diff options
author | Diego Elio Pettenò <flameeyes@gentoo.org> | 2014-09-29 21:29:18 +0000 |
---|---|---|
committer | Diego Elio Pettenò <flameeyes@gentoo.org> | 2014-09-29 21:29:18 +0000 |
commit | 3345d6a8e02b640815f52d082b109a03d22caf3b (patch) | |
tree | 548e6aa45bf83cccb092ee415d0ce661071dbfef /app-admin | |
parent | Clean up unused dependencies. (diff) | |
download | historical-3345d6a8e02b640815f52d082b109a03d22caf3b.tar.gz historical-3345d6a8e02b640815f52d082b109a03d22caf3b.tar.bz2 historical-3345d6a8e02b640815f52d082b109a03d22caf3b.zip |
Version bump and remove old.
Package-Manager: portage-2.2.14_rc1/cvs/Linux x86_64
Manifest-Sign-Key: 0xD4301342
Diffstat (limited to 'app-admin')
-rw-r--r-- | app-admin/sudo/ChangeLog | 9 | ||||
-rw-r--r-- | app-admin/sudo/Manifest | 30 | ||||
-rw-r--r-- | app-admin/sudo/sudo-1.8.11.ebuild (renamed from app-admin/sudo/sudo-1.8.10_p2.ebuild) | 6 | ||||
-rw-r--r-- | app-admin/sudo/sudo-1.8.6_p8.ebuild | 191 | ||||
-rw-r--r-- | app-admin/sudo/sudo-1.8.8.ebuild | 191 | ||||
-rw-r--r-- | app-admin/sudo/sudo-1.8.9_p5.ebuild | 191 |
6 files changed, 26 insertions, 592 deletions
diff --git a/app-admin/sudo/ChangeLog b/app-admin/sudo/ChangeLog index c56c34410b8a..260c1f943876 100644 --- a/app-admin/sudo/ChangeLog +++ b/app-admin/sudo/ChangeLog @@ -1,6 +1,13 @@ # ChangeLog for app-admin/sudo # Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.364 2014/05/09 10:08:23 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.365 2014/09/29 21:29:13 flameeyes Exp $ + +*sudo-1.8.11 (29 Sep 2014) + + 29 Sep 2014; Diego E. Pettenò <flameeyes@gentoo.org> +sudo-1.8.11.ebuild, + -sudo-1.8.10_p2.ebuild, -sudo-1.8.6_p8.ebuild, -sudo-1.8.8.ebuild, + -sudo-1.8.9_p5.ebuild: + Version bump and remove old. *sudo-1.8.10_p3 (09 May 2014) diff --git a/app-admin/sudo/Manifest b/app-admin/sudo/Manifest index 4a9072e8d27f..027d1d7fa6ff 100644 --- a/app-admin/sudo/Manifest +++ b/app-admin/sudo/Manifest @@ -1,30 +1,26 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 -DIST sudo-1.8.10p2.tar.gz 2261235 SHA256 ba6cb8db6dccdb92a96e8ae63ca65c410f8b61270b603ab9af4b1154fef379f1 SHA512 c746489dbe57804d05261d784a949b2231e5b96a7c8caf51cf9021a092aebd04ebf31a0e89390a64197f684b2e63405b6715eff20b71b1f5772f183bcd47cce1 WHIRLPOOL 0842e85916cdbf6167ab7d632484973b3d43cdf93c2de53e70b59068245bac5545e2c9b9347f49437a00a08c1d726bc66535092d9fe114ab141eb2ebe5aaee76 DIST sudo-1.8.10p3.tar.gz 2262370 SHA256 6eda135fa68163108f1c24de6975de5ddb09d75730bb62d6390bda7b04345400 SHA512 714e20d7ea0e76b24acfa73818644fdf4094374b2000ef0cb879a92273230fdc2bda4cab041f224f19b57149f2ae289c377c693d3bca5a2d5e1bba79cf97c434 WHIRLPOOL 8677bf12f49f78af1ac4dcf4692194ac49116c5925258e2ad19e33e79bddfb6280ecbd11e98728bef57057c3461ca3b1fa29fc4533acf7b1bfb18e6836ea8c92 +DIST sudo-1.8.11.tar.gz 2399452 SHA256 a3177de7b5fbebfb43b32fc30aecaaf434762bf23e313de4c4a39e5ff715c845 SHA512 e35d42c8b15ded918b05a0522f8e167d6c672983bec593e0deee8ae2ccba6aed05170e88333f01b7c0b59f00cec690d8f3cf09404a7bde6fd10946a7622785fd WHIRLPOOL 236d23eb3c5db9a202a254e6cfaa50842e702aeddac584937eaf453156ec5c0b44a7dce1d84d1df29b8b2d59024f7d5b04407a33a0ffc9e2e43c47552542f415 DIST sudo-1.8.5p2.tar.gz 1746344 SHA256 c32ae2bc3faf83444c82ca75ccb10ad3684d8222e3535f164c4a4db7cdddf8cf SHA512 616967eea79f91cda2b0cd1d13ed453d20142521ecfca289432bdf5708ac0549c7873fd80170cc0481390e82f1e60fb0bffcfc7c6b70d5d721aa98d23361c5cb