linux的sudo命令實例分析介紹
Linux sudo命令以系統(tǒng)管理者的身份執(zhí)行指令,也就是說,經(jīng)由 sudo 所執(zhí)行的指令就好像是 root 親自執(zhí)行。具體怎么使用呢。下面由學(xué)習(xí)啦小編為大家整理了linux的sudo命令的相關(guān)知識,希望大家喜歡!
linux的sudo命令實例
sudo命令使用
$ sudo ls
[sudo] password for hnlinux:
hnlinux is not in the sudoers file. This incident will be reported.
指定用戶執(zhí)行命令
# sudo -u userb ls -l
顯示sudo設(shè)置
$ sudo -L //顯示sudo設(shè)置
Available options in a sudoers ``Defaults'' line:
syslog: Syslog facility if syslog is being used for logging
syslog_goodpri: Syslog priority to use when user authenticates successfully
syslog_badpri: Syslog priority to use when user authenticates unsuccessfully
long_otp_prompt: Put OTP prompt on its own line
ignore_dot: Ignore '.' in $PATH
mail_always: Always send mail when sudo is run
mail_badpass: Send mail if user authentication fails
mail_no_user: Send mail if the user is not in sudoers
mail_no_host: Send mail if the user is not in sudoers for this host
mail_no_perms: Send mail if the user is not allowed to run a command
tty_tickets: Use a separate timestamp for each user/tty combo
lecture: Lecture user the first time they run sudo
lecture_file: File containing the sudo lecture
authenticate: Require users to authenticate by default
root_sudo: Root may run sudo
log_host: Log the hostname in the (non-syslog) log file
log_year: Log the year in the (non-syslog) log file
shell_noargs: If sudo is invoked with no arguments, start a shell
set_home: Set $HOME to the target user when starting a shell with -s
always_set_home: Always set $HOME to the target user's home directory
path_info: Allow some information gathering to give useful error messages
fqdn: Require fully-qualified hostnames in the sudoers file
insults: Insult the user when they enter an incorrect password
requiretty: Only allow the user to run sudo if they have a tty
env_editor: Visudo will honor the EDITOR environment variable
rootpw: Prompt for root's password, not the users's
runaspw: Prompt for the runas_default user's password, not the users's
targetpw: Prompt for the target user's password, not the users's
use_loginclass: Apply defaults in the target user's login class if there is one
set_logname: Set the LOGNAME and USER environment variables
stay_setuid: Only set the effective uid to the target user, not the real uid
preserve_groups: Don't initialize the group vector to that of the target user
loglinelen: Length at which to wrap log file lines (0 for no wrap)
timestamp_timeout: Authentication timestamp timeout
passwd_timeout: Password prompt timeout
passwd_tries: Number of tries to enter a password
umask: Umask to use or 0777 to use user's
logfile: Path to log file
mailerpath: Path to mail program
mailerflags: Flags for mail program
mailto: Address to send mail to
mailfrom: Address to send mail from
mailsub: Subject line for mail messages
badpass_message: Incorrect password message
timestampdir: Path to authentication timestamp dir
timestampowner: Owner of the authentication timestamp dir
exempt_group: Users in this group are exempt from password and PATH requirements
passprompt: Default password prompt
passprompt_override: If set, passprompt will override system prompt in all cases.
runas_default: Default user to run commands as
secure_path: Value to override user's $PATH with
editor: Path to the editor for use by visudo
listpw: When to require a password for 'list' pseudocommand
verifypw: When to require a password for 'verify' pseudocommand
noexec: Preload the dummy exec functions contained in 'noexec_file'
noexec_file: File containing dummy exec functions
ignore_local_sudoers: If LDAP directory is up, do we ignore local sudoers file
closefrom: File descriptors >= %d will be closed before executing a command
closefrom_override: If set, users may override the value of `closefrom' with the -C option
setenv: Allow users to set arbitrary environment variables
env_reset: Reset the environment to a default set of variables
env_check: Environment variables to check for sanity
env_delete: Environment variables to remove
env_keep: Environment variables to preserve
role: SELinux role to use in the new security context
type: SELinux type to use in the new security context
askpass: Path to the askpass helper program
env_file: Path to the sudo-specific environment file
sudoers_locale: Locale to use while parsing sudoers
visiblepw: Allow sudo to prompt for a password even if it would be visisble
pwfeedback: Provide visual feedback at the password prompt when there is user input
fast_glob: Use faster globbing that is less accurate but does not access the filesystem
umask_override: The umask specified in sudoers will override the user's, even if it is more permissive
以root權(quán)限執(zhí)行上一條命令
$ sudo !!
以特定用戶身份進行編輯文本
$ sudo -u uggc vi ~www/index.html
//以 uggc 用戶身份編輯 home 目錄下www目錄中的 index.html 文件
列出目前的權(quán)限
sudo -l
列出 sudo 的版本資訊
sudo -V
相關(guān)閱讀:Linux常用基本命令
文件名--test
mkdir test 創(chuàng)建一個文件夾
mkdir test/test1/test2 -p 在創(chuàng)建test1時候,繼續(xù)創(chuàng)建test2目錄,一起創(chuàng)建
mv test test1 修改文件名稱
mv test /位置 復(fù)制文件到指定位置
cat test 查看文件內(nèi)容
unzip 解壓包 解壓當(dāng)前文件
unzip 解壓包 -d /位置 解壓壓縮包到指定位置
rm test 刪除一個文件
rm -rf test 刪除一個帶文件或者文件夾的 文件目錄
cp test test1 復(fù)制一個文件
cp -r test test1 復(fù)制一個文件夾(包含文件夾下的文件)
vi 文件名 修改文件內(nèi)容
按i鍵,下方出現(xiàn)insert,開始編輯內(nèi)容
編輯完內(nèi)容,按esc,退出編輯模式
:wq 保存退出
:q! 不保存文件退出
啟動報錯,給權(quán)限
chmod 777 ./startup.sh
chmod -R 777 catalina.sh
重啟nginx: 進入到nginx的sbin目錄,重啟: ./nginx -s reload(也意指在不關(guān)機的情況下,刷新配置文件)
啟動nginx: 進入到nginx的sbin目錄,命令./nginx 開啟服務(wù)
關(guān)閉nginx: 進入到nginx的sbin目錄,命令./nginx -s stop(./nginx -s quit) 關(guān)閉服務(wù)