bump(app-admin/sudo): sync with upstream

This commit is contained in:
Michael Marineau 2014-03-25 11:10:18 -07:00
parent 0fb243adf9
commit 294b94e73a
10 changed files with 730 additions and 56 deletions

View File

@ -1,6 +1,106 @@
# ChangeLog for app-admin/sudo
# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.337 2013/02/01 17:16:32 flameeyes Exp $
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.362 2014/03/18 18:37:22 polynomial-c Exp $
*sudo-1.8.10_p2 (18 Mar 2014)
18 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> -sudo-1.8.10_p1.ebuild,
+sudo-1.8.10_p2.ebuild:
Version bump. Removed old.
17 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> sudo-1.8.10_p1.ebuild:
Don't install into /var/run as that is a tmpfs most of the time (bug
#504854).
*sudo-1.8.10_p1 (14 Mar 2014)
14 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> -sudo-1.8.10.ebuild,
+sudo-1.8.10_p1.ebuild:
Version bump. Removed old.
*sudo-1.8.10 (13 Mar 2014)
13 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> +sudo-1.8.10.ebuild:
Version bump.
*sudo-1.8.9_p5 (21 Feb 2014)
21 Feb 2014; Lars Wendler <polynomial-c@gentoo.org> +sudo-1.8.9_p5.ebuild:
Version bump (bug #501966).
*sudo-1.8.8 (10 Oct 2013)
10 Oct 2013; Tony Vroon <chainsaw@gentoo.org> +sudo-1.8.8.ebuild:
Version bump, as requested by "teidakankan" & "Ulenrich" in bug #481392. Now
produces useful error messages if there is an error in the configuration
file. Line continuation with backslashes is now supported. Improved HP-UX &
Solaris support. No longer assumes BSD group semantics.
05 Jun 2013; Mike Frysinger <vapier@gentoo.org> metadata.xml:
Add upstream CPE tag (security info) from ChromiumOS.
27 May 2013; Jason A. Donenfeld <zx2c4@gentoo.org> metadata.xml,
sudo-1.8.5_p2.ebuild, sudo-1.8.6_p7.ebuild, sudo-1.8.6_p8.ebuild:
Per discussion with flameeyes and zmedico, introduce sendmail USE flag to make
packages.provided less compelling.
*sudo-1.8.6_p8 (15 Apr 2013)
15 Apr 2013; Diego E. Pettenò <flameeyes@gentoo.org> +sudo-1.8.6_p8.ebuild,
-sudo-1.8.6_p3.ebuild:
Version bump and remove old.
14 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for sh, wrt bug #459722
13 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for s390, wrt bug #459722
13 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for sparc, wrt bug #459722
12 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for ia64, wrt bug #459722
12 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for x86, wrt bug #459722
11 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for alpha, wrt bug #459722
11 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for ppc64, wrt bug #459722
11 Apr 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for ppc, wrt bug #459722
09 Apr 2013; Jeroen Roovers <jer@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable for HPPA (bug #459722).
09 Apr 2013; Sergey Popov <pinkbyte@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable on arm, wrt bug #459722
09 Apr 2013; Sergey Popov <pinkbyte@gentoo.org> sudo-1.8.6_p7.ebuild:
Stable on amd64, wrt bug #459722
*sudo-1.8.6_p7 (28 Feb 2013)
28 Feb 2013; Diego E. Pettenò <flameeyes@gentoo.org> +sudo-1.8.6_p7.ebuild,
-sudo-1.8.6_p6.ebuild:
Version bump; remove old.
24 Feb 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p3.ebuild:
Stable for sh, wrt bug #452602
20 Feb 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p3.ebuild:
Stable for s390, wrt bug #452602
08 Feb 2013; Mike Frysinger <vapier@gentoo.org> sudo-1.8.5_p2.ebuild,
sudo-1.8.6_p3.ebuild, sudo-1.8.6_p6.ebuild:
Use `default` to install.
04 Feb 2013; Agostino Sarubbo <ago@gentoo.org> sudo-1.8.6_p3.ebuild:
Stable for alpha, wrt bug #452602
*sudo-1.8.6_p6 (01 Feb 2013)

