Commit graph

71 commits

Author SHA1 Message Date
Frederik Rietdijk
bdfb1bd01b sudo: 1.8.29 -> 1.8.30 2020-01-02 21:38:33 +01:00
Frederik Rietdijk
ee3f276461 Revert "sudo: fix for structured attrs"
This broke sudo.

This reverts commit 91a1f2043f.
2020-01-02 21:38:33 +01:00
Maximilian Bosch
91a1f2043f
sudo: fix for structured attrs 2019-12-31 01:31:52 +01:00
Will Dietz
640677c30d sudo: 1.8.28 -> 1.8.29
https://www.sudo.ws/stable.html#1.8.29

Build tweak: fix build failure when attempting to check that
the "existing" sudoers file on $out/etc/sudoers parses clean--
this update changed precondition for this test to check if
DESTDIR is non-empty instead of previous behavior
"does the file exist".
2019-10-29 16:13:17 -05:00
Pierre Bourdon
9dbc3029f7
sudo: 1.8.27 -> 1.8.28 (CVE-2019-14287) 2019-10-14 23:17:45 +02:00
Will Dietz
0b0284867b sudo: 1.8.26 -> 1.8.27
https://www.sudo.ws/stable.html#1.8.27
2019-01-13 17:38:40 -06:00
Will Dietz
0a085d508a sudo: 1.8.25p1 -> 1.8.26 (#50422)
https://www.sudo.ws/stable.html#1.8.26
2018-11-16 23:54:46 +01:00
Will Dietz
2608649de7 sudo: 1.8.25 -> 1.8.25p1 (bugfix for systems w/o ppoll)
(cherry picked from commit b4308beb164c1e7e93bbed95697c734ef66e2da5)
2018-09-19 08:48:05 +02:00
Will Dietz
b026786e77 sudo: 1.8.24 -> 1.8.25 (#46057)
https://www.sudo.ws/stable.html

(may need to scroll to the 1.8.25 notes
afternewer versions are released)

(cherry picked from commit d93aa1c50f)
2018-09-19 08:47:19 +02:00
Will Dietz
7c62994271 sudo: 1.8.23 -> 1.8.24 (#45476) 2018-08-22 23:33:46 +02:00
John Ericson
cf06e42d1c Merge remote-tracking branch 'upstream/master' into staging 2018-05-03 16:35:36 -04:00
R. RyanTM
f431e20549 sudo: 1.8.22 -> 1.8.23
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.

This update was made based on information from https://repology.org/metapackage/sudo/versions.

These checks were done:

- built on NixOS
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/cvtsudoers -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/cvtsudoers --help’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay --help’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay -V’ and found version 1.8.23
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/sudoreplay --version’ and found version 1.8.23
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/visudo -h’ got 0 exit code
- ran ‘/nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23/bin/visudo --help’ got 0 exit code
- found 1.8.23 with grep in /nix/store/d2g0ybmppcar8k38jjiqqdz8s3knwrrm-sudo-1.8.23
- directory tree listing: https://gist.github.com/4d6cfc75cde31a340e8a41bf3d969564
2018-05-02 21:36:39 +02:00
Jan Malakhovski
7438083a4d tree-wide: disable doCheck and doInstallCheck where it fails (the trivial part) 2018-04-25 04:18:46 +00:00
Shea Levy
5815c7dfa6
sudo: Fix cross compilation 2018-02-28 15:01:31 -05:00
Ben Gamari
da310bdd6c sudo: Enable tmpfiles.d is disabled 2018-02-13 09:44:27 -06:00
Franz Pletz
f7f11b81a1
sudo: 1.8.21p2 -> 1.8.22 2018-01-28 19:59:43 +01:00
Samuel Dionne-Riel
7b97c8c0c8 treewide: homepage+src updates (found by repology, #33263) 2018-01-05 20:42:46 +01:00
adisbladis
68626f3e0a
sudo: 1.8.20p2 -> 1.8.21p2 2017-11-26 18:31:51 +08:00
Daniel Kuehn
4c449e03b7 sudo: Add optional dependency to SSSD, enabled by setting withSssd to true 2017-10-21 20:21:27 +02:00
Franz Pletz
47f7aa96b0
sudo: 1.8.20p1 -> 1.8.20p2 2017-06-20 04:57:40 +02:00
Jörg Thalheim
9e2f08cdc2 sudo: add remark to patch 2017-06-17 10:42:55 +01:00
Will Dietz
5ff8387f64 sudo: fix attempt to set special perms 2017-06-16 16:20:06 -05:00
Daiderd Jordan
3c0114d472
sudo: 1.8.20 -> 1.8.20p1, fixes CVE-2017-1000367 2017-05-30 23:33:04 +02:00
mimadrid
8b569420b4
sudo: 1.8.19p2 -> 1.8.20 2017-05-18 00:50:53 +02:00
Parnell Springmeyer
9e36a58649
Merging against upstream master 2017-02-13 17:16:28 -06:00
mimadrid
2aad8590d7 sudo: 1.8.19p1 -> 1.8.19p2 2017-02-13 23:43:32 +01:00
Parnell Springmeyer
4aa0923009
Getting rid of the var indirection and using a bin path instead 2017-01-29 04:11:01 -06:00
Parnell Springmeyer
e92b8402b0
Addressing PR feedback 2017-01-28 20:48:03 -08:00
Parnell Springmeyer
bae00e8aa8
setcap-wrapper: Merging with upstream master and resolving conflicts 2017-01-25 11:08:05 -08:00
mimadrid
c4f46949a6
sudo: 1.8.18p1 -> 1.8.19p1 2016-12-23 19:39:01 -05:00
mimadrid
19b6d90cab
sudo: 1.8.18 -> 1.8.18p1 2016-10-23 17:57:16 +02:00
Alexander Ried
8e0d456daa sudo: 1.8.17p1 -> 1.8.18 2016-09-23 02:01:57 +02:00
Parnell Springmeyer
98c058a1ee Adapting everything for the merged permissions wrappers work. 2016-09-01 19:21:06 -05:00
mimadrid
a311b06919
sudo: 1.8.16 -> 1.8.17p1 2016-07-16 23:46:42 +02:00
Franz Pletz
fcde15d66b sudo: 1.8.15 -> 1.8.16 2016-04-12 15:51:32 +02:00
Tuomas Tynkkynen
8a985d97a1 sudo: Compile with '--with-iologdir' to improve build purity
Otherwise it will try to guess the log directory, and the guess might
not be the same if chroot builds are enabled or not.

