Date: Sat, 11 Dec 1999 02:09:34 +0900 From: Akinori MUSHA aka knu <knu@idaemons.org> To: FreeBSD-gnats-submit@freebsd.org Subject: ports/15403: unbreak port with update: sudo -> 1.6.1 Message-ID: <86vh66en8x.wl@localhost.local.idaemons.org>
next in thread | raw e-mail | index | archive | help
>Number: 15403 >Category: ports >Synopsis: unbreak port with update: sudo -> 1.6.1 >Confidential: yes >Severity: serious >Priority: high >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Fri Dec 10 09:20:01 PST 1999 >Closed-Date: >Last-Modified: >Originator: Akinori MUSHA aka knu <knu@idaemons.org> >Release: FreeBSD 3.4-RC i386 >Organization: A.I.D. >Environment: FreeBSD 3.4-RC i386 + ports-current >Description: Sudo (security/sudo) is broken now despite its importance! >How-To-Repeat: >Fix: Go ahead commit this to ship 3.4-RELEASE with Sudo! diff -ruN sudo.prev/Makefile sudo/Makefile --- sudo.prev/Makefile Fri Dec 10 11:27:58 1999 +++ sudo/Makefile Sat Dec 11 01:50:11 1999 @@ -1,12 +1,12 @@ # New ports collection makefile for: sudo -# Version required: 1.6 +# Version required: 1.6.1 # Date created: Sun Aug 13 12:36:14 CDT 1995 # Whom: erich@rrnet.com # # $FreeBSD: ports/security/sudo/Makefile,v 1.25 1999/12/10 02:27:58 mharo Exp $ # -DISTNAME= sudo-1.6 +DISTNAME= sudo-1.6.1 CATEGORIES= security MASTER_SITES= ftp://ftp.cs.colorado.edu/pub/sysadmin/sudo/ @@ -15,7 +15,7 @@ GNU_CONFIGURE= yes CONFIGURE_ARGS= --with-skey \ - --sysconfdir=/usr/local/etc \ + --sysconfdir=${PREFIX}/etc \ --disable-log-wrap \ --with-ignore-dot \ --with-tty-tickets \ @@ -24,5 +24,8 @@ MAN5= sudoers.5 MAN8= sudo.8 visudo.8 + +post-patch: + perl -i -pe 's,!!PREFIX!!,${PREFIX},g' ${WRKSRC}/*.man .include <bsd.port.mk> diff -ruN sudo.prev/files/md5 sudo/files/md5 --- sudo.prev/files/md5 Fri Dec 10 11:27:59 1999 +++ sudo/files/md5 Sat Dec 11 01:03:05 1999 @@ -1 +1 @@ -MD5 (sudo-1.6.tar.gz) = 437331519c93d0c7cb3b745dd8d7489d +MD5 (sudo-1.6.1.tar.gz) = 9ddb779a7f378ca013e1b327292afba9 diff -ruN sudo.prev/patches/patch-aa sudo/patches/patch-aa --- sudo.prev/patches/patch-aa Mon Mar 29 09:52:35 1999 +++ sudo/patches/patch-aa Sat Dec 11 01:25:14 1999 @@ -1,17 +1,6 @@ ---- /usr/ports/security/sudo/work2/sudo.v1.5.7p4/configure Tue Nov 24 05:40:24 1998 -+++ configure Sat Jan 2 04:07:08 1999 -@@ -667,8 +669,8 @@ - - test "$mandir" = '${prefix}/man' && mandir='$(prefix)/man' - test "$bindir