View File

@ -1,22 +1,34 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
DIST sudo-1.8.10p2.tar.gz 2261235 SHA256 ba6cb8db6dccdb92a96e8ae63ca65c410f8b61270b603ab9af4b1154fef379f1 SHA512 c746489dbe57804d05261d784a949b2231e5b96a7c8caf51cf9021a092aebd04ebf31a0e89390a64197f684b2e63405b6715eff20b71b1f5772f183bcd47cce1 WHIRLPOOL 0842e85916cdbf6167ab7d632484973b3d43cdf93c2de53e70b59068245bac5545e2c9b9347f49437a00a08c1d726bc66535092d9fe114ab141eb2ebe5aaee76
DIST sudo-1.8.5p2.tar.gz 1746344 SHA256 c32ae2bc3faf83444c82ca75ccb10ad3684d8222e3535f164c4a4db7cdddf8cf SHA512 616967eea79f91cda2b0cd1d13ed453d20142521ecfca289432bdf5708ac0549c7873fd80170cc0481390e82f1e60fb0bffcfc7c6b70d5d721aa98d23361c5cb WHIRLPOOL ac0d2c040935c54947571a0d4671be70aaaf7a6f69cb097acd321718656d4c569b0db4191eaf943c6b642a1d641263429287241a236a0f2a0c9edf973710bf8b
DIST sudo-1.8.6p3.tar.gz 1854962 SHA256 8130df04268f678880c3f423337c56e7d437a0f508a46b1dfefae16b0b20c92e SHA512 239cd838afba3aa9c7123d19017e997a332e6434b744bdac1cfbdf911595b642c2b7b635761e15c4835dfa15058df7d0e003892a501288bd793c4d676f746051 WHIRLPOOL a109beab4f9709fc00fe8050468a30e73de971db0e8c2bc4d4cdf82fdbcd8e47ed939b34dc675dc700e59c12a412af203ed75b71649157d2df48af3b51c08f10
DIST sudo-1.8.6p6.tar.gz 1857449 SHA256 d600fee5cb2e843450263a2b8f133b9921ffa00cb6b841b0da82613447cefb7c SHA512 17b7ee567fb5e24766b42a80d668e4dd3f8f3da319661cb652b0d5b2d98b4cb2f8a0e2ada14013937799896c32caf9c7ff9de6515cf20cde28510a84b8b81264 WHIRLPOOL 40b7f5cac63360516cc4e893e598f06c0cf2ed2c714eed35db5242c535e2f1f95523db4dc46b5ded2df5d439b1fcbf3c14991d64aa411b89f240d955da1f09ed
EBUILD sudo-1.8.5_p2.ebuild 5441 SHA256 6b4d10e763688690280377221132f63ea5fe622119768d1021a5fc29fa5f299c SHA512 6230aaa9ed2d9feca2a100de1d086f4cabcb5006d58865d20c7db97b597c0e1a69e2a390c9167331d79cc9ff0b9da168419a727cf2da84b8817fe498f43440cd WHIRLPOOL e217dd1e7ee40cd4939f6eade3ade8cd9ec4dc58abfccc3673333b17ddf25ee29b1519ad3d0c659c9d95f05bf149b55b777758482b8a78aab4448c6a909f92bf
EBUILD sudo-1.8.6_p3.ebuild 5444 SHA256 2dbdfd842222aaa58d8278d3005984931c015e4809c3b198806ad0c54bb40e82 SHA512 75de9ada12b3f1659aa7707a02cbadf63eb16a4954ea171d2b697650070b62d04727b152931466e95a5270949e2bb3edacc6196a793d9f47d8616c5d01f20e1a WHIRLPOOL 5ea4cb05f23f46df63c7da1b77a4fed79efdf6cd4ee6321303d05f0bd6599a9bfd486632ce89f2b08c7f23d15ab63b5e22068cc392feb2bf83e904151fa27bc1
EBUILD sudo-1.8.6_p6.ebuild 5457 SHA256 697b68a17d5386832a7a2a10256f81b5d6e601e276a95fadb13dd2793e879f7e SHA512 5ab40f2493abd98b3b6d35019fbd8f92b052c9a92925c343eb7f2a2ec70f02f94f685824298741108877e6fbeff11a8e0669e6b08272054a70a34166e8a3f172 WHIRLPOOL 9afa16dddd2dd860f1ef139e80c6fa1fb99d238be2c1309a44e0339180ee39b6cdabc70695afc53668ab85993fae8adf4efc323eb93809a561db24ffd33866ad
