fixed parsing vulnerability rdo
This is by far the heaviest feature of rdo, justifying its own file for its 140loc. It creates sessions, inspired by the way doas does it. We use the /run/rdo temporary folder to store files in the format of /run/rdo/pid-ts, pid being the PID of the process that executed rdo, and ts being the timestamp at which said process started. As no 2 processes can have the exact same PID and startup time (startup time is measured in the milliseconds), this seems secure. Closes #4. |
||
---|---|---|
.gitignore | ||
LICENSE | ||
Makefile | ||
rdo.c | ||
rdo_sample.conf | ||
README.md | ||
sessions.h |
RootDO 
This little "project" aims to be a very slim alternative to both sudo and doas.
Installation
If you are on Arch Linux, you can download the package via the AUR.
If you are using any other linux distro, you can build it yourself by following these instructions:
git clone https://codeberg.org/sw1tchbl4d3/rdo
cd rdo
make
sudo make install
After that, you'll have to configure rdo to allow you to use it.
To do this, edit /etc/rdo.conf
, and set the username variable to your own.
After that you're good to go!
And to uninstall:
sudo make uninstall
Usage
rdo [command]
Dependencies
libbsd