Module pleaser::util[][src]

Structs

EnvOptions
RunOptions

Enums

ACLTYPE

Functions

bad_priv_msg
boot_secs
can

search the EnvOptions list for matching RunOptions and return the match

can_dir_include

return true if the inclusion exists and ends with .ini

challenge_password

read password of user via rpassword should pam require a password, and it is successful, then we set a token

clean_environment

clean environment aside from ~half a dozen vars

common_opt_arguments

common opt arguments

create_token_dir
credits

added around easter time

directory_check_ok

may we execute with this directory

drop_privs

set privs (just call eprivs based on ro)

esc_privs

reset privs (just call eprivs based on root)

escape_log

add a level of escape to strings when they go to the old as “ holds entities

get_editor

find editor for user. return /usr/bin/vi if EDITOR and VISUAL are unset

group_hash

turn group list into an indexed list

hostname_ok

may we execute with this hostname

list

produce output list of acl

log_action

write to syslog a standard log

permitted_dates_ok

is the RunOption valid for the dates permitted in the EnvOption

print_may_not
print_usage

print the usage

print_version

print version string

prng_alpha_num_string

return a lump of random alpha numeric characters

read_ini

read an ini file and traverse includes

read_ini_config_file

read through an ini config file, appending EnvOptions to vec_eo hardcoded limit of 10M for confs

read_ini_config_str
regex_build

build a regex and replace %{USER} with the user str, prefix with ^ and suffix with $

remove_token

remove from disk the users token

replace_new_args

escape ’ ’ within an argument

search_path

if binary is not an absolute/relative path, look for it in usual places

set_environment

set environment for helper scripts

set_eprivs

set privs of usr to target_uid and target_gid. return false if fails

set_privs

set privs of usr to target_uid and target_gid. return false if fails

token_dir

return the directory that the token should use

token_path

return the path of the users token

tty_name

return our best guess of what the user’s tty is

update_token

touch the users token on disk

valid_token

does the user have a valid token return false if time stamp is in the future return true if token was set within 600 seconds of wall and boot time