MISC ChangeLog 49051 SHA256 744b2ea56bd52a744c37347a3f6252dd2873e89ccc238924ea005de495374fab SHA512 f15eb9b7335f997046106760868ab50deea241b9b2c333782bbb33dc0512790a14b8ec376084d761c9a46a2a86ded261adfb978c38d585ce0cc5ac0ae56d41c2 WHIRLPOOL 2a7c2ade3128f2d7baa9d5947246cdf161eccfcd14585f4ebcc2d58e22aa439d316ac73afe7f374b3538a39a5f6c955aff87c9f9b20f037c7d08609c608e2f72
MISC metadata.xml 560 SHA256 465d0ea14b7db3ecd0bad7c175f9e17003794145f5f59c4941f848960c91048a SHA512 97bdce0d3972fd6f8ae58ddcb87c002a0384a6f6392347f5035f4f16581e665f3121d5ab5abdea1a9ec87122b10310f0ff99697de1749b418f61cc92217c58be WHIRLPOOL a7cddcabfcb73965df21adbe163117549eea126d424e065f14ab0cec76ad608a6b4506be013e2709e071e2e1d370c7c4188a8eb0aafba9f9b16266373fc29f80
DIST sudo-1.8.6p7.tar.gz 1858348 SHA256 301089edb22356f59d097f6abbe1303f03927a38691b02959d618546c2125036 SHA512 732bcbd53b77d329bbc77d3cd3644a595e938433053122fe3098385c0ad3a6a9cf4f4ab8709c7a79cad51dba77ffaa1be9ffde8e8834d3798822a1bd5b518d42 WHIRLPOOL 875984b44b571dc3765aab5ad8bd8859d0cd680e7da453109b5bee45aac336e3d0c05e1133ce0101a6dd2b9f19a26454d3e0b11c0edf32034f9fae04d3dfbb4d
DIST sudo-1.8.6p8.tar.gz 1858612 SHA256 c0baaa87f59153967b650a0dde2f7d4147d358fa15f3fdabb47e84d0282fe625 SHA512 9c9d297e8cba4ae74a1358b23da15beea4649684afa09b3c3486bd25454008b4c7cd543266f8abc22aac48a56912d7174ccfc137a69670e737d6c9939708cb80 WHIRLPOOL f19c882a2b3de4f41ee97b1f26ebe284782c82500dfc2f86edd262b3ec9f10a2fb3c8b20f26cd1587910677b169ed0260a9672db4dc7b1ea8d5d817235f6197c
DIST sudo-1.8.8.tar.gz 2117145 SHA256 9f911c1e9297fb8006deb52fa81197a8d06b9d54e70672f723c467ecae992fc9 SHA512 e56ea849c2e6470a3d97fc76bde6af145938cf2df4d17f3faef00368262d8e2dd5bcc7e3adf490e853e23466b15638000a527156bd694ce4980003d751c896d5 WHIRLPOOL 74fad850b4f370775f3c5611235b7f20837267f599ace4350f6498ce21cf12e94c1efb98017656106305398496c2f1ff992700fe5fbde4fcf47ca5210cddfdc6
DIST sudo-1.8.9p5.tar.gz 2179066 SHA256 bc9d5c96de5f8b4d2b014f87a37870aef60d2891c869202454069150a21a5c21 SHA512 ebd1af9724e135db2e553e59c96f22f6f25885b7ba35767657a26d319bb074987833329084cc07271946b2ef7165567f63ccad11ccf290cef3f77953a6fd7a28 WHIRLPOOL 63940daa38d7d9dea8f3ca41c637935e00fd7439a09de3300f8b875382c142e4328c3d9034273e920a9987e70358157f3fba6d5683b6b94badf00ad5aa8b8293
EBUILD sudo-1.8.10_p2.ebuild 5645 SHA256 0afa325499e6e717bd6ba4ac90200afb9ca5eedbd7eef181c0339bb8c7ab48ba SHA512 193e95bd8e7e4a5637d8f5954736960e5636875a6855618d9557067b73a3d79a14806a0f7e79986bc8cb77e1a95c4c0611d8aef7aa507b3bf3585fe70107fda1 WHIRLPOOL ee4bbe100309f887b6a909ea200aac741107940be38483bc419f6c9aab2d3df5b3a8b39453518b26c78902fac3a380c0292c8aba6ed1f044a46270c7eca65fe9
EBUILD sudo-1.8.5_p2.ebuild 5464 SHA256 5a647b0c4a2949e476277ead580f6a42747f7778b282dd1e034a2c010c784a9e SHA512 34cc788ee019ccaf8e2f74dbae5e668d8fb94dab066bea49f3a37f31210a66c9327686e5c5f44a966321f26e3ccc5e2aa47fdb46b35285e96f266eafbddbc741 WHIRLPOOL 532a4151b0acbec600552cca4b18b54afba14a48e91640dd85642c4571e993e1a8eb20e03e83ef3f901a8f6eb6c63c2a5aec7650020e5e58f0d7911790d419f5