WHIRLPOOL ac0d2c040935c54947571a0d4671be70aaaf7a6f69cb097acd321718656d4c569b0db4191eaf943c6b642a1d641263429287241a236a0f2a0c9edf973710bf8b DIST sudo-1.8.6p7.tar.gz 1858348 SHA256 301089edb22356f59d097f6abbe1303f03927a38691b02959d618546c2125036 SHA512 732bcbd53b77d329bbc77d3cd3644a595e938433053122fe3098385c0ad3a6a9cf4f4ab8709c7a79cad51dba77ffaa1be9ffde8e8834d3798822a1bd5b518d42 WHIRLPOOL 875984b44b571dc3765aab5ad8bd8859d0cd680e7da453109b5bee45aac336e3d0c05e1133ce0101a6dd2b9f19a26454d3e0b11c0edf32034f9fae04d3dfbb4d -DIST sudo-1.8.6p8.tar.gz 1858612 SHA256 c0baaa87f59153967b650a0dde2f7d4147d358fa15f3fdabb47e84d0282fe625 SHA512 9c9d297e8cba4ae74a1358b23da15beea4649684afa09b3c3486bd25454008b4c7cd543266f8abc22aac48a56912d7174ccfc137a69670e737d6c9939708cb80 WHIRLPOOL f19c882a2b3de4f41ee97b1f26ebe284782c82500dfc2f86edd262b3ec9f10a2fb3c8b20f26cd1587910677b169ed0260a9672db4dc7b1ea8d5d817235f6197c -DIST sudo-1.8.8.tar.gz 2117145 SHA256 9f911c1e9297fb8006deb52fa81197a8d06b9d54e70672f723c467ecae992fc9 SHA512 e56ea849c2e6470a3d97fc76bde6af145938cf2df4d17f3faef00368262d8e2dd5bcc7e3adf490e853e23466b15638000a527156bd694ce4980003d751c896d5 WHIRLPOOL 74fad850b4f370775f3c5611235b7f20837267f599ace4350f6498ce21cf12e94c1efb98017656106305398496c2f1ff992700fe5fbde4fcf47ca5210cddfdc6 -DIST sudo-1.8.9p5.tar.gz 2179066 SHA256 bc9d5c96de5f8b4d2b014f87a37870aef60d2891c869202454069150a21a5c21 SHA512 ebd1af9724e135db2e553e59c96f22f6f25885b7ba35767657a26d319bb074987833329084cc07271946b2ef7165567f63ccad11ccf290cef3f77953a6fd7a28 WHIRLPOOL 63940daa38d7d9dea8f3ca41c637935e00fd7439a09de3300f8b875382c142e4328c3d9034273e920a9987e70358157f3fba6d5683b6b94badf00ad5aa8b8293 -EBUILD sudo-1.8.10_p2.ebuild 5633 SHA256 cb364c572d24e4d96df9240b931c9d4d364cd1acdc267aaa8afcbf8507bc2050 SHA512 fdf1537faa27d9ebc5fdba71c419b042da380e0705d3f25a9f9156f467a282f64e6b903744adecd0885943297909849ee5982d4b7335be01aa65c23b17c659e6 WHIRLPOOL 375474860c6ed504c70aa291353031dee1e2f5dcce5df3d2041c510905109445d34eb616acca0e5054431dfc177c2e31151ea3b2a44ac7b0656e3d8d35c3e48a EBUILD sudo-1.8.10_p3.ebuild 5630 SHA256 7ffab9d8c9f6fcddb5cfc815f94b67c37929e3394ce336ea595caa2a77d93589 SHA512 186a6ba9ca67d904f857e507dce2002113f3fc5771ff90885ee88909c13be9a5fd436c25f73e204a4a89108a59d0638a870c446d7a26f62397069cf7aec47920 WHIRLPOOL 5134e735ab4e2d171c9bbf81e289731e5c6cfb2facece69a048402a132bc82dac14bb1b3dd55d2607902e11d995f8fe9ed78db4dd977094d84cbbc066f5dfdd0 +EBUILD sudo-1.8.11.ebuild 5762 SHA256 a37d2f2e3e95a506fe88555c32a0cf6c1b4fc8b89a8c04b49202268ba0d20a8d SHA512 e02c54b352cca2a8de95b16f236e2a119b5ae8b082c2450400a81970c8e36efb6fb1888e0e93bb4a61332b33d37875cad730ba54a38f7d60c5cde457ea2cd38b WHIRLPOOL 05ce51b06dcaff1fa7030ef10aa3e3bb88828ed8e2790a3ab77ae5b76e09194e7798ff3bc6fd51627a7e6b8acc7701c8b56a37ac7f22803bff8ed9ef47441eb2 EBUILD sudo-1.8.5_p2.ebuild 5464 SHA256 5a647b0c4a2949e476277ead580f6a42747f7778b282dd1e034a2c010c784a9e SHA512 34cc788ee019ccaf8e2f74dbae5e668d8fb94dab066bea49f3a37f31210a66c9327686e5c5f44a966321f26e3ccc5e2aa47fdb46b35285e96f266eafbddbc741 WHIRLPOOL 532a4151b0acbec600552cca4b18b54afba14a48e91640dd85642c4571e993e1a8eb20e03e83ef3f901a8f6eb6c63c2a5aec7650020e5e58f0d7911790d419f5 EBUILD sudo-1.8.6_p7.ebuild 5464 SHA256 4f58dcb19ec413e99144a4806d5d7d68c5f9e3bbc4d8b0d77efb8df8dd147e57 SHA512 