Fazer montar não confiar no sudo

0

Eu tenho o seguinte arquivo / etc / sudoers:

#
# This file MUST be edited with the 'visudo' command as root.
#
# Please consider adding local content in /etc/sudoers.d/ instead of
# directly modifying this file.
#
# See the man page for details on how to write a sudoers file.
#
Defaults        env_reset
Defaults        mail_badpass
Defaults        secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin"

# Host alias specification

# User alias specification
User_Alias MOUNT_USERS=jw,aro

# Cmnd alias specification
Cmnd_Alias MOUNT_CMDS=/bin/mount,/bin/umount,/sbin/mount.cifs

# User privilege specification
root    ALL=(ALL:ALL) ALL
MOUNT_USERS ALL=(ALL) NOPASSWD:MOUNT_CMDS

# Members of the admin group may gain root privileges
%admin ALL=(ALL) ALL

# Allow members of group sudo to execute any command
%sudo   ALL=(ALL:ALL) ALL

# See sudoers(5) for more information on "#include" directives:

#includedir /etc/sudoers.d

Quando eu chamo um script de shell seguindo a linha

sudo mount -t cifs $mount_remote_dir $mount_local_dir -o ro,nounix,username=${username_server},uid=${username_linux},gid=${username_linux}

Me perguntam (logado como aro) para fornecer minha senha sudo. Como posso evitar isso, ou melhor, o que estou fazendo errado?

    
por SinisterMJ 03.05.2018 / 15:28

0 respostas