EBUILD sudo-1.8.6_p7.ebuild 5464 SHA256 4f58dcb19ec413e99144a4806d5d7d68c5f9e3bbc4d8b0d77efb8df8dd147e57 SHA512 ed1575681e3e84d42d97f4465af3c3f33fa82d645d49a2219047728b22d0d7cbfb7c4e8a34ffce55da18ce67db84d6e40907c571231fa16acdef18bfa41cabc4 WHIRLPOOL a74177a5effbe3379a7da469f6cdaf5bd0263b777cbdecf8c02bf9956bc4cce3de35a2727f0e275f76ba94b1f0fff738d04d5102b83ac739bb99db624d919a1b
EBUILD sudo-1.8.6_p8.ebuild 5474 SHA256 9a8b19e57ca0ed59d0b371352842c6539c714b8c163c97f81fbcf2f2d227cd9a SHA512 730229e13bb4b3591ab6a0a0ba3a9090d47b8cb3d425b4472ef33ca845b3522771443568fcf05f83b9cd7e465d8566a1e569de11ca0427693a74c9438118fbaf WHIRLPOOL ff4756e3505a293bbc67ae2933414b3c42b0cb5006bded4e280d97487f593cc288dddaa1b196137bebc03f97c928528226d52f06f170304dba3b868b0a8ef291
EBUILD sudo-1.8.8.ebuild 5474 SHA256 597d3cfa588d3e47d07be11cd2aa6df137951167c27043ce5ac06f710f49fdaf SHA512 223c0b1caf6797242a0db709eef46a5951959ed83aaeb25624c47ca39b76d2922ea79e8b8b1204195ad6bf7ec1ab4985770552d26be2a57728767ece2ce9bd43 WHIRLPOOL 7dad9dfaaf610212bbc5c1d6f133f1761885757df32cc3bb1166a29910a68089281c84b256d2b61bf3bf150e3bd458081f7039ff697a9b20bc5e86d36d8c1309
EBUILD sudo-1.8.9_p5.ebuild 5481 SHA256 8705bae8d24b7730840b2897846a72bbe031fe2d1c50284e87785ec3353bf7d2 SHA512 5a83aadb46ecd1076f486a3a9dcc5f7cbfe244de49bc2413a2cdfb80c2eccfe4e1db767099db29bd4bd311ecd469ceec7c1a2ac3c60fa71fb3639ac48cc84075 WHIRLPOOL 21bb3e3e0eb7fd828afc3e4bc122843642844c7c6d9046382daac52f28bf10cac57aa08dbc37e9bc48c41d2955736698c53f1a39e0801b3efa801ca7d44e643c
MISC ChangeLog 52529 SHA256 912bc80f4e32453379b99e660e3ed79089106a62db2ff0f5dffc0ffeeff24478 SHA512 949c2956db687dfb7d0bb140c9777fb0f434efcffb2675a238084d49704600c50c46ada6c477b09be5df766cb06d5d06db9fe990a753ea2da73cebe176bb917b WHIRLPOOL 52009cde8363f6425bfe94c6219a1485bc5894a8c317d3e4e7ac2de5d3b2ddb79aab44044fd92b7c3fa321f158c1cb450d246304ac237908015adf14a3261879
MISC metadata.xml 726 SHA256 242e8a573d76b2163a928259e5226fff2c237b3e9c244860a1430fa79c5b390e SHA512 d0a7e5f53ec823d84e3c38c2bd64ba566d7cbd08c12ebf3e9b9fed10b77ce2e3e951e262f1a307aa8f0819a662559ca6f9bcf86cf05088480413e4534ce299d3 WHIRLPOOL b919b1825e68eb3285523f057fc42b5fde9e59a738ecdb1de0835af827db6284fc66848a10517a215389c4466f21b70e376f3fffc993aa338e47fca971d0af83
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Version: GnuPG v2.0.22 (GNU/Linux)
iQEcBAEBCAAGBQJRC/iKAAoJEBzRPIrUMBNCWsMH/2lfqcuuM0K8iz1S+NqGEd4p
QQWQanCUBmU4dZhUaPQs0Z8t+4vcOeWo2NV6jIg1aleZAFuUZ9uUpiqjQMcqoV53
E7cQw4lP+f+yIl4bRTGT0NVhQyboF4AQdJp+ACmzJv8rfYVR0J3hIsoV/6zvA3Ha
BIGpIaZ4kOdyVFs6jo4ZWkLdmjHNehwDm+CNJNA3Hzjb8hbTz3TLD7XCEOBsUXfS
a9HLZfWlfcVWxHpHQheo8wcemQBkZqx/F210oa1o70J1MfV0PJXXdR+gAsAJt19u
m83AIFTjryz5rsoVoSzX+gHh+yU15anZWnLh0siQ7UYl8RWEuos1d0MMGMJ4NWs=
=52oH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=y8Dd
-----END PGP SIGNATURE-----