ed1575681e3e84d42d97f4465af3c3f33fa82d645d49a2219047728b22d0d7cbfb7c4e8a34ffce55da18ce67db84d6e40907c571231fa16acdef18bfa41cabc4 WHIRLPOOL a74177a5effbe3379a7da469f6cdaf5bd0263b777cbdecf8c02bf9956bc4cce3de35a2727f0e275f76ba94b1f0fff738d04d5102b83ac739bb99db624d919a1b -EBUILD sudo-1.8.6_p8.ebuild 5474 SHA256 9a8b19e57ca0ed59d0b371352842c6539c714b8c163c97f81fbcf2f2d227cd9a SHA512 730229e13bb4b3591ab6a0a0ba3a9090d47b8cb3d425b4472ef33ca845b3522771443568fcf05f83b9cd7e465d8566a1e569de11ca0427693a74c9438118fbaf WHIRLPOOL ff4756e3505a293bbc67ae2933414b3c42b0cb5006bded4e280d97487f593cc288dddaa1b196137bebc03f97c928528226d52f06f170304dba3b868b0a8ef291 -EBUILD sudo-1.8.8.ebuild 5474 SHA256 597d3cfa588d3e47d07be11cd2aa6df137951167c27043ce5ac06f710f49fdaf SHA512 223c0b1caf6797242a0db709eef46a5951959ed83aaeb25624c47ca39b76d2922ea79e8b8b1204195ad6bf7ec1ab4985770552d26be2a57728767ece2ce9bd43 WHIRLPOOL 7dad9dfaaf610212bbc5c1d6f133f1761885757df32cc3bb1166a29910a68089281c84b256d2b61bf3bf150e3bd458081f7039ff697a9b20bc5e86d36d8c1309 -EBUILD sudo-1.8.9_p5.ebuild 5481 SHA256 8705bae8d24b7730840b2897846a72bbe031fe2d1c50284e87785ec3353bf7d2 SHA512 5a83aadb46ecd1076f486a3a9dcc5f7cbfe244de49bc2413a2cdfb80c2eccfe4e1db767099db29bd4bd311ecd469ceec7c1a2ac3c60fa71fb3639ac48cc84075 WHIRLPOOL 21bb3e3e0eb7fd828afc3e4bc122843642844c7c6d9046382daac52f28bf10cac57aa08dbc37e9bc48c41d2955736698c53f1a39e0801b3efa801ca7d44e643c -MISC ChangeLog 52769 SHA256 520f55bf10a49026bc723660ce3b3cfd41cc70293657585572e4743018ede0f4 SHA512 7344a48514632ce5fdf58de1b99fc3bd78696a5a64ef5d162d1f575de963531b74686aedc2e13ff156b6fdd98177988535c09b6e4c2848862be0dc36d7d22130 WHIRLPOOL aaf384e8d91737631881281e4146026a130f5140e47d5b3d08a91ab94877a699516b48ca23727cf94501481d7e2b4fad39dd0b892498ccb7a70abc2fedfc093d +MISC ChangeLog 53000 SHA256 69282874dc7e38c36f9445ef9b15689372d4aad72c8323f25a374b2c04d948a2 SHA512 3ccd9374aa81e1649b106a956d5081e67999b4c525cbedbd1a1b5031997bb35f67941cc9beaeabd5ae72d41a353d17a3284d2e8a9e4af09d9273468bf25715cc WHIRLPOOL 88958018ddb5b03624a26fb60f73fa666e4248b532c7b00834f8f7d59ccb3c9252535a7d818321eb596f7f1bb1dbb633ef2ed3d522d72426642d5d150db05cac MISC metadata.xml 726 SHA256 242e8a573d76b2163a928259e5226fff2c237b3e9c244860a1430fa79c5b390e SHA512 d0a7e5f53ec823d84e3c38c2bd64ba566d7cbd08c12ebf3e9b9fed10b77ce2e3e951e262f1a307aa8f0819a662559ca6f9bcf86cf05088480413e4534ce299d3 WHIRLPOOL b919b1825e68eb3285523f057fc42b5fde9e59a738ecdb1de0835af827db6284fc66848a10517a215389c4466f21b70e376f3fffc993aa338e47fca971d0af83 -----BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.22 (GNU/Linux) +Version: GnuPG v2.0 -iQEcBAEBCAAGBQJTbKlFAAoJEBzRPIrUMBNCDvgH/jgYe0kbLUNP2zky/mX7OB6X -mYyCMCnV5OJfsBThZcm163qxsygbW4ulWI8Qwv9thjOGXh9B2xBTSsOzT6L9B12f -5cdBazANXDDawgharxtGnl2LS9ZP4dG+xBTPLLroRNipn2bT+VwjKHFI8DFJO48T -ji17zxMgfKVuLoSjno8StUw94SaJ1hae2Ag96efUljkGqVHqHQ0BMKdSD4d2a8Vl -cjSVK454ZCPeVloL1hITN9kmhLQiEAnYDDTqSXvKAj4+0bpgK5AEG8/A5xOCTYrY -ua0pv3OA1AFhPL+Zj2wIZOYPE2MpSbbtPJqM+QaVbb3GpFS2d48EnFaHa50WTtM= -=iyzN +iQF8BAEBCABmBQJUKc8tXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w +ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ1MUE3MTczOTAwRTQzNTc0RDJBOUJBMDIx +Q0QxM0M4QUQ0MzAxMzQyAAoJEBzRPIrUMBNC/qQIAIEY4euOcALLK98zIfsZyqHw +U5BrMPF2MBkCt+DZt2LNuc3/1W6v7+GRHmpeK6bABUKuTvDHvyMLYmE5j3LgPpyE +5TRCKnFaQsKAqwa9iKFdYiJ6RJkq+rSp39JtvjQFpTthXnruLinjFIeQgf4+aYXp +WnWEDB43IcyJtj6zzbrJCpz+n60ouLvbw80nWmTCYsiZIzydwAK+AuVIiq5JkFBx +u5+7q4ehWv0HmmjN4IZpmrLjfSRAANECrirJUJMZjysSAePUptrVyCVFnJOaieWX +vL6/VZKctoCAO59lkn8+bXyI2AIayySLh+NovhKr/ZmTlWX6BL+lAJ3XouqoSW4= +=8rD5 -----END PGP SIGNATURE----- diff --git a/app-admin/sudo/sudo-1.8.10_p2.ebuild b/app-admin/sudo/sudo-1.8.11.ebuild index 9e01169f6a3e..bdf3d5f1bc38 100644 --- a/app-admin/sudo/sudo-1.8.10_p2.ebuild +++ b/app-admin/sudo/sudo-1.8.11.ebuild @@ -1,6 +1,6 @@ # Copyright 1999-2014 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.10_p2.ebuild,v 1.2 2014/04/25 18:21:54 polynomial-c Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.11.ebuild,v 1.1 2014/09/29 21:29:13 flameeyes Exp $ EAPI=5 @@ -47,6 +47,10 @@ S=${WORKDIR}/${MY_P} REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" +# The check_ttyname fails in the ebuild for various reasons. +# See upstream http://www.sudo.ws/bugs/show_bug.cgi?id=643 +RESTRICT=test + MAKEOPTS+=" SAMPLES=" src_prepare() { diff --git a/app-admin/sudo/sudo-1.8.6_p8.ebuild b/app-admin/sudo/sudo-1.8.6_p8.ebuild deleted file mode 100644 index 173c31cd3615..000000000000 --- a/app-admin/sudo/sudo-1.8.6_p8.ebuild +++ /dev/null @@ -1,191 +0,0 @@ -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p8.ebuild,v 1.2 2013/05/27 21:35:20 zx2c4 Exp $ - -EAPI=4 - -inherit eutils pam multilib libtool - -MY_P=${P/_/} -MY_P=${MY_P/beta/b} - -uri_prefix= -case ${P} in -*_beta*|*_rc*) uri_prefix=beta/ ;; -esac - -DESCRIPTION="Allows users or groups to run commands as other users" -HOMEPAGE="http://www.sudo.ws/" -SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz - ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" - -# Basic license is ISC-style as-is, some files are released under -# 3-clause BSD license -LICENSE="ISC BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey +sendmail" - -DEPEND="pam? ( virtual/pam ) - skey? ( >=sys-auth/skey-1.1.5-r1 ) - ldap? ( - >=net-nds/openldap-2.1.30-r1 - dev-libs/cyrus-sasl - ) - sys-libs/zlib" -RDEPEND="${DEPEND} - selinux? ( sec-policy/selinux-sudo ) - ldap? ( dev-lang/perl ) - pam? ( sys-auth/pambase ) - >=app-misc/editor-wrapper-3 - virtual/editor - sendmail? ( virtual/mta )" -DEPEND="${DEPEND} - sys-devel/bison" - -S=${WORKDIR}/${MY_P} - -REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" - -MAKEOPTS+=" SAMPLES=" - -src_prepare() { - elibtoolize -} - -set_rootpath() { - # FIXME: secure_path is a compile time setting. using ROOTPATH - # is not perfect, env-update may invalidate this, but until it - # is available as a sudoers setting this will have to do. - einfo "Setting secure_path ..." - - # first extract the default ROOTPATH from build env - ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") - if [[ -z ${ROOTPATH} ]] ; then - ewarn " Failed to find ROOTPATH, please report this" - fi - - # then remove duplicate path entries - cleanpath() { - local newpath thisp IFS=: - for thisp in $1 ; do - if [[ :${newpath}: != *:${thisp}:* ]] ; then - newpath+=:$thisp - else - einfo " Duplicate entry ${thisp} removed..." - fi - done - ROOTPATH=${newpath#:} - } - cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} - - # finally, strip gcc paths #136027 - rmpath() { - local e newpath thisp IFS=: - for thisp in ${ROOTPATH} ; do - for e ; do [[ $thisp == $e ]] && continue 2 ; done - newpath+=:$thisp - done - ROOTPATH=${newpath#:} - } - rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' - - einfo "... done" -} - -src_configure() { - local ROOTPATH - set_rootpath - - # audit: somebody got to explain me how I can test this before I - # enable it.. - Diego - # plugindir: autoconf code is crappy and does not delay evaluation - # until `make` time, so we have to use a full path here rather than - # basing off other values. - econf \ - --enable-zlib=system \ - --with-secure-path="${ROOTPATH}" \ - --with-editor="${EPREFIX}"/usr/libexec/editor \ - --with-env-editor \ - $(use_with offensive insults) \ - $(use_with offensive all-insults) \ - $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ - $(use_with ldap) \ - $(use_enable nls) \ - $(use_with pam) \ - $(use_with skey) \ - $(use_with selinux) \ - $(use_with sendmail) \ - --without-opie \ - --without-linux-audit \ - --with-timedir="${EPREFIX}"/var/db/sudo \ - --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ - --docdir="${EPREFIX}"/usr/share/doc/${PF} -} - -src_install() { - default - - if use ldap ; then - dodoc README.LDAP doc/schema.OpenLDAP - dosbin plugins/sudoers/sudoers2ldif - - cat <<-EOF > "${T}"/ldap.conf.sudo - # See ldap.conf(5) and README.LDAP for details - # This file should only be readable by root - - # supported directives: host, port, ssl, ldap_version - # uri, binddn, bindpw, sudoers_base, sudoers_debug - # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key - EOF - - insinto /etc - doins "${T}"/ldap.conf.sudo - fperms 0440 /etc/ldap.conf.sudo - fi - - pamd_mimic system-auth sudo auth account session - - keepdir /var/db/sudo - fperms 0700 /var/db/sudo -} - -pkg_postinst() { - if use ldap ; then - ewarn - ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." - ewarn - if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then - ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" - ewarn "configured in /etc/nsswitch.conf." - ewarn - ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" - ewarn " sudoers: ldap files" - ewarn - fi - fi - if use prefix ; then - ewarn - ewarn "To use sudo, you need to change file ownership and permissions" - ewarn "with root privileges, as follows:" - ewarn - ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" - ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" - ewarn " # chown root:root ${EPREFIX}/var/db/sudo" - ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" - ewarn - fi - - elog "To use the -A (askpass) option, you need to install a compatible" - elog "password program from the following list. Starred packages will" - elog "automatically register for the use with sudo (but will not force" - elog "the -A option):" - elog "" - elog " [*] net-misc/ssh-askpass-fullscreen" - elog " net-misc/x11-ssh-askpass" - elog "" - elog "You can override the choice by setting the SUDO_ASKPASS environmnent" - elog "variable to the program you want to use." -} diff --git a/app-admin/sudo/sudo-1.8.8.ebuild b/app-admin/sudo/sudo-1.8.8.ebuild deleted file mode 100644 index e4f42bd85811..000000000000 --- a/app-admin/sudo/sudo-1.8.8.ebuild +++ /dev/null @@ -1,191 +0,0 @@ -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.8.ebuild,v 1.1 2013/10/10 18:49:58 chainsaw Exp $ - -EAPI=5 - -inherit eutils pam multilib libtool - -MY_P=${P/_/} -MY_P=${MY_P/beta/b} - -uri_prefix= -case ${P} in -*_beta*|*_rc*) uri_prefix=beta/ ;; -esac - -DESCRIPTION="Allows users or groups to run commands as other