The gruesome details from m4/sudo.m4:

````
dnl
dnl Where the I/O log files go, use /var/log/sudo-io if
dnl /var/log exists, else /{var,usr}/adm/sudo-io
dnl
AC_DEFUN([SUDO_IO_LOGDIR], [
    AC_MSG_CHECKING(for I/O log dir location)
    if test "${with_iologdir-yes}" != "yes"; then
        iolog_dir="$with_iologdir"
    elif test -d "/var/log"; then
        iolog_dir="/var/log/sudo-io"
    elif test -d "/var/adm"; then
        iolog_dir="/var/adm/sudo-io"
    else
        iolog_dir="/usr/adm/sudo-io"
    fi
    if test "${with_iologdir}" != "no"; then
        SUDO_DEFINE_UNQUOTED(_PATH_SUDO_IO_LOGDIR, "$iolog_dir")
    fi
    AC_MSG_RESULT($iolog_dir)
])dnl
````
2016-01-02 18:50:11 +01:00
Franz Pletz
3edcc3c669 sudo: 1.8.14p3 -> 1.8.15, fixes #11297 2015-12-03 09:02:17 +01:00
Tobias Geerinckx-Rice
7b30d6a8cb sudo: add withInsults flag (disabled by default)
The feature Nix neither needs nor deserves.
Requires the "insults" to be explicitly enabled in sudoers.
This adds 1.6 MB to your sudo as some kind of cruel meta-joke.
2015-07-31 02:02:08 +02:00
William A. Kennington III
b827583831 sudo: 1.8.14p1 -> 1.8.14p3 2015-07-22 11:26:59 -07:00
William A. Kennington III
8734f01830 sudo: 1.8.13 -> 1.8.14p1 2015-07-19 12:09:14 -07:00
William A. Kennington III
2f02ae037a sudo: 1.8.12 -> 1.8.13 2015-03-26 14:01:07 -07:00
Eelco Dolstra
2ed5c2bd6b Set some meta.platforms
Also fix meta.platform -> meta.platforms in a few places.
2015-03-20 20:04:42 +01:00
Eelco Dolstra
9e9e446880 sudo: Fix incorrect runtime path 2015-02-25 12:39:06 +01:00
Eelco Dolstra
3d3db3550f sudo: Update to 1.8.12 2015-02-24 18:04:35 +01:00
Eelco Dolstra
6866712a39 sudo: Update to 1.8.11p2 2014-12-18 12:31:56 +01:00
Aristid Breitkreuz
5b352c409f sudo: update from 1.8.10p3 to 1.8.11 2014-10-08 20:23:25 +02:00
Bjørn Forsman
c3436c0c4a sudo: change password prompt
The current sudo password prompt is "Password: ", while distros like
e.g. Ubuntu and Arch Linux use "[sudo] password for %p: ", where "%p"
expands to the username of the user running sudo.

Adopt the prompt from other distros because it makes it less confusing
when running commands with sudo that themselves ask for a password.
2014-09-04 15:39:11 +02:00
Bjørn Forsman
89eccb7fb0 sudo: add sendmailPath option (defaults to /var/setuid-wrappers/sendmail)
It currently seems impossible to make sudo send emails. No matter how much
debugging I enable, sudo continues to be silent about sendmail. I tried setting
"Defaults mailerpath=/var/setuid-wrappers/sendmail" but that too was completely
ignored (except for logging that the variable mailerpath exists with the value
I assigned to it...).

This enables sendmail support and sets a default value that works on NixOS.
2014-09-04 13:38:03 +02:00
Chris Farmiloe
fbfdc8e2dc keep fallback visudo editor as nano 2014-06-22 19:50:40 +02:00
Chris Farmiloe
3dec61a8a6 Fix sudo not installing due to timedir deprecation 2014-06-22 19:42:32 +02:00