View File

@ -1,25 +0,0 @@
respect user LINGUAS when installing translations
http://www.sudo.ws/pipermail/sudo-workers/2011-November/000701.html
diff -r ecd3533cb711 -r f99b940123fa Makefile.in
--- a/Makefile.in Fri Oct 07 13:52:45 2011 -0400
+++ b/Makefile.in Tue Nov 15 00:53:52 2011 -0500
@@ -226,6 +226,7 @@
install-nls:
@if test "$(NLS)" = "enabled"; then \
+ install_mos="$(LINGUAS)"; \
cd $(top_srcdir); \
for pot in $(POTFILES); do \
podir=`dirname $$pot`; \
@@ -233,6 +234,9 @@
echo $(ECHO_N) "Installing $$domain message catalogs:$(ECHO_C)"; \
for mo in $$podir/*.mo; do \
lang=`basename $$mo .mo`; \
+ if [ -n "$$install_mos" ]; then \
+ case " $$install_mos " in *" $$lang "*) :;; *) continue;; esac; \
+ fi; \
echo $(ECHO_N) " $$lang$(ECHO_C)"; \
$(SHELL) $(top_srcdir)/mkinstalldirs $(DESTDIR)$(localedir)/$$lang/LC_MESSAGES; \
$(INSTALL) -O $(install_uid) -G $(install_gid) -M 0644 $$mo $(DESTDIR)$(localedir)/$$lang/LC_MESSAGES/$$domain.mo; \

View File

@ -9,8 +9,14 @@
arguments.
</longdescription>
<use>
<flag name='sendmail'>
Allow sudo to send emails with sendmail.
</flag>
<flag name='offensive'>
Let sudo print insults when the user types the wrong password.
</flag>
</use>
<upstream>
<remote-id type="cpe">cpe:/a:todd_miller:sudo</remote-id>
</upstream>
</pkgmetadata>

