run0 systemd run0 1 run0 Elevate privileges run0 OPTIONS COMMAND Description run0 may be used to temporarily and interactively acquire elevated or different privileges. It serves a similar purpose as sudo8, but operates differently in a couple of key areas: No execution or security context credentials are inherited from the caller into the invoked commands, as they are invoked from a fresh, isolated service forked off by the service manager. Authentication takes place via polkit, thus isolating the authentication prompt from the terminal (if possible). An independent pseudo-tty is allocated for the invoked command, detaching its lifecycle and isolating it for security. No SetUID/SetGID file access bit functionality is used for the implementation. Altogether this should provide a safer and more robust alternative to the sudo mechanism, in particular in OS environments where SetUID/SetGID support is not available (for example by setting the NoNewPrivileges= variable in systemd-system.conf5). Any session invoked via run0 will run through the systemd-run0 PAM stack. Note that run0 is implemented as an alternative multi-call invocation of systemd-run1. That is, run0 is a symbolic link to systemd-run executable file, and it behaves as run0 if it is invoked through the symbolic link, otherwise behaves as systemd-run. Options The following options are understood: Use this unit name instead of an automatically generated one. Sets a property of the service unit that is created. This option takes an assignment in the same format as systemctl1's set-property command. Provide a description for the service unit that is invoked. If not specified, the command itself will be used as a description. See Description= in systemd.unit5. Make the new .service unit part of the specified slice, instead of user.slice. Make the new .service unit part of the slice the run0 itself has been invoked in. This option may be combined with , in which case the slice specified via is placed within the slice the run0 command is invoked in. Example: consider run0 being invoked in the slice foo.slice, and the argument is bar. The unit will then be placed under foo-bar.slice. Switches to the specified user/group. If not specified defaults to root, unless or are used (see below), in which case this defaults to the invoking user. Runs the invoked session with the specified nice level. Runs the invoked session with the specified working directory. If not specified defaults to the client's current working directory if switching to the root user, or the target user's home directory otherwise. Invokes the target user's login shell and runs the specified command (if any) via it. Shortcut for . Runs the invoked session with the specified environment variable set. This parameter may be used more than once to set multiple variables. When = and VALUE are omitted, the value of the variable with the same name in the invoking environment will be used. Change the terminal background color to the specified ANSI color as long as the session lasts. If not specified, the background will be tinted in a reddish tone when operating as root, and in a yellowish tone when operating under another UID, as reminder of the changed privileges. The color specified should be an ANSI X3.64 SGR background color, i.e. strings such as 40, 41, …, 47, 48;2;…, 48;5;…. See ANSI Escape Code (Wikipedia) for details. Set to an empty string to disable. Example: --background=44 for a blue background. Request allocation of a pseudo TTY for the run0 session (in case of or ), or request passing the caller's STDIO file descriptors directly through (in case of ). is very similar to but begins the TTY processing only once unit startup is complete, leaving input to any passwords/polkit agents until that time. If neither switch is specified, or if both and one of / are specified, the mode will be picked automatically: if standard input, standard output, and standard error output are all connected to a TTY then a pseudo TTY is allocated (in mode unless is specified in which case is selected), otherwise the relevant file descriptors are passed through directly. and were added in v257. was added in v258. Set a shell prompt prefix string. This ultimately controls the $SHELL_PROMPT_PREFIX environment variable for the invoked program, which is typically imported into the shell prompt. By default – if emojis are supported –, a superhero emoji is shown (🦸). This default may also be changed (or turned off) by passing the $SYSTEMD_RUN_SHELL_PROMPT_PREFIX environment variable to run0, see below. Set to an empty string to disable shell prompt prefixing. Controls whether to activate the per-user service manager for the target user. By default if the target user is root or a system user the per-user service manager is not activated as effect of the run0 invocation, otherwise it is. This ultimately controls the $XDG_SESSION_CLASS environment variable pam_systemd8 respects. Controls the "area" of the target account to log into. Areas are secondary home directories within the primary home directory of the target user, i.e. logging into area foobar of an account translates to $HOME being set to ~/Areas/foobar on login. If this option is used, the default user to transition to changes from root to the calling user's (but takes precedence, see above). Or in other words, just specifying an area without a user is a mechanism to create a new session of the calling user, just with a different area. This ultimately controls the $XDG_AREA environment variable pam_systemd8 respects. For details on the area concept see pam_systemd_home8. If specified, run0 will elevate the privileges of the selected user (using ) or the current user if no user is explicitly selected. Currently this means we give the invoked process all available capabilities and add the the empower group as a supplemental group (for which all polkit actions are allowed by default), but other privileges may be granted in the future as well when using this option. Execute operation in a local container. Specify a container name to connect to. All command line arguments after the first non-option argument become part of the command line of the launched process. If no command line is specified an interactive shell is invoked. The shell to invoke may be controlled through - when specified the target user's shell is used - or . By default, the originating user's shell is executed if operating locally, or /bin/sh when operating with . Note that unlike sudo, run0 always spawns shells with login shell semantics, regardless of . Exit status On success, 0 is returned. If run0 failed to start the session or the specified command fails, a non-zero return value will be returned. Environment Variables As with systemd-run, the session will inherit the system environment from the service manager. In addition, the following environment variables will be set: $TERM Copied from the $TERM of the caller. Can be overridden with $SUDO_USER Set to the username of the originating user. $SUDO_UID Set to the numeric UNIX user id of the originating user. $SUDO_GID Set to the primary numeric UNIX group id of the originating session. $SHELL_PROMPT_PREFIX By default, set to the superhero emoji (if supported), but may be overridden with the $SYSTEMD_RUN_SHELL_PROMPT_PREFIX environment variable (see below), or the switch (see above). The following variables may be passed to run0: $SYSTEMD_RUN_SHELL_PROMPT_PREFIX If set, overrides the default shell prompt prefix that run0 sets for the invoked shell (the superhero emoji). Set to an empty string to disable shell prompt prefixing. See Also systemd1 systemd-run1 sudo8 machinectl1 pam_systemd8