users" -HOMEPAGE="http://www.sudo.ws/" -SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz - ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" - -# Basic license is ISC-style as-is, some files are released under -# 3-clause BSD license -LICENSE="ISC BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey +sendmail" - -DEPEND="pam? ( virtual/pam ) - skey? ( >=sys-auth/skey-1.1.5-r1 ) - ldap? ( - >=net-nds/openldap-2.1.30-r1 - dev-libs/cyrus-sasl - ) - sys-libs/zlib" -RDEPEND="${DEPEND} - selinux? ( sec-policy/selinux-sudo ) - ldap? ( dev-lang/perl ) - pam? ( sys-auth/pambase ) - >=app-misc/editor-wrapper-3 - virtual/editor - sendmail? ( virtual/mta )" -DEPEND="${DEPEND} - sys-devel/bison" - -S=${WORKDIR}/${MY_P} - -REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" - -MAKEOPTS+=" SAMPLES=" - -src_prepare() { - elibtoolize -} - -set_rootpath() { - # FIXME: secure_path is a compile time setting. using ROOTPATH - # is not perfect, env-update may invalidate this, but until it - # is available as a sudoers setting this will have to do. - einfo "Setting secure_path ..." - - # first extract the default ROOTPATH from build env - ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") - if [[ -z ${ROOTPATH} ]] ; then - ewarn " Failed to find ROOTPATH, please report this" - fi - - # then remove duplicate path entries - cleanpath() { - local newpath thisp IFS=: - for thisp in $1 ; do - if [[ :${newpath}: != *:${thisp}:* ]] ; then - newpath+=:$thisp - else - einfo " Duplicate entry ${thisp} removed..." - fi - done - ROOTPATH=${newpath#:} - } - cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} - - # finally, strip gcc paths #136027 - rmpath() { - local e newpath thisp IFS=: - for thisp in ${ROOTPATH} ; do - for e ; do [[ $thisp == $e ]] && continue 2 ; done - newpath+=:$thisp - done - ROOTPATH=${newpath#:} - } - rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' - - einfo "... done" -} - -src_configure() { - local ROOTPATH - set_rootpath - - # audit: somebody got to explain me how I can test this before I - # enable it.. - Diego - # plugindir: autoconf code is crappy and does not delay evaluation - # until `make` time, so we have to use a full path here rather than - # basing off other values. - econf \ - --enable-zlib=system \ - --with-secure-path="${ROOTPATH}" \ - --with-editor="${EPREFIX}"/usr/libexec/editor \ - --with-env-editor \ - $(use_with offensive insults) \ - $(use_with offensive all-insults) \ - $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ - $(use_with ldap) \ - $(use_enable nls) \ - $(use_with pam) \ - $(use_with skey) \ - $(use_with selinux) \ - $(use_with sendmail) \ - --without-opie \ - --without-linux-audit \ - --with-timedir="${EPREFIX}"/var/db/sudo \ - --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ - --docdir="${EPREFIX}"/usr/share/doc/${PF} -} - -src_install() { - default - - if use ldap ; then - dodoc README.LDAP doc/schema.OpenLDAP - dosbin plugins/sudoers/sudoers2ldif - - cat <<-EOF > "${T}"/ldap.conf.sudo - # See ldap.conf(5) and README.LDAP for details - # This file should only be readable by root - - # supported directives: host, port, ssl, ldap_version - # uri, binddn, bindpw, sudoers_base, sudoers_debug - # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key - EOF - - insinto /etc - doins "${T}"/ldap.conf.sudo - fperms 0440 /etc/ldap.conf.sudo - fi - - pamd_mimic system-auth sudo auth account session - - keepdir /var/db/sudo - fperms 0700 /var/db/sudo -} - -pkg_postinst() { - if use ldap ; then - ewarn - ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." - ewarn - if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then - ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" - ewarn "configured in /etc/nsswitch.conf." - ewarn - ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" - ewarn " sudoers: ldap files" - ewarn - fi - fi - if use prefix ; then - ewarn - ewarn "To use sudo, you need to change file ownership and permissions" - ewarn "with root privileges, as follows:" - ewarn - ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" - ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" - ewarn " # chown root:root ${EPREFIX}/var/db/sudo" - ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" - ewarn - fi - - elog "To use the -A (askpass) option, you need to install a compatible" - elog "password program from the following list. Starred packages will" - elog "automatically register for the use with sudo (but will not force" - elog "the -A option):" - elog "" - elog " [*] net-misc/ssh-askpass-fullscreen" - elog " net-misc/x11-ssh-askpass" - elog "" - elog "You can override the choice by setting the SUDO_ASKPASS environmnent" - elog "variable to the program you want to use." -} diff --git a/app-admin/sudo/sudo-1.8.9_p5.ebuild b/app-admin/sudo/sudo-1.8.9_p5.ebuild deleted file mode 100644 index da99399e3678..000000000000 --- a/app-admin/sudo/sudo-1.8.9_p5.ebuild +++ /dev/null @@ -1,191 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.9_p5.ebuild,v 1.1 2014/02/21 09:39:21 polynomial-c Exp $ - -EAPI=5 - -inherit eutils pam multilib libtool - -MY_P=${P/_/} -MY_P=${MY_P/beta/b} - -uri_prefix= -case ${P} in -*_beta*|*_rc*) uri_prefix=beta/ ;; -esac - -DESCRIPTION="Allows users or groups to run commands as other users" -HOMEPAGE="http://www.sudo.ws/" -SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz - ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz" - -# Basic license is ISC-style as-is, some files are released under -# 3-clause BSD license -LICENSE="ISC BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris" -IUSE="ldap nls pam offensive selinux skey +sendmail" - -DEPEND="pam? ( virtual/pam ) - skey? ( >=sys-auth/skey-1.1.5-r1 ) - ldap? ( - >=net-nds/openldap-2.1.30-r1 - dev-libs/cyrus-sasl - ) - sys-libs/zlib" -RDEPEND="${DEPEND} - selinux? ( sec-policy/selinux-sudo ) - ldap? ( dev-lang/perl ) - pam? ( sys-auth/pambase ) - >=app-misc/editor-wrapper-3 - virtual/editor - sendmail? ( virtual/mta )" -DEPEND="${DEPEND} - sys-devel/bison" - -S=${WORKDIR}/${MY_P} - -REQUIRED_USE="pam? ( !skey ) skey? ( !pam )" - -MAKEOPTS+=" SAMPLES=" - -src_prepare() { - elibtoolize -} - -set_rootpath() { - # FIXME: secure_path is a compile time setting. using ROOTPATH - # is not perfect, env-update may invalidate this, but until it - # is available as a sudoers setting this will have to do. - einfo "Setting secure_path ..." - - # first extract the default ROOTPATH from build env - ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}") - if [[ -z ${ROOTPATH} ]] ; then - ewarn " Failed to find ROOTPATH, please report this" - fi - - # then remove duplicate path entries - cleanpath() { - local newpath thisp IFS=: - for thisp in $1 ; do - if [[ :${newpath}: != *:${thisp}:* ]] ; then - newpath+=:$thisp - else - einfo " Duplicate entry ${thisp} removed..." - fi - done - ROOTPATH=${newpath#:} - } - cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}} - - # finally, strip gcc paths #136027 - rmpath() { - local e newpath thisp IFS=: - for thisp in ${ROOTPATH} ; do - for e ; do [[ $thisp == $e ]] && continue 2 ; done - newpath+=:$thisp - done - ROOTPATH=${newpath#:} - } - rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*' - - einfo "... done" -} - -src_configure() { - local ROOTPATH - set_rootpath - - # audit: somebody got to explain me how I can test this before I - # enable it.. - Diego - # plugindir: autoconf code is crappy and does not delay evaluation - # until `make` time, so we have to use a full path here rather than - # basing off other values. - econf \ - --enable-zlib=system \ - --with-secure-path="${ROOTPATH}" \ - --with-editor="${EPREFIX}"/usr/libexec/editor \ - --with-env-editor \ - $(use_with offensive insults) \ - $(use_with offensive all-insults) \ - $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \ - $(use_with ldap) \ - $(use_enable nls) \ - $(use_with pam) \ - $(use_with skey) \ - $(use_with selinux) \ - $(use_with sendmail) \ - --without-opie \ - --without-linux-audit \ - --with-timedir="${EPREFIX}"/var/db/sudo \ - --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \ - --docdir="${EPREFIX}"/usr/share/doc/${PF} -} - -src_install() { - default - - if use ldap ; then - dodoc README.LDAP doc/schema.OpenLDAP - dosbin plugins/sudoers/sudoers2ldif - - cat <<-EOF > "${T}"/ldap.conf.sudo - # See ldap.conf(5) and README.LDAP for details - # This file should only be readable by root - - # supported directives: host, port, ssl, ldap_version - # uri, binddn, bindpw, sudoers_base, sudoers_debug - # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key - EOF - - insinto /etc - doins "${T}"/ldap.conf.sudo - fperms 0440 /etc/ldap.conf.sudo - fi - - pamd_mimic system-auth sudo auth account session - - keepdir /var/db/sudo - fperms 0700 /var/db/sudo -} - -pkg_postinst() { - if use ldap ; then - ewarn - ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration." - ewarn - if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then - ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly" - ewarn "configured in /etc/nsswitch.conf." - ewarn - ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:" - ewarn " sudoers: ldap files" - ewarn - fi - fi - if use prefix ; then - ewarn - ewarn "To use sudo, you need to change file ownership and permissions" - ewarn "with root privileges, as follows:" - ewarn - ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo" - ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers" - ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d" - ewarn " # chown root:root ${EPREFIX}/var/db/sudo" - ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo" - ewarn - fi - - elog "To use the -A (askpass) option, you need to install a compatible" - elog "password program from the following list. Starred packages will" - elog "automatically register for the use with sudo (but will not force" - elog "the -A option):" - elog "" - elog " [*] net-misc/ssh-askpass-fullscreen" - elog " net-misc/x11-ssh-askpass" - elog "" - elog "You can override the choice by setting the SUDO_ASKPASS environmnent" - elog "variable to the program you want to use." -} |