View File

@ -0,0 +1,196 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.10_p2.ebuild,v 1.1 2014/03/18 18:37:22 polynomial-c Exp $
EAPI=5
inherit eutils pam multilib libtool versionator
MY_P=${P/_/}
MY_P=${MY_P/beta/b}
uri_prefix=
case ${P} in
*_beta*|*_rc*) uri_prefix=beta/ ;;
esac
DESCRIPTION="Allows users or groups to run commands as other users"
HOMEPAGE="http://www.sudo.ws/"
SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
# Basic license is ISC-style as-is, some files are released under
# 3-clause BSD license
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
ldap? (
>=net-nds/openldap-2.1.30-r1
dev-libs/cyrus-sasl
)
sys-libs/zlib"
RDEPEND="${DEPEND}
selinux? ( sec-policy/selinux-sudo )
ldap? ( dev-lang/perl )
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
S=${WORKDIR}/${MY_P}
REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
MAKEOPTS+=" SAMPLES="
src_prepare() {
elibtoolize
}
set_rootpath() {
# FIXME: secure_path is a compile time setting. using ROOTPATH
# is not perfect, env-update may invalidate this, but until it
# is available as a sudoers setting this will have to do.
einfo "Setting secure_path ..."
# first extract the default ROOTPATH from build env
ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
if [[ -z ${ROOTPATH} ]] ; then
ewarn " Failed to find ROOTPATH, please report this"
fi
# then remove duplicate path entries
cleanpath() {
local newpath thisp IFS=:
for thisp in $1 ; do
if [[ :${newpath}: != *:${thisp}:* ]] ; then
newpath+=:$thisp
else
einfo " Duplicate entry ${thisp} removed..."
fi
done
ROOTPATH=${newpath#:}
}
cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
# finally, strip gcc paths #136027
rmpath() {
local e newpath thisp IFS=:
for thisp in ${ROOTPATH} ; do
for e ; do [[ $thisp == $e ]] && continue 2 ; done
newpath+=:$thisp
done
ROOTPATH=${newpath#:}
}
rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
einfo "... done"
}
src_configure() {
local ROOTPATH
set_rootpath
# audit: somebody got to explain me how I can test this before I
# enable it.. - Diego
# plugindir: autoconf code is crappy and does not delay evaluation
# until `make` time, so we have to use a full path here rather than
# basing off other values.
econf \
--enable-zlib=system \
--with-secure-path="${ROOTPATH}" \
--with-editor="${EPREFIX}"/usr/libexec/editor \
--with-env-editor \
$(use_with offensive insults) \
$(use_with offensive all-insults) \
$(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
$(use_with ldap) \
$(use_enable nls) \
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-rundir="${EPREFIX}"/var/run/sudo \
--with-vardir="${EPREFIX}"/var/db/sudo \
--with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
--docdir="${EPREFIX}"/usr/share/doc/${PF}
}
src_install() {
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP
dosbin plugins/sudoers/sudoers2ldif
cat <<-EOF > "${T}"/ldap.conf.sudo
# See ldap.conf(5) and README.LDAP for details
# This file should only be readable by root
# supported directives: host, port, ssl, ldap_version
# uri, binddn, bindpw, sudoers_base, sudoers_debug
# tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
EOF
insinto /etc
doins "${T}"/ldap.conf.sudo
fperms 0440 /etc/ldap.conf.sudo
fi
pamd_mimic system-auth sudo auth account session
keepdir /var/db/sudo
fperms 0700 /var/db/sudo
# Don't install into /var/run as that is a tmpfs most of the time
# (bug #504854)
rm -rf "${D}"/var/run
}
pkg_postinst() {
if use ldap ; then
ewarn
ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
ewarn
if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
ewarn "configured in /etc/nsswitch.conf."
ewarn
ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
ewarn " sudoers: ldap files"
ewarn
fi
fi
if use prefix ; then
ewarn
ewarn "To use sudo, you need to change file ownership and permissions"
ewarn "with root privileges, as follows:"
ewarn
ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
ewarn
fi
elog "To use the -A (askpass) option, you need to install a compatible"
elog "password program from the following list. Starred packages will"
elog "automatically register for the use with sudo (but will not force"
elog "the -A option):"
elog ""
elog " [*] net-misc/ssh-askpass-fullscreen"
elog " net-misc/x11-ssh-askpass"
elog ""
elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
elog "variable to the program you want to use."
}

View File

@ -1,6 +1,6 @@
# Copyright 1999-2012 Gentoo Foundation
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.5_p2.ebuild,v 1.3 2012/09/29 10:17:44 ulm Exp $
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.5_p2.ebuild,v 1.5 2013/05/27 21:35:20 zx2c4 Exp $
EAPI="4"
@ -24,7 +24,7 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
@ -39,7 +39,7 @@ RDEPEND="${DEPEND}
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
virtual/mta"
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
@ -115,6 +115,7 @@ src_configure() {
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-timedir="${EPREFIX}"/var/db/sudo \
@ -123,7 +124,7 @@ src_configure() {
}
src_install() {
emake DESTDIR="${D}" install || die
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP

View File

@ -1,6 +1,6 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p3.ebuild,v 1.10 2013/01/22 17:34:33 ago Exp $
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p7.ebuild,v 1.13 2013/05/27 21:35:20 zx2c4 Exp $
EAPI=4
@ -23,8 +23,8 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
# 3-clause BSD license
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="~alpha amd64 arm hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey"
KEYWORDS="alpha amd64 arm hppa ia64 ~m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
@ -39,7 +39,7 @@ RDEPEND="${DEPEND}
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
virtual/mta"
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
@ -115,6 +115,7 @@ src_configure() {
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-timedir="${EPREFIX}"/var/db/sudo \
@ -123,7 +124,7 @@ src_configure() {
}
src_install() {
emake DESTDIR="${D}" install || die
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP

View File

@ -1,6 +1,6 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p6.ebuild,v 1.1 2013/02/01 17:16:32 flameeyes Exp $
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p8.ebuild,v 1.2 2013/05/27 21:35:20 zx2c4 Exp $
EAPI=4
@ -24,7 +24,7 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
@ -39,7 +39,7 @@ RDEPEND="${DEPEND}
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
virtual/mta"
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
@ -115,6 +115,7 @@ src_configure() {
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-timedir="${EPREFIX}"/var/db/sudo \
@ -123,7 +124,7 @@ src_configure() {
}
src_install() {
emake DESTDIR="${D}" install || die
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP

View File

@ -0,0 +1,191 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.8.ebuild,v 1.1 2013/10/10 18:49:58 chainsaw Exp $
EAPI=5
inherit eutils pam multilib libtool
MY_P=${P/_/}
MY_P=${MY_P/beta/b}
uri_prefix=
case ${P} in
*_beta*|*_rc*) uri_prefix=beta/ ;;
esac
DESCRIPTION="Allows users or groups to run commands as other users"
HOMEPAGE="http://www.sudo.ws/"
SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
# Basic license is ISC-style as-is, some files are released under
# 3-clause BSD license
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
ldap? (
>=net-nds/openldap-2.1.30-r1
dev-libs/cyrus-sasl
)
sys-libs/zlib"
RDEPEND="${DEPEND}
selinux? ( sec-policy/selinux-sudo )
ldap? ( dev-lang/perl )
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
S=${WORKDIR}/${MY_P}
REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
MAKEOPTS+=" SAMPLES="
src_prepare() {
elibtoolize
}
set_rootpath() {
# FIXME: secure_path is a compile time setting. using ROOTPATH
# is not perfect, env-update may invalidate this, but until it
# is available as a sudoers setting this will have to do.
einfo "Setting secure_path ..."
# first extract the default ROOTPATH from build env
ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
if [[ -z ${ROOTPATH} ]] ; then
ewarn " Failed to find ROOTPATH, please report this"
fi
# then remove duplicate path entries
cleanpath() {
local newpath thisp IFS=:
for thisp in $1 ; do
if [[ :${newpath}: != *:${thisp}:* ]] ; then
newpath+=:$thisp
else
einfo " Duplicate entry ${thisp} removed..."
fi
done
ROOTPATH=${newpath#:}
}
cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
# finally, strip gcc paths #136027
rmpath() {
local e newpath thisp IFS=:
for thisp in ${ROOTPATH} ; do
for e ; do [[ $thisp == $e ]] && continue 2 ; done
newpath+=:$thisp
done
ROOTPATH=${newpath#:}
}
rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
einfo "... done"
}
src_configure() {
local ROOTPATH
set_rootpath
# audit: somebody got to explain me how I can test this before I
# enable it.. - Diego
# plugindir: autoconf code is crappy and does not delay evaluation
# until `make` time, so we have to use a full path here rather than
# basing off other values.
econf \
--enable-zlib=system \
--with-secure-path="${ROOTPATH}" \
--with-editor="${EPREFIX}"/usr/libexec/editor \
--with-env-editor \
$(use_with offensive insults) \
$(use_with offensive all-insults) \
$(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
$(use_with ldap) \
$(use_enable nls) \
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-timedir="${EPREFIX}"/var/db/sudo \
--with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
--docdir="${EPREFIX}"/usr/share/doc/${PF}
}
src_install() {
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP
dosbin plugins/sudoers/sudoers2ldif
cat <<-EOF > "${T}"/ldap.conf.sudo
# See ldap.conf(5) and README.LDAP for details
# This file should only be readable by root
# supported directives: host, port, ssl, ldap_version
# uri, binddn, bindpw, sudoers_base, sudoers_debug
# tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
EOF
insinto /etc
doins "${T}"/ldap.conf.sudo
fperms 0440 /etc/ldap.conf.sudo
fi
pamd_mimic system-auth sudo auth account session
keepdir /var/db/sudo
fperms 0700 /var/db/sudo
}
pkg_postinst() {
if use ldap ; then
ewarn
ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
ewarn
if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
ewarn "configured in /etc/nsswitch.conf."
ewarn
ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
ewarn " sudoers: ldap files"
ewarn
fi
fi
if use prefix ; then
ewarn
ewarn "To use sudo, you need to change file ownership and permissions"
ewarn "with root privileges, as follows:"
ewarn
ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
ewarn
fi
elog "To use the -A (askpass) option, you need to install a compatible"
elog "password program from the following list. Starred packages will"
elog "automatically register for the use with sudo (but will not force"
elog "the -A option):"
elog ""
elog " [*] net-misc/ssh-askpass-fullscreen"
elog " net-misc/x11-ssh-askpass"
elog ""
elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
elog "variable to the program you want to use."
}

View File

@ -0,0 +1,191 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.9_p5.ebuild,v 1.1 2014/02/21 09:39:21 polynomial-c Exp $
EAPI=5
inherit eutils pam multilib libtool
MY_P=${P/_/}
MY_P=${MY_P/beta/b}
uri_prefix=
case ${P} in
*_beta*|*_rc*) uri_prefix=beta/ ;;
esac
DESCRIPTION="Allows users or groups to run commands as other users"
HOMEPAGE="http://www.sudo.ws/"
SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
# Basic license is ISC-style as-is, some files are released under
# 3-clause BSD license
LICENSE="ISC BSD"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
IUSE="ldap nls pam offensive selinux skey +sendmail"
DEPEND="pam? ( virtual/pam )
skey? ( >=sys-auth/skey-1.1.5-r1 )
ldap? (
>=net-nds/openldap-2.1.30-r1
dev-libs/cyrus-sasl
)
sys-libs/zlib"
RDEPEND="${DEPEND}
selinux? ( sec-policy/selinux-sudo )
ldap? ( dev-lang/perl )
pam? ( sys-auth/pambase )
>=app-misc/editor-wrapper-3
virtual/editor
sendmail? ( virtual/mta )"
DEPEND="${DEPEND}
sys-devel/bison"
S=${WORKDIR}/${MY_P}
REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
MAKEOPTS+=" SAMPLES="
src_prepare() {
elibtoolize
}
set_rootpath() {
# FIXME: secure_path is a compile time setting. using ROOTPATH
# is not perfect, env-update may invalidate this, but until it
# is available as a sudoers setting this will have to do.
einfo "Setting secure_path ..."
# first extract the default ROOTPATH from build env
ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
if [[ -z ${ROOTPATH} ]] ; then
ewarn " Failed to find ROOTPATH, please report this"
fi
# then remove duplicate path entries
cleanpath() {
local newpath thisp IFS=:
for thisp in $1 ; do
if [[ :${newpath}: != *:${thisp}:* ]] ; then
newpath+=:$thisp
else
einfo " Duplicate entry ${thisp} removed..."
fi
done
ROOTPATH=${newpath#:}
}
cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
# finally, strip gcc paths #136027
rmpath() {
local e newpath thisp IFS=:
for thisp in ${ROOTPATH} ; do
for e ; do [[ $thisp == $e ]] && continue 2 ; done
newpath+=:$thisp
done
ROOTPATH=${newpath#:}
}
rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
einfo "... done"
}
src_configure() {
local ROOTPATH
set_rootpath
# audit: somebody got to explain me how I can test this before I
# enable it.. - Diego
# plugindir: autoconf code is crappy and does not delay evaluation
# until `make` time, so we have to use a full path here rather than
# basing off other values.
econf \
--enable-zlib=system \
--with-secure-path="${ROOTPATH}" \
--with-editor="${EPREFIX}"/usr/libexec/editor \
--with-env-editor \
$(use_with offensive insults) \
$(use_with offensive all-insults) \
$(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
$(use_with ldap) \
$(use_enable nls) \
$(use_with pam) \
$(use_with skey) \
$(use_with selinux) \
$(use_with sendmail) \
--without-opie \
--without-linux-audit \
--with-timedir="${EPREFIX}"/var/db/sudo \
--with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
--docdir="${EPREFIX}"/usr/share/doc/${PF}
}
src_install() {
default
if use ldap ; then
dodoc README.LDAP doc/schema.OpenLDAP
dosbin plugins/sudoers/sudoers2ldif
cat <<-EOF > "${T}"/ldap.conf.sudo
# See ldap.conf(5) and README.LDAP for details
# This file should only be readable by root
# supported directives: host, port, ssl, ldap_version
# uri, binddn, bindpw, sudoers_base, sudoers_debug
# tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
EOF
insinto /etc
doins "${T}"/ldap.conf.sudo
fperms 0440 /etc/ldap.conf.sudo
fi
pamd_mimic system-auth sudo auth account session
keepdir /var/db/sudo
fperms 0700 /var/db/sudo
}
pkg_postinst() {
if use ldap ; then
ewarn
ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
ewarn
if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
ewarn "configured in /etc/nsswitch.conf."
ewarn
ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
ewarn " sudoers: ldap files"
ewarn
fi
fi
if use prefix ; then
ewarn
ewarn "To use sudo, you need to change file ownership and permissions"
ewarn "with root privileges, as follows:"
ewarn
ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
ewarn
fi
elog "To use the -A (askpass) option, you need to install a compatible"
elog "password program from the following list. Starred packages will"
elog "automatically register for the use with sudo (but will not force"
elog "the -A option):"
elog ""
elog " [*] net-misc/ssh-askpass-fullscreen"
elog " net-misc/x11-ssh-askpass"
elog ""
elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
elog "variable to the program you want to use."
}