From 294b94e73a8e2b97997217d21ab366a91108384a Mon Sep 17 00:00:00 2001 From: Michael Marineau Date: Tue, 25 Mar 2014 11:10:18 -0700 Subject: [PATCH] bump(app-admin/sudo): sync with upstream --- .../portage-stable/app-admin/sudo/ChangeLog | 104 +++++++++- .../portage-stable/app-admin/sudo/Manifest | 42 ++-- .../sudo/files/sudo-1.8.3_p1-linguas.patch | 25 --- .../app-admin/sudo/metadata.xml | 6 + .../app-admin/sudo/sudo-1.8.10_p2.ebuild | 196 ++++++++++++++++++ .../app-admin/sudo/sudo-1.8.5_p2.ebuild | 11 +- ...o-1.8.6_p3.ebuild => sudo-1.8.6_p7.ebuild} | 11 +- ...o-1.8.6_p6.ebuild => sudo-1.8.6_p8.ebuild} | 9 +- .../app-admin/sudo/sudo-1.8.8.ebuild | 191 +++++++++++++++++ .../app-admin/sudo/sudo-1.8.9_p5.ebuild | 191 +++++++++++++++++ 10 files changed, 730 insertions(+), 56 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/app-admin/sudo/files/sudo-1.8.3_p1-linguas.patch create mode 100644 sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.10_p2.ebuild rename sdk_container/src/third_party/portage-stable/app-admin/sudo/{sudo-1.8.6_p3.ebuild => sudo-1.8.6_p7.ebuild} (93%) rename sdk_container/src/third_party/portage-stable/app-admin/sudo/{sudo-1.8.6_p6.ebuild => sudo-1.8.6_p8.ebuild} (95%) create mode 100644 sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.8.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.9_p5.ebuild diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/ChangeLog b/sdk_container/src/third_party/portage-stable/app-admin/sudo/ChangeLog index 90d41d77e5..33b438ebf6 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/ChangeLog +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/ChangeLog @@ -1,6 +1,106 @@ # ChangeLog for app-admin/sudo -# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.337 2013/02/01 17:16:32 flameeyes Exp $ +# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.362 2014/03/18 18:37:22 polynomial-c Exp $ + +*sudo-1.8.10_p2 (18 Mar 2014) + + 18 Mar 2014; Lars Wendler -sudo-1.8.10_p1.ebuild, + +sudo-1.8.10_p2.ebuild: + Version bump. Removed old. + + 17 Mar 2014; Lars Wendler sudo-1.8.10_p1.ebuild: + Don't install into /var/run as that is a tmpfs most of the time (bug + #504854). + +*sudo-1.8.10_p1 (14 Mar 2014) + + 14 Mar 2014; Lars Wendler -sudo-1.8.10.ebuild, + +sudo-1.8.10_p1.ebuild: + Version bump. Removed old. + +*sudo-1.8.10 (13 Mar 2014) + + 13 Mar 2014; Lars Wendler +sudo-1.8.10.ebuild: + Version bump. + +*sudo-1.8.9_p5 (21 Feb 2014) + + 21 Feb 2014; Lars Wendler +sudo-1.8.9_p5.ebuild: + Version bump (bug #501966). + +*sudo-1.8.8 (10 Oct 2013) + + 10 Oct 2013; Tony Vroon +sudo-1.8.8.ebuild: + Version bump, as requested by "teidakankan" & "Ulenrich" in bug #481392. Now + produces useful error messages if there is an error in the configuration + file. Line continuation with backslashes is now supported. Improved HP-UX & + Solaris support. No longer assumes BSD group semantics. + + 05 Jun 2013; Mike Frysinger metadata.xml: + Add upstream CPE tag (security info) from ChromiumOS. + + 27 May 2013; Jason A. Donenfeld metadata.xml, + sudo-1.8.5_p2.ebuild, sudo-1.8.6_p7.ebuild, sudo-1.8.6_p8.ebuild: + Per discussion with flameeyes and zmedico, introduce sendmail USE flag to make + packages.provided less compelling. + +*sudo-1.8.6_p8 (15 Apr 2013) + + 15 Apr 2013; Diego E. Pettenò +sudo-1.8.6_p8.ebuild, + -sudo-1.8.6_p3.ebuild: + Version bump and remove old. + + 14 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for sh, wrt bug #459722 + + 13 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for s390, wrt bug #459722 + + 13 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for sparc, wrt bug #459722 + + 12 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for ia64, wrt bug #459722 + + 12 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for x86, wrt bug #459722 + + 11 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for alpha, wrt bug #459722 + + 11 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for ppc64, wrt bug #459722 + + 11 Apr 2013; Agostino Sarubbo sudo-1.8.6_p7.ebuild: + Stable for ppc, wrt bug #459722 + + 09 Apr 2013; Jeroen Roovers sudo-1.8.6_p7.ebuild: + Stable for HPPA (bug #459722). + + 09 Apr 2013; Sergey Popov sudo-1.8.6_p7.ebuild: + Stable on arm, wrt bug #459722 + + 09 Apr 2013; Sergey Popov sudo-1.8.6_p7.ebuild: + Stable on amd64, wrt bug #459722 + +*sudo-1.8.6_p7 (28 Feb 2013) + + 28 Feb 2013; Diego E. Pettenò +sudo-1.8.6_p7.ebuild, + -sudo-1.8.6_p6.ebuild: + Version bump; remove old. + + 24 Feb 2013; Agostino Sarubbo sudo-1.8.6_p3.ebuild: + Stable for sh, wrt bug #452602 + + 20 Feb 2013; Agostino Sarubbo sudo-1.8.6_p3.ebuild: + Stable for s390, wrt bug #452602 + + 08 Feb 2013; Mike Frysinger sudo-1.8.5_p2.ebuild, + sudo-1.8.6_p3.ebuild, sudo-1.8.6_p6.ebuild: + Use `default` to install. + + 04 Feb 2013; Agostino Sarubbo sudo-1.8.6_p3.ebuild: + Stable for alpha, wrt bug #452602 *sudo-1.8.6_p6 (01 Feb 2013) diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/Manifest b/sdk_container/src/third_party/portage-stable/app-admin/sudo/Manifest index 45d99bdee5..cab56b7ee7 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/Manifest +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/Manifest @@ -1,22 +1,34 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 +DIST sudo-1.8.10p2.tar.gz 2261235 SHA256 ba6cb8db6dccdb92a96e8ae63ca65c410f8b61270b603ab9af4b1154fef379f1 SHA512 c746489dbe57804d05261d784a949b2231e5b96a7c8caf51cf9021a092aebd04ebf31a0e89390a64197f684b2e63405b6715eff20b71b1f5772f183bcd47cce1 WHIRLPOOL 0842e85916cdbf6167ab7d632484973b3d43cdf93c2de53e70b59068245bac5545e2c9b9347f49437a00a08c1d726bc66535092d9fe114ab141eb2ebe5aaee76 DIST sudo-1.8.5p2.tar.gz 1746344 SHA256 c32ae2bc3faf83444c82ca75ccb10ad3684d8222e3535f164c4a4db7cdddf8cf SHA512 616967eea79f91cda2b0cd1d13ed453d20142521ecfca289432bdf5708ac0549c7873fd80170cc0481390e82f1e60fb0bffcfc7c6b70d5d721aa98d23361c5cb WHIRLPOOL ac0d2c040935c54947571a0d4671be70aaaf7a6f69cb097acd321718656d4c569b0db4191eaf943c6b642a1d641263429287241a236a0f2a0c9edf973710bf8b -DIST sudo-1.8.6p3.tar.gz 1854962 SHA256 8130df04268f678880c3f423337c56e7d437a0f508a46b1dfefae16b0b20c92e SHA512 239cd838afba3aa9c7123d19017e997a332e6434b744bdac1cfbdf911595b642c2b7b635761e15c4835dfa15058df7d0e003892a501288bd793c4d676f746051 WHIRLPOOL a109beab4f9709fc00fe8050468a30e73de971db0e8c2bc4d4cdf82fdbcd8e47ed939b34dc675dc700e59c12a412af203ed75b71649157d2df48af3b51c08f10 -DIST sudo-1.8.6p6.tar.gz 1857449 SHA256 d600fee5cb2e843450263a2b8f133b9921ffa00cb6b841b0da82613447cefb7c SHA512 17b7ee567fb5e24766b42a80d668e4dd3f8f3da319661cb652b0d5b2d98b4cb2f8a0e2ada14013937799896c32caf9c7ff9de6515cf20cde28510a84b8b81264 WHIRLPOOL 40b7f5cac63360516cc4e893e598f06c0cf2ed2c714eed35db5242c535e2f1f95523db4dc46b5ded2df5d439b1fcbf3c14991d64aa411b89f240d955da1f09ed -EBUILD sudo-1.8.5_p2.ebuild 5441 SHA256 6b4d10e763688690280377221132f63ea5fe622119768d1021a5fc29fa5f299c SHA512 6230aaa9ed2d9feca2a100de1d086f4cabcb5006d58865d20c7db97b597c0e1a69e2a390c9167331d79cc9ff0b9da168419a727cf2da84b8817fe498f43440cd WHIRLPOOL e217dd1e7ee40cd4939f6eade3ade8cd9ec4dc58abfccc3673333b17ddf25ee29b1519ad3d0c659c9d95f05bf149b55b777758482b8a78aab4448c6a909f92bf -EBUILD sudo-1.8.6_p3.ebuild 5444 SHA256 2dbdfd842222aaa58d8278d3005984931c015e4809c3b198806ad0c54bb40e82 SHA512 75de9ada12b3f1659aa7707a02cbadf63eb16a4954ea171d2b697650070b62d04727b152931466e95a5270949e2bb3edacc6196a793d9f47d8616c5d01f20e1a WHIRLPOOL 5ea4cb05f23f46df63c7da1b77a4fed79efdf6cd4ee6321303d05f0bd6599a9bfd486632ce89f2b08c7f23d15ab63b5e22068cc392feb2bf83e904151fa27bc1 -EBUILD sudo-1.8.6_p6.ebuild 5457 SHA256 697b68a17d5386832a7a2a10256f81b5d6e601e276a95fadb13dd2793e879f7e SHA512 5ab40f2493abd98b3b6d35019fbd8f92b052c9a92925c343eb7f2a2ec70f02f94f685824298741108877e6fbeff11a8e0669e6b08272054a70a34166e8a3f172 WHIRLPOOL 9afa16dddd2dd860f1ef139e80c6fa1fb99d238be2c1309a44e0339180ee39b6cdabc70695afc53668ab85993fae8adf4efc323eb93809a561db24ffd33866ad -MISC ChangeLog 49051 SHA256 744b2ea56bd52a744c37347a3f6252dd2873e89ccc238924ea005de495374fab SHA512 f15eb9b7335f997046106760868ab50deea241b9b2c333782bbb33dc0512790a14b8ec376084d761c9a46a2a86ded261adfb978c38d585ce0cc5ac0ae56d41c2 WHIRLPOOL 2a7c2ade3128f2d7baa9d5947246cdf161eccfcd14585f4ebcc2d58e22aa439d316ac73afe7f374b3538a39a5f6c955aff87c9f9b20f037c7d08609c608e2f72 -MISC metadata.xml 560 SHA256 465d0ea14b7db3ecd0bad7c175f9e17003794145f5f59c4941f848960c91048a SHA512 97bdce0d3972fd6f8ae58ddcb87c002a0384a6f6392347f5035f4f16581e665f3121d5ab5abdea1a9ec87122b10310f0ff99697de1749b418f61cc92217c58be WHIRLPOOL a7cddcabfcb73965df21adbe163117549eea126d424e065f14ab0cec76ad608a6b4506be013e2709e071e2e1d370c7c4188a8eb0aafba9f9b16266373fc29f80 +DIST sudo-1.8.6p7.tar.gz 1858348 SHA256 301089edb22356f59d097f6abbe1303f03927a38691b02959d618546c2125036 SHA512 732bcbd53b77d329bbc77d3cd3644a595e938433053122fe3098385c0ad3a6a9cf4f4ab8709c7a79cad51dba77ffaa1be9ffde8e8834d3798822a1bd5b518d42 WHIRLPOOL 875984b44b571dc3765aab5ad8bd8859d0cd680e7da453109b5bee45aac336e3d0c05e1133ce0101a6dd2b9f19a26454d3e0b11c0edf32034f9fae04d3dfbb4d +DIST sudo-1.8.6p8.tar.gz 1858612 SHA256 c0baaa87f59153967b650a0dde2f7d4147d358fa15f3fdabb47e84d0282fe625 SHA512 9c9d297e8cba4ae74a1358b23da15beea4649684afa09b3c3486bd25454008b4c7cd543266f8abc22aac48a56912d7174ccfc137a69670e737d6c9939708cb80 WHIRLPOOL f19c882a2b3de4f41ee97b1f26ebe284782c82500dfc2f86edd262b3ec9f10a2fb3c8b20f26cd1587910677b169ed0260a9672db4dc7b1ea8d5d817235f6197c +DIST sudo-1.8.8.tar.gz 2117145 SHA256 9f911c1e9297fb8006deb52fa81197a8d06b9d54e70672f723c467ecae992fc9 SHA512 e56ea849c2e6470a3d97fc76bde6af145938cf2df4d17f3faef00368262d8e2dd5bcc7e3adf490e853e23466b15638000a527156bd694ce4980003d751c896d5 WHIRLPOOL 74fad850b4f370775f3c5611235b7f20837267f599ace4350f6498ce21cf12e94c1efb98017656106305398496c2f1ff992700fe5fbde4fcf47ca5210cddfdc6 +DIST sudo-1.8.9p5.tar.gz 2179066 SHA256 bc9d5c96de5f8b4d2b014f87a37870aef60d2891c869202454069150a21a5c21 SHA512 ebd1af9724e135db2e553e59c96f22f6f25885b7ba35767657a26d319bb074987833329084cc07271946b2ef7165567f63ccad11ccf290cef3f77953a6fd7a28 WHIRLPOOL 63940daa38d7d9dea8f3ca41c637935e00fd7439a09de3300f8b875382c142e4328c3d9034273e920a9987e70358157f3fba6d5683b6b94badf00ad5aa8b8293 +EBUILD sudo-1.8.10_p2.ebuild 5645 SHA256 0afa325499e6e717bd6ba4ac90200afb9ca5eedbd7eef181c0339bb8c7ab48ba SHA512 193e95bd8e7e4a5637d8f5954736960e5636875a6855618d9557067b73a3d79a14806a0f7e79986bc8cb77e1a95c4c0611d8aef7aa507b3bf3585fe70107fda1 WHIRLPOOL ee4bbe100309f887b6a909ea200aac741107940be38483bc419f6c9aab2d3df5b3a8b39453518b26c78902fac3a380c0292c8aba6ed1f044a46270c7eca65fe9 +EBUILD sudo-1.8.5_p2.ebuild 5464 SHA256 5a647b0c4a2949e476277ead580f6a42747f7778b282dd1e034a2c010c784a9e SHA512 34cc788ee019ccaf8e2f74dbae5e668d8fb94dab066bea49f3a37f31210a66c9327686e5c5f44a966321f26e3ccc5e2aa47fdb46b35285e96f266eafbddbc741 WHIRLPOOL 532a4151b0acbec600552cca4b18b54afba14a48e91640dd85642c4571e993e1a8eb20e03e83ef3f901a8f6eb6c63c2a5aec7650020e5e58f0d7911790d419f5 +EBUILD sudo-1.8.6_p7.ebuild 5464 SHA256 4f58dcb19ec413e99144a4806d5d7d68c5f9e3bbc4d8b0d77efb8df8dd147e57 SHA512 ed1575681e3e84d42d97f4465af3c3f33fa82d645d49a2219047728b22d0d7cbfb7c4e8a34ffce55da18ce67db84d6e40907c571231fa16acdef18bfa41cabc4 WHIRLPOOL a74177a5effbe3379a7da469f6cdaf5bd0263b777cbdecf8c02bf9956bc4cce3de35a2727f0e275f76ba94b1f0fff738d04d5102b83ac739bb99db624d919a1b +EBUILD sudo-1.8.6_p8.ebuild 5474 SHA256 9a8b19e57ca0ed59d0b371352842c6539c714b8c163c97f81fbcf2f2d227cd9a SHA512 730229e13bb4b3591ab6a0a0ba3a9090d47b8cb3d425b4472ef33ca845b3522771443568fcf05f83b9cd7e465d8566a1e569de11ca0427693a74c9438118fbaf WHIRLPOOL ff4756e3505a293bbc67ae2933414b3c42b0cb5006bded4e280d97487f593cc288dddaa1b196137bebc03f97c928528226d52f06f170304dba3b868b0a8ef291 +EBUILD sudo-1.8.8.ebuild 5474 SHA256 597d3cfa588d3e47d07be11cd2aa6df137951167c27043ce5ac06f710f49fdaf SHA512 223c0b1caf6797242a0db709eef46a5951959ed83aaeb25624c47ca39b76d2922ea79e8b8b1204195ad6bf7ec1ab4985770552d26be2a57728767ece2ce9bd43 WHIRLPOOL 7dad9dfaaf610212bbc5c1d6f133f1761885757df32cc3bb1166a29910a68089281c84b256d2b61bf3bf150e3bd458081f7039ff697a9b20bc5e86d36d8c1309 +EBUILD sudo-1.8.9_p5.ebuild 5481 SHA256 8705bae8d24b7730840b2897846a72bbe031fe2d1c50284e87785ec3353bf7d2 SHA512 5a83aadb46ecd1076f486a3a9dcc5f7cbfe244de49bc2413a2cdfb80c2eccfe4e1db767099db29bd4bd311ecd469ceec7c1a2ac3c60fa71fb3639ac48cc84075 WHIRLPOOL 21bb3e3e0eb7fd828afc3e4bc122843642844c7c6d9046382daac52f28bf10cac57aa08dbc37e9bc48c41d2955736698c53f1a39e0801b3efa801ca7d44e643c +MISC ChangeLog 52529 SHA256 912bc80f4e32453379b99e660e3ed79089106a62db2ff0f5dffc0ffeeff24478 SHA512 949c2956db687dfb7d0bb140c9777fb0f434efcffb2675a238084d49704600c50c46ada6c477b09be5df766cb06d5d06db9fe990a753ea2da73cebe176bb917b WHIRLPOOL 52009cde8363f6425bfe94c6219a1485bc5894a8c317d3e4e7ac2de5d3b2ddb79aab44044fd92b7c3fa321f158c1cb450d246304ac237908015adf14a3261879 +MISC metadata.xml 726 SHA256 242e8a573d76b2163a928259e5226fff2c237b3e9c244860a1430fa79c5b390e SHA512 d0a7e5f53ec823d84e3c38c2bd64ba566d7cbd08c12ebf3e9b9fed10b77ce2e3e951e262f1a307aa8f0819a662559ca6f9bcf86cf05088480413e4534ce299d3 WHIRLPOOL b919b1825e68eb3285523f057fc42b5fde9e59a738ecdb1de0835af827db6284fc66848a10517a215389c4466f21b70e376f3fffc993aa338e47fca971d0af83 -----BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.19 (GNU/Linux) +Version: GnuPG v2.0.22 (GNU/Linux) -iQEcBAEBCAAGBQJRC/iKAAoJEBzRPIrUMBNCWsMH/2lfqcuuM0K8iz1S+NqGEd4p -QQWQanCUBmU4dZhUaPQs0Z8t+4vcOeWo2NV6jIg1aleZAFuUZ9uUpiqjQMcqoV53 -E7cQw4lP+f+yIl4bRTGT0NVhQyboF4AQdJp+ACmzJv8rfYVR0J3hIsoV/6zvA3Ha -BIGpIaZ4kOdyVFs6jo4ZWkLdmjHNehwDm+CNJNA3Hzjb8hbTz3TLD7XCEOBsUXfS -a9HLZfWlfcVWxHpHQheo8wcemQBkZqx/F210oa1o70J1MfV0PJXXdR+gAsAJt19u -m83AIFTjryz5rsoVoSzX+gHh+yU15anZWnLh0siQ7UYl8RWEuos1d0MMGMJ4NWs= -=52oH +iQIcBAEBCAAGBQJTKJJjAAoJEPiazRVxLXTF8J0P/2nm8t+D487lxFmi9Zvn1j2g +x75le1V/KfC2Ga+V1BYBSCu8qV3xuPCl8ngknKkCBIViTdSgT0eoCn36yAaQH1aa +EqJitM7zsYrNKxIBkqt2AfLcgoQV8FQxu/mAzaV+jmt7yrSJEAjNMY6R882MpEY8 +Ghb/sI6AIJ1Iqlu3HcHdI90r2CFDndiqJ4Xqo+qICbsl/VrEpssrj0UkSZ8yw8xZ +gt2LOhBbfAAgP/E9ZXnulNzd57Bjg2kGUieMZFUQ6vhyhB9VUhk35pVRcHt9LRQP +O3gDiG/6JWPKVSPjWs3d//X7ocNlXkujYiCrWF0OUFcxv3NdmNsY16r0sCPjX5w1 +HkyqvcIWCiLm8NSOvT9bP9an/7ahGFxHe8XSeCBLUN0rIqqQ9S+lKGl2NV1fEQqn +l3zxBVCnjZH17U8f5sZ1uIj+etnCAu5G4Aeh4vnCNOnaoIHlRLJBQn1Yl6chn4TL +OwAaEV9oX8bpV6FzMFtJbrMQgCz0+89Z2GZV1one/k3BOkSRn6rVGAYcrx07i+tK +4smVOtAiS0kHgWpO0Tb3MbRGeQWFS1XWgaBlYRYI6ms5cyWR1gCKtqnPYUrwQ7fs +OrGYGVawodPMbS9VQuHiVPQlrhJch7MiV1ZlcdT4pG3L8/3JJzW+8I90mfTkLzFi +g3o2Dm5VbPWvSuQmn/3M +=y8Dd -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/files/sudo-1.8.3_p1-linguas.patch b/sdk_container/src/third_party/portage-stable/app-admin/sudo/files/sudo-1.8.3_p1-linguas.patch deleted file mode 100644 index 68c34aa48f..0000000000 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/files/sudo-1.8.3_p1-linguas.patch +++ /dev/null @@ -1,25 +0,0 @@ -respect user LINGUAS when installing translations - -http://www.sudo.ws/pipermail/sudo-workers/2011-November/000701.html - -diff -r ecd3533cb711 -r f99b940123fa Makefile.in ---- a/Makefile.in Fri Oct 07 13:52:45 2011 -0400 -+++ b/Makefile.in Tue Nov 15 00:53:52 2011 -0500 -@@ -226,6 +226,7 @@ - - install-nls: - @if test "$(NLS)" = "enabled"; then \ -+ install_mos="$(LINGUAS)"; \ - cd $(top_srcdir); \ - for pot in $(POTFILES); do \ - podir=`dirname $$pot`; \ -@@ -233,6 +234,9 @@ - echo $(ECHO_N) "Installing $$domain message catalogs:$(ECHO_C)"; \ - for mo in $$podir/*.mo; do \ - lang=`basename $$mo .mo`; \ -+ if [ -n "$$install_mos" ]; then \ -+ case " $$install_mos " in *" $$lang "*) :;; *) continue;; esac; \ -+ fi; \ - echo $(ECHO_N) " $$lang$(ECHO_C)"; \ - $(SHELL) $(top_srcdir)/mkinstalldirs $(DESTDIR)$(localedir)/$$lang/LC_MESSAGES; \ - $(INSTALL) -O $(install_uid) -G $(install_gid) -M 0644 $$mo $(DESTDIR)$(localedir)/$$lang/LC_MESSAGES/$$domain.mo; \ diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/metadata.xml b/sdk_container/src/third_party/portage-stable/app-admin/sudo/metadata.xml index ecd156ea2f..9116d3c7e0 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/metadata.xml @@ -9,8 +9,14 @@ arguments. + + Allow sudo to send emails with sendmail. + Let sudo print insults when the user types the wrong password. + + cpe:/a:todd_miller:sudo + diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.10_p2.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.10_p2.ebuild new file mode 100644 index 0000000000..d1732a082e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.10_p2.ebuild @@ -0,0 +1,196 @@ +# Copyright 1999-2014 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.10_p2.ebuild,v 1.1 2014/03/18 18:37:22 polynomial-c Exp $ + +EAPI=5 + +inherit eutils pam multilib libtool versionator + +MY_P=${P/_/} +MY_P=${MY_P/beta/b} + +uri_prefix= +case ${P} in +*_beta*|*_rc*) uri_prefix=beta/ ;; +esac + +DESCRIPTION="Allows users or groups to run commands as other users" +HOMEPAGE="http://www.sudo.ws/" +SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz + ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" + +# Basic license is ISC-style as-is, some files are released under +# 3-clause BSD license +LICENSE="ISC BSD" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" +IUSE="ldap nls pam offensive selinux skey +sendmail" + +DEPEND="pam? ( virtual/pam ) + skey? ( >=sys-auth/skey-1.1.5-r1 ) + ldap? ( + >=net-nds/openldap-2.1.30-r1 + dev-libs/cyrus-sasl + ) + sys-libs/zlib" +RDEPEND="${DEPEND} + selinux? ( sec-policy/selinux-sudo ) + ldap? ( dev-lang/perl ) + pam? ( sys-auth/pambase ) + >=app-misc/editor-wrapper-3 + virtual/editor + sendmail? ( virtual/mta )" +DEPEND="${DEPEND} + sys-devel/bison" + +S=${WORKDIR}/${MY_P} + +REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" + +MAKEOPTS+=" SAMPLES=" + +src_prepare() { + elibtoolize +} + +set_rootpath() { + # FIXME: secure_path is a compile time setting. using ROOTPATH + # is not perfect, env-update may invalidate this, but until it + # is available as a sudoers setting this will have to do. + einfo "Setting secure_path ..." + + # first extract the default ROOTPATH from build env + ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") + if [[ -z ${ROOTPATH} ]] ; then + ewarn " Failed to find ROOTPATH, please report this" + fi + + # then remove duplicate path entries + cleanpath() { + local newpath thisp IFS=: + for thisp in $1 ; do + if [[ :${newpath}: != *:${thisp}:* ]] ; then + newpath+=:$thisp + else + einfo " Duplicate entry ${thisp} removed..." + fi + done + ROOTPATH=${newpath#:} + } + cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} + + # finally, strip gcc paths #136027 + rmpath() { + local e newpath thisp IFS=: + for thisp in ${ROOTPATH} ; do + for e ; do [[ $thisp == $e ]] && continue 2 ; done + newpath+=:$thisp + done + ROOTPATH=${newpath#:} + } + rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' + + einfo "... done" +} + +src_configure() { + local ROOTPATH + set_rootpath + + # audit: somebody got to explain me how I can test this before I + # enable it.. - Diego + # plugindir: autoconf code is crappy and does not delay evaluation + # until `make` time, so we have to use a full path here rather than + # basing off other values. + econf \ + --enable-zlib=system \ + --with-secure-path="${ROOTPATH}" \ + --with-editor="${EPREFIX}"/usr/libexec/editor \ + --with-env-editor \ + $(use_with offensive insults) \ + $(use_with offensive all-insults) \ + $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ + $(use_with ldap) \ + $(use_enable nls) \ + $(use_with pam) \ + $(use_with skey) \ + $(use_with selinux) \ + $(use_with sendmail) \ + --without-opie \ + --without-linux-audit \ + --with-rundir="${EPREFIX}"/var/run/sudo \ + --with-vardir="${EPREFIX}"/var/db/sudo \ + --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ + --docdir="${EPREFIX}"/usr/share/doc/${PF} +} + +src_install() { + default + + if use ldap ; then + dodoc README.LDAP doc/schema.OpenLDAP + dosbin plugins/sudoers/sudoers2ldif + + cat <<-EOF > "${T}"/ldap.conf.sudo + # See ldap.conf(5) and README.LDAP for details + # This file should only be readable by root + + # supported directives: host, port, ssl, ldap_version + # uri, binddn, bindpw, sudoers_base, sudoers_debug + # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key + EOF + + insinto /etc + doins "${T}"/ldap.conf.sudo + fperms 0440 /etc/ldap.conf.sudo + fi + + pamd_mimic system-auth sudo auth account session + + keepdir /var/db/sudo + fperms 0700 /var/db/sudo + + # Don't install into /var/run as that is a tmpfs most of the time + # (bug #504854) + rm -rf "${D}"/var/run +} + +pkg_postinst() { + if use ldap ; then + ewarn + ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." + ewarn + if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then + ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" + ewarn "configured in /etc/nsswitch.conf." + ewarn + ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" + ewarn " sudoers: ldap files" + ewarn + fi + fi + if use prefix ; then + ewarn + ewarn "To use sudo, you need to change file ownership and permissions" + ewarn "with root privileges, as follows:" + ewarn + ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" + ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" + ewarn " # chown root:root ${EPREFIX}/var/db/sudo" + ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" + ewarn + fi + + elog "To use the -A (askpass) option, you need to install a compatible" + elog "password program from the following list. Starred packages will" + elog "automatically register for the use with sudo (but will not force" + elog "the -A option):" + elog "" + elog " [*] net-misc/ssh-askpass-fullscreen" + elog " net-misc/x11-ssh-askpass" + elog "" + elog "You can override the choice by setting the SUDO_ASKPASS environmnent" + elog "variable to the program you want to use." +} diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.5_p2.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.5_p2.ebuild index 889e2fc022..e6ec0a6d97 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.5_p2.ebuild +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.5_p2.ebuild @@ -1,6 +1,6 @@ -# Copyright 1999-2012 Gentoo Foundation +# Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.5_p2.ebuild,v 1.3 2012/09/29 10:17:44 ulm Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.5_p2.ebuild,v 1.5 2013/05/27 21:35:20 zx2c4 Exp $ EAPI="4" @@ -24,7 +24,7 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz LICENSE="ISC BSD" SLOT="0" KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey" +IUSE="ldap nls pam offensive selinux skey +sendmail" DEPEND="pam? ( virtual/pam ) skey? ( >=sys-auth/skey-1.1.5-r1 ) @@ -39,7 +39,7 @@ RDEPEND="${DEPEND} pam? ( sys-auth/pambase ) >=app-misc/editor-wrapper-3 virtual/editor - virtual/mta" + sendmail? ( virtual/mta )" DEPEND="${DEPEND} sys-devel/bison" @@ -115,6 +115,7 @@ src_configure() { $(use_with pam) \ $(use_with skey) \ $(use_with selinux) \ + $(use_with sendmail) \ --without-opie \ --without-linux-audit \ --with-timedir="${EPREFIX}"/var/db/sudo \ @@ -123,7 +124,7 @@ src_configure() { } src_install() { - emake DESTDIR="${D}" install || die + default if use ldap ; then dodoc README.LDAP doc/schema.OpenLDAP diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p3.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p7.ebuild similarity index 93% rename from sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p3.ebuild rename to sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p7.ebuild index 5d68728f25..a862dd0c40 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p3.ebuild +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p7.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p3.ebuild,v 1.10 2013/01/22 17:34:33 ago Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p7.ebuild,v 1.13 2013/05/27 21:35:20 zx2c4 Exp $ EAPI=4 @@ -23,8 +23,8 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz # 3-clause BSD license LICENSE="ISC BSD" SLOT="0" -KEYWORDS="~alpha amd64 arm hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey" +KEYWORDS="alpha amd64 arm hppa ia64 ~m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" +IUSE="ldap nls pam offensive selinux skey +sendmail" DEPEND="pam? ( virtual/pam ) skey? ( >=sys-auth/skey-1.1.5-r1 ) @@ -39,7 +39,7 @@ RDEPEND="${DEPEND} pam? ( sys-auth/pambase ) >=app-misc/editor-wrapper-3 virtual/editor - virtual/mta" + sendmail? ( virtual/mta )" DEPEND="${DEPEND} sys-devel/bison" @@ -115,6 +115,7 @@ src_configure() { $(use_with pam) \ $(use_with skey) \ $(use_with selinux) \ + $(use_with sendmail) \ --without-opie \ --without-linux-audit \ --with-timedir="${EPREFIX}"/var/db/sudo \ @@ -123,7 +124,7 @@ src_configure() { } src_install() { - emake DESTDIR="${D}" install || die + default if use ldap ; then dodoc README.LDAP doc/schema.OpenLDAP diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p6.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p8.ebuild similarity index 95% rename from sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p6.ebuild rename to sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p8.ebuild index 6aa5bc4c5a..173c31cd36 100644 --- a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p6.ebuild +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.6_p8.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p6.ebuild,v 1.1 2013/02/01 17:16:32 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p8.ebuild,v 1.2 2013/05/27 21:35:20 zx2c4 Exp $ EAPI=4 @@ -24,7 +24,7 @@ SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz LICENSE="ISC BSD" SLOT="0" KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey" +IUSE="ldap nls pam offensive selinux skey +sendmail" DEPEND="pam? ( virtual/pam ) skey? ( >=sys-auth/skey-1.1.5-r1 ) @@ -39,7 +39,7 @@ RDEPEND="${DEPEND} pam? ( sys-auth/pambase ) >=app-misc/editor-wrapper-3 virtual/editor - virtual/mta" + sendmail? ( virtual/mta )" DEPEND="${DEPEND} sys-devel/bison" @@ -115,6 +115,7 @@ src_configure() { $(use_with pam) \ $(use_with skey) \ $(use_with selinux) \ + $(use_with sendmail) \ --without-opie \ --without-linux-audit \ --with-timedir="${EPREFIX}"/var/db/sudo \ @@ -123,7 +124,7 @@ src_configure() { } src_install() { - emake DESTDIR="${D}" install || die + default if use ldap ; then dodoc README.LDAP doc/schema.OpenLDAP diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.8.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.8.ebuild new file mode 100644 index 0000000000..e4f42bd858 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.8.ebuild @@ -0,0 +1,191 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.8.ebuild,v 1.1 2013/10/10 18:49:58 chainsaw Exp $ + +EAPI=5 + +inherit eutils pam multilib libtool + +MY_P=${P/_/} +MY_P=${MY_P/beta/b} + +uri_prefix= +case ${P} in +*_beta*|*_rc*) uri_prefix=beta/ ;; +esac + +DESCRIPTION="Allows users or groups to run commands as other users" +HOMEPAGE="http://www.sudo.ws/" +SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz + ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" + +# Basic license is ISC-style as-is, some files are released under +# 3-clause BSD license +LICENSE="ISC BSD" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" +IUSE="ldap nls pam offensive selinux skey +sendmail" + +DEPEND="pam? ( virtual/pam ) + skey? ( >=sys-auth/skey-1.1.5-r1 ) + ldap? ( + >=net-nds/openldap-2.1.30-r1 + dev-libs/cyrus-sasl + ) + sys-libs/zlib" +RDEPEND="${DEPEND} + selinux? ( sec-policy/selinux-sudo ) + ldap? ( dev-lang/perl ) + pam? ( sys-auth/pambase ) + >=app-misc/editor-wrapper-3 + virtual/editor + sendmail? ( virtual/mta )" +DEPEND="${DEPEND} + sys-devel/bison" + +S=${WORKDIR}/${MY_P} + +REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" + +MAKEOPTS+=" SAMPLES=" + +src_prepare() { + elibtoolize +} + +set_rootpath() { + # FIXME: secure_path is a compile time setting. using ROOTPATH + # is not perfect, env-update may invalidate this, but until it + # is available as a sudoers setting this will have to do. + einfo "Setting secure_path ..." + + # first extract the default ROOTPATH from build env + ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") + if [[ -z ${ROOTPATH} ]] ; then + ewarn " Failed to find ROOTPATH, please report this" + fi + + # then remove duplicate path entries + cleanpath() { + local newpath thisp IFS=: + for thisp in $1 ; do + if [[ :${newpath}: != *:${thisp}:* ]] ; then + newpath+=:$thisp + else + einfo " Duplicate entry ${thisp} removed..." + fi + done + ROOTPATH=${newpath#:} + } + cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} + + # finally, strip gcc paths #136027 + rmpath() { + local e newpath thisp IFS=: + for thisp in ${ROOTPATH} ; do + for e ; do [[ $thisp == $e ]] && continue 2 ; done + newpath+=:$thisp + done + ROOTPATH=${newpath#:} + } + rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' + + einfo "... done" +} + +src_configure() { + local ROOTPATH + set_rootpath + + # audit: somebody got to explain me how I can test this before I + # enable it.. - Diego + # plugindir: autoconf code is crappy and does not delay evaluation + # until `make` time, so we have to use a full path here rather than + # basing off other values. + econf \ + --enable-zlib=system \ + --with-secure-path="${ROOTPATH}" \ + --with-editor="${EPREFIX}"/usr/libexec/editor \ + --with-env-editor \ + $(use_with offensive insults) \ + $(use_with offensive all-insults) \ + $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ + $(use_with ldap) \ + $(use_enable nls) \ + $(use_with pam) \ + $(use_with skey) \ + $(use_with selinux) \ + $(use_with sendmail) \ + --without-opie \ + --without-linux-audit \ + --with-timedir="${EPREFIX}"/var/db/sudo \ + --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ + --docdir="${EPREFIX}"/usr/share/doc/${PF} +} + +src_install() { + default + + if use ldap ; then + dodoc README.LDAP doc/schema.OpenLDAP + dosbin plugins/sudoers/sudoers2ldif + + cat <<-EOF > "${T}"/ldap.conf.sudo + # See ldap.conf(5) and README.LDAP for details + # This file should only be readable by root + + # supported directives: host, port, ssl, ldap_version + # uri, binddn, bindpw, sudoers_base, sudoers_debug + # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key + EOF + + insinto /etc + doins "${T}"/ldap.conf.sudo + fperms 0440 /etc/ldap.conf.sudo + fi + + pamd_mimic system-auth sudo auth account session + + keepdir /var/db/sudo + fperms 0700 /var/db/sudo +} + +pkg_postinst() { + if use ldap ; then + ewarn + ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." + ewarn + if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then + ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" + ewarn "configured in /etc/nsswitch.conf." + ewarn + ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" + ewarn " sudoers: ldap files" + ewarn + fi + fi + if use prefix ; then + ewarn + ewarn "To use sudo, you need to change file ownership and permissions" + ewarn "with root privileges, as follows:" + ewarn + ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" + ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" + ewarn " # chown root:root ${EPREFIX}/var/db/sudo" + ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" + ewarn + fi + + elog "To use the -A (askpass) option, you need to install a compatible" + elog "password program from the following list. Starred packages will" + elog "automatically register for the use with sudo (but will not force" + elog "the -A option):" + elog "" + elog " [*] net-misc/ssh-askpass-fullscreen" + elog " net-misc/x11-ssh-askpass" + elog "" + elog "You can override the choice by setting the SUDO_ASKPASS environmnent" + elog "variable to the program you want to use." +} diff --git a/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.9_p5.ebuild b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.9_p5.ebuild new file mode 100644 index 0000000000..da99399e36 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-admin/sudo/sudo-1.8.9_p5.ebuild @@ -0,0 +1,191 @@ +# Copyright 1999-2014 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.9_p5.ebuild,v 1.1 2014/02/21 09:39:21 polynomial-c Exp $ + +EAPI=5 + +inherit eutils pam multilib libtool + +MY_P=${P/_/} +MY_P=${MY_P/beta/b} + +uri_prefix= +case ${P} in +*_beta*|*_rc*) uri_prefix=beta/ ;; +esac + +DESCRIPTION="Allows users or groups to run commands as other users" +HOMEPAGE="http://www.sudo.ws/" +SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz + ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" + +# Basic license is ISC-style as-is, some files are released under +# 3-clause BSD license +LICENSE="ISC BSD" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" +IUSE="ldap nls pam offensive selinux skey +sendmail" + +DEPEND="pam? ( virtual/pam ) + skey? ( >=sys-auth/skey-1.1.5-r1 ) + ldap? ( + >=net-nds/openldap-2.1.30-r1 + dev-libs/cyrus-sasl + ) + sys-libs/zlib" +RDEPEND="${DEPEND} + selinux? ( sec-policy/selinux-sudo ) + ldap? ( dev-lang/perl ) + pam? ( sys-auth/pambase ) + >=app-misc/editor-wrapper-3 + virtual/editor + sendmail? ( virtual/mta )" +DEPEND="${DEPEND} + sys-devel/bison" + +S=${WORKDIR}/${MY_P} + +REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" + +MAKEOPTS+=" SAMPLES=" + +src_prepare() { + elibtoolize +} + +set_rootpath() { + # FIXME: secure_path is a compile time setting. using ROOTPATH + # is not perfect, env-update may invalidate this, but until it + # is available as a sudoers setting this will have to do. + einfo "Setting secure_path ..." + + # first extract the default ROOTPATH from build env + ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") + if [[ -z ${ROOTPATH} ]] ; then + ewarn " Failed to find ROOTPATH, please report this" + fi + + # then remove duplicate path entries + cleanpath() { + local newpath thisp IFS=: + for thisp in $1 ; do + if [[ :${newpath}: != *:${thisp}:* ]] ; then + newpath+=:$thisp + else + einfo " Duplicate entry ${thisp} removed..." + fi + done + ROOTPATH=${newpath#:} + } + cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} + + # finally, strip gcc paths #136027 + rmpath() { + local e newpath thisp IFS=: + for thisp in ${ROOTPATH} ; do + for e ; do [[ $thisp == $e ]] && continue 2 ; done + newpath+=:$thisp + done + ROOTPATH=${newpath#:} + } + rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' + + einfo "... done" +} + +src_configure() { + local ROOTPATH + set_rootpath + + # audit: somebody got to explain me how I can test this before I + # enable it.. - Diego + # plugindir: autoconf code is crappy and does not delay evaluation + # until `make` time, so we have to use a full path here rather than + # basing off other values. + econf \ + --enable-zlib=system \ + --with-secure-path="${ROOTPATH}" \ + --with-editor="${EPREFIX}"/usr/libexec/editor \ + --with-env-editor \ + $(use_with offensive insults) \ + $(use_with offensive all-insults) \ + $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ + $(use_with ldap) \ + $(use_enable nls) \ + $(use_with pam) \ + $(use_with skey) \ + $(use_with selinux) \ + $(use_with sendmail) \ + --without-opie \ + --without-linux-audit \ + --with-timedir="${EPREFIX}"/var/db/sudo \ + --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ + --docdir="${EPREFIX}"/usr/share/doc/${PF} +} + +src_install() { + default + + if use ldap ; then + dodoc README.LDAP doc/schema.OpenLDAP + dosbin plugins/sudoers/sudoers2ldif + + cat <<-EOF > "${T}"/ldap.conf.sudo + # See ldap.conf(5) and README.LDAP for details + # This file should only be readable by root + + # supported directives: host, port, ssl, ldap_version + # uri, binddn, bindpw, sudoers_base, sudoers_debug + # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key + EOF + + insinto /etc + doins "${T}"/ldap.conf.sudo + fperms 0440 /etc/ldap.conf.sudo + fi + + pamd_mimic system-auth sudo auth account session + + keepdir /var/db/sudo + fperms 0700 /var/db/sudo +} + +pkg_postinst() { + if use ldap ; then + ewarn + ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." + ewarn + if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then + ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" + ewarn "configured in /etc/nsswitch.conf." + ewarn + ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" + ewarn " sudoers: ldap files" + ewarn + fi + fi + if use prefix ; then + ewarn + ewarn "To use sudo, you need to change file ownership and permissions" + ewarn "with root privileges, as follows:" + ewarn + ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" + ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers" + ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" + ewarn " # chown root:root ${EPREFIX}/var/db/sudo" + ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" + ewarn + fi + + elog "To use the -A (askpass) option, you need to install a compatible" + elog "password program from the following list. Starred packages will" + elog "automatically register for the use with sudo (but will not force" + elog "the -A option):" + elog "" + elog " [*] net-misc/ssh-askpass-fullscreen" + elog " net-misc/x11-ssh-askpass" + elog "" + elog "You can override the choice by setting the SUDO_ASKPASS environmnent" + elog "variable to the program you want to use." +}