# sudo cookbook [](http://travis-ci.org/chef-cookbooks/sudo) [](https://supermarket.chef.io/cookbooks/sudo) The Chef `sudo` cookbook installs the `sudo` package and configures the `/etc/sudoers` file. It also exposes an LWRP for adding and managing sudoers. ## Requirements ### Platforms - Debian/Ubuntu - RHEL/CentOS/Scientific/Amazon/Oracle - FreeBSD - Mac OS X - openSUSE / Suse ### Chef - Chef 12.1+ ### Cookbooks - None ## Attributes - `node['authorization']['sudo']['groups']` - groups to enable sudo access (default: `[ "sysadmin" ]`) - `node['authorization']['sudo']['users']` - users to enable sudo access (default: `[]`) - `node['authorization']['sudo']['passwordless']` - use passwordless sudo (default: `false`) - `node['authorization']['sudo']['include_sudoers_d']` - include and manage `/etc/sudoers.d` (default: `false`) - `node['authorization']['sudo']['agent_forwarding']` - preserve `SSH_AUTH_SOCK` when sudoing (default: `false`) - `node['authorization']['sudo']['sudoers_defaults']` - Array of `Defaults` entries to configure in `/etc/sudoers` - `node['authorization']['sudo']['setenv']` - Whether to permit preserving of environment with `sudo -E` (default: `false`) ## Usage ### Attributes To use attributes for defining sudoers, set the attributes above on the node (or role) itself: ```json { "default_attributes": { "authorization": { "sudo": { "groups": ["admin", "wheel", "sysadmin"], "users": ["jerry", "greg"], "passwordless": "true" } } } } ``` ```json { "default_attributes": { "authorization": { "sudo": { "command_aliases": [{ "name": "TEST", "command_list": [ "/usr/bin/ls", "/usr/bin/cat" ] }], "custom_commands": { "users": [ { "user": "test_user", "passwordless": true, "command_list": [ "TEST" ] } ], "groups": [ { "group": "test_group", "passwordless": false, "command_list": [ "TEST" ] } ] } } } } } ``` ```ruby # roles/example.rb default_attributes( "authorization" => { "sudo" => { "groups" => ["admin", "wheel", "sysadmin"], "users" => ["jerry", "greg"], "passwordless" => true } } ) ``` **Note that the template for the sudoers file has the group "sysadmin" with ALL:ALL permission, though the group by default does not exist.** ### Sudoers Defaults Configure a node attribute, `node['authorization']['sudo']['sudoers_defaults']` as an array of `Defaults` entries to configure in `/etc/sudoers`. A list of examples for common platforms is listed below: _Debian_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = ['env_reset'] ``` _Ubuntu 10.04_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = ['env_reset'] ``` _Ubuntu 12.04_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = [ 'env_reset', 'secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"' ] ``` _FreeBSD_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = [ 'env_reset', 'secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"' ] ``` _RHEL family 5.x_ The version of sudo in RHEL 5 may not support `+=`, as used in `env_keep`, so its a single string. ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = [ '!visiblepw', 'env_reset', 'env_keep = "COLORS DISPLAY HOSTNAME HISTSIZE INPUTRC KDEDIR \ LS_COLORS MAIL PS1 PS2 QTDIR USERNAME \ LANG LC_ADDRESS LC_CTYPE LC_COLLATE LC_IDENTIFICATION \ LC_MEASUREMENT LC_MESSAGES LC_MONETARY LC_NAME LC_NUMERIC \ LC_PAPER LC_TELEPHONE LC_TIME LC_ALL LANGUAGE LINGUAS \ _XKB_CHARSET XAUTHORITY"' ] ``` _RHEL family 6.x_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = [ '!visiblepw', 'env_reset', 'env_keep = "COLORS DISPLAY HOSTNAME HISTSIZE INPUTRC KDEDIR LS_COLORS"', 'env_keep += "MAIL PS1 PS2 QTDIR USERNAME LANG LC_ADDRESS LC_CTYPE"', 'env_keep += "LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES"', 'env_keep += "LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE"', 'env_keep += "LC_TIME LC_ALL LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY"', 'env_keep += "HOME"', 'always_set_home', 'secure_path = /sbin:/bin:/usr/sbin:/usr/bin' ] ``` _Mac OS X_ ```ruby node.default['authorization']['sudo']['sudoers_defaults'] = [ 'env_reset', 'env_keep += "BLOCKSIZE"', 'env_keep += "COLORFGBG COLORTERM"', 'env_keep += "__CF_USER_TEXT_ENCODING"', 'env_keep += "CHARSET LANG LANGUAGE LC_ALL LC_COLLATE LC_CTYPE"', 'env_keep += "LC_MESSAGES LC_MONETARY LC_NUMERIC LC_TIME"', 'env_keep += "LINES COLUMNS"', 'env_keep += "LSCOLORS"', 'env_keep += "TZ"', 'env_keep += "DISPLAY XAUTHORIZATION XAUTHORITY"', 'env_keep += "EDITOR VISUAL"', 'env_keep += "HOME MAIL"' ] ``` ### LWRP **Note** Sudo version 1.7.2 or newer is required to use the sudo LWRP as it relies on the "#includedir" directive introduced in version 1.7.2. The recipe does not enforce installing the version. To use this LWRP, set `node['authorization']['sudo']['include_sudoers_d']` to `true`. There are two ways for rendering a sudoer-fragment using this LWRP: 1. Using the built-in template 2. Using a custom, cookbook-level template Both methods will create the `/etc/sudoers.d/#{resourcename}` file with the correct permissions. The LWRP also performs **fragment validation**. If a sudoer-fragment is not valid, the Chef run will throw an exception and fail. This ensures that your sudoers file is always valid and cannot become corrupt (from this cookbook). Example using the built-in template: ```ruby sudo 'tomcat' do user "%tomcat" # or a username runas 'app_user' # or 'app_user:tomcat' commands ['/etc/init.d/tomcat restart'] end ``` ```ruby sudo 'tomcat' do template 'my_tomcat.erb' # local cookbook template variables :cmds => ['/etc/init.d/tomcat restart'] end ``` In either case, the following file would be generated in `/etc/sudoers.d/tomcat` ```bash # This file is managed by Chef for node.example.com # Do NOT modify this file directly. %tomcat ALL=(app_user) /etc/init.d/tomcat restart ``` #### LWRP Attributes
Attribute | Description | Example | Default |
---|---|---|---|
name | name of the `/etc/sudoers.d` file | restart-tomcat | current resource name |
commands | array of commands this sudoer can execute | ['/etc/init.d/tomcat restart'] | ['ALL'] |
group | group to provide sudo privileges to, except `%` is prepended to the name in case it is not already | %admin | |
nopasswd | supply a password to invoke sudo | true | false |
noexec | prevents commands from shelling out | true | false |
runas | User the command(s) can be run as | root | ALL |
template | the erb template to render instead of the default | restart-tomcat.erb | |
user | user to provide sudo privileges to | tomcat | |
defaults | array of defaults this user has | ['!requiretty','env_reset'] | |
setenv | whether to permit the preserving of environment with `sudo -E` | true | |
env_keep_add | array of strings to add to env_keep | ['HOME', 'MY_ENV_VAR MY_OTHER_ENV_VAR'] | |
env_keep_subtract | array of strings to remove from env_keep | ['DISPLAY', 'MY_SECURE_ENV_VAR'] | |
variables | the variables to pass to the custom template | :commands => ['/etc/init.d/tomcat restart'] |