f argument: 
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"When you run visudo, it..."

@crawford
Copy link
Contributor

Can you please rebase before merging?

@joshix joshix merged commit dac33b0 into coreos:master Oct 22, 2016
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants