3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

59 commits

Author SHA1 Message Date
R. RyanTM f431e20549 sudo: 1.8.22 -> 1.8.23
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.

This update was made based on information from https://repology.org/metapackage/sudo/versions.

These checks were done:

- built on NixOS
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/cvtsudoers -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/cvtsudoers --help’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay --help’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay -V’ and found version 1.8.23
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay --version’ and found version 1.8.23
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/visudo -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/visudo --help’ got 0 exit code
- found 1.8.23 with grep in /nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23
- directory tree listing: https://gist.github.com/4d6cfc75cde31a340e8a41bf3d969564
2018-05-02 21:36:39 +02:00
Shea Levy 5815c7dfa6
sudo: Fix cross compilation 2018-02-28 15:01:31 -05:00
Ben Gamari da310bdd6c sudo: Enable tmpfiles.d is disabled 2018-02-13 09:44:27 -06:00
Franz Pletz f7f11b81a1
sudo: 1.8.21p2 -> 1.8.22 2018-01-28 19:59:43 +01:00
Samuel Dionne-Riel 7b97c8c0c8 treewide: homepage+src updates (found by repology, #33263) 2018-01-05 20:42:46 +01:00
adisbladis 68626f3e0a
sudo: 1.8.20p2 -> 1.8.21p2 2017-11-26 18:31:51 +08:00
Daniel Kuehn 4c449e03b7 sudo: Add optional dependency to SSSD, enabled by setting withSssd to true 2017-10-21 20:21:27 +02:00
Franz Pletz 47f7aa96b0
sudo: 1.8.20p1 -> 1.8.20p2 2017-06-20 04:57:40 +02:00
Jörg Thalheim 9e2f08cdc2 sudo: add remark to patch 2017-06-17 10:42:55 +01:00
Will Dietz 5ff8387f64 sudo: fix attempt to set special perms 2017-06-16 16:20:06 -05:00
Daiderd Jordan 3c0114d472
sudo: 1.8.20 -> 1.8.20p1, fixes CVE-2017-1000367 2017-05-30 23:33:04 +02:00
mimadrid 8b569420b4
sudo: 1.8.19p2 -> 1.8.20 2017-05-18 00:50:53 +02:00
Parnell Springmeyer 9e36a58649
Merging against upstream master 2017-02-13 17:16:28 -06:00
mimadrid 2aad8590d7 sudo: 1.8.19p1 -> 1.8.19p2 2017-02-13 23:43:32 +01:00
Parnell Springmeyer 4aa0923009
Getting rid of the var indirection and using a bin path instead 2017-01-29 04:11:01 -06:00
Parnell Springmeyer e92b8402b0
Addressing PR feedback 2017-01-28 20:48:03 -08:00
Parnell Springmeyer bae00e8aa8
setcap-wrapper: Merging with upstream master and resolving conflicts 2017-01-25 11:08:05 -08:00
mimadrid c4f46949a6
sudo: 1.8.18p1 -> 1.8.19p1 2016-12-23 19:39:01 -05:00
mimadrid 19b6d90cab
sudo: 1.8.18 -> 1.8.18p1 2016-10-23 17:57:16 +02:00
Alexander Ried 8e0d456daa sudo: 1.8.17p1 -> 1.8.18 2016-09-23 02:01:57 +02:00
Parnell Springmeyer 98c058a1ee Adapting everything for the merged permissions wrappers work. 2016-09-01 19:21:06 -05:00
mimadrid a311b06919
sudo: 1.8.16 -> 1.8.17p1 2016-07-16 23:46:42 +02:00
Franz Pletz fcde15d66b sudo: 1.8.15 -> 1.8.16 2016-04-12 15:51:32 +02:00
Tuomas Tynkkynen 8a985d97a1 sudo: Compile with '--with-iologdir' to improve build purity
Otherwise it will try to guess the log directory, and the guess might
not be the same if chroot builds are enabled or not.

The gruesome details from m4/sudo.m4:

````
dnl
dnl Where the I/O log files go, use /var/log/sudo-io if
dnl /var/log exists, else /{var,usr}/adm/sudo-io
dnl
AC_DEFUN([SUDO_IO_LOGDIR], [
    AC_MSG_CHECKING(for I/O log dir location)
    if test "${with_iologdir-yes}" != "yes"; then
        iolog_dir="$with_iologdir"
    elif test -d "/var/log"; then
        iolog_dir="/var/log/sudo-io"
    elif test -d "/var/adm"; then
        iolog_dir="/var/adm/sudo-io"
    else
        iolog_dir="/usr/adm/sudo-io"
    fi
    if test "${with_iologdir}" != "no"; then
        SUDO_DEFINE_UNQUOTED(_PATH_SUDO_IO_LOGDIR, "$iolog_dir")
    fi
    AC_MSG_RESULT($iolog_dir)
])dnl
````
2016-01-02 18:50:11 +01:00
Franz Pletz 3edcc3c669 sudo: 1.8.14p3 -> 1.8.15, fixes #11297 2015-12-03 09:02:17 +01:00
Tobias Geerinckx-Rice 7b30d6a8cb sudo: add withInsults flag (disabled by default)
The feature Nix neither needs nor deserves.
Requires the "insults" to be explicitly enabled in sudoers.
This adds 1.6 MB to your sudo as some kind of cruel meta-joke.
2015-07-31 02:02:08 +02:00
William A. Kennington III b827583831 sudo: 1.8.14p1 -> 1.8.14p3 2015-07-22 11:26:59 -07:00
William A. Kennington III 8734f01830 sudo: 1.8.13 -> 1.8.14p1 2015-07-19 12:09:14 -07:00
William A. Kennington III 2f02ae037a sudo: 1.8.12 -> 1.8.13 2015-03-26 14:01:07 -07:00
Eelco Dolstra 2ed5c2bd6b Set some meta.platforms
Also fix meta.platform -> meta.platforms in a few places.
2015-03-20 20:04:42 +01:00
Eelco Dolstra 9e9e446880 sudo: Fix incorrect runtime path 2015-02-25 12:39:06 +01:00
Eelco Dolstra 3d3db3550f sudo: Update to 1.8.12 2015-02-24 18:04:35 +01:00
Eelco Dolstra 6866712a39 sudo: Update to 1.8.11p2 2014-12-18 12:31:56 +01:00
Aristid Breitkreuz 5b352c409f sudo: update from 1.8.10p3 to 1.8.11 2014-10-08 20:23:25 +02:00
Bjørn Forsman c3436c0c4a sudo: change password prompt
The current sudo password prompt is "Password: ", while distros like
e.g. Ubuntu and Arch Linux use "[sudo] password for %p: ", where "%p"
expands to the username of the user running sudo.

Adopt the prompt from other distros because it makes it less confusing
when running commands with sudo that themselves ask for a password.
2014-09-04 15:39:11 +02:00
Bjørn Forsman 89eccb7fb0 sudo: add sendmailPath option (defaults to /var/setuid-wrappers/sendmail)
It currently seems impossible to make sudo send emails. No matter how much
debugging I enable, sudo continues to be silent about sendmail. I tried setting
"Defaults mailerpath=/var/setuid-wrappers/sendmail" but that too was completely
ignored (except for logging that the variable mailerpath exists with the value
I assigned to it...).

This enables sendmail support and sets a default value that works on NixOS.
2014-09-04 13:38:03 +02:00
Chris Farmiloe fbfdc8e2dc keep fallback visudo editor as nano 2014-06-22 19:50:40 +02:00
Chris Farmiloe 3dec61a8a6 Fix sudo not installing due to timedir deprecation 2014-06-22 19:42:32 +02:00
William A. Kennington III 1bb2a094fd sudo: Update 1.8.9p4 -> 1.8.10p3 2014-06-17 22:41:32 -05:00
William A. Kennington III ef4ea24420 sudo: Always keepVisudo in order to simplify sudo build 2014-06-17 22:41:32 -05:00
Michael Raskin 4b144de367 Allow to keep visudo. Useful for checking sudoers syntax 2014-06-09 00:54:21 +04:00
Eelco Dolstra c07559b782 sudo: Update to 1.8.9p4 2014-01-23 11:21:38 +01:00
Eelco Dolstra 0c3f2b718d sudo: update from 1.8.8 to 1.8.9p3 2014-01-15 11:02:22 +01:00
Eelco Dolstra d207047afc sudo: Update to 1.8.8 2013-11-12 17:58:49 +01:00
Eelco Dolstra 477c53cec0 sudo: Fix building outside of a chroot 2013-04-05 19:38:07 +02:00
Eelco Dolstra 91ff5e33cc sudo: Update to 1.8.7p7
Ouch, our sudo was criminally outdated.

CVE-2013-1775, CVE-2013-1776, CVE-2012-2337, CVE-2011-0010.
2013-04-03 13:15:38 +02:00
Florian Friesdorf bf95f7fa3c Revert "sudo upgrade to 1.8.3p2 (security fix included)"
before was 1.7.2, which is not affected

svn path=/nixpkgs/trunk/; revision=31944
2012-01-31 14:09:54 +00:00
Florian Friesdorf 8565aba2cd sudo upgrade to 1.8.3p2 (security fix included)
svn path=/nixpkgs/trunk/; revision=31943
2012-01-31 13:49:53 +00:00
Eelco Dolstra 934d30e35f * Fix a broken URL, and update sudo while we're at it.
svn path=/nixpkgs/trunk/; revision=16972
2009-09-06 21:36:51 +00:00
Eelco Dolstra d095fa0dd9 * Install the sudo manpages. Also updated to 1.7.1.
svn path=/nixpkgs/trunk/; revision=16056
2009-06-26 16:10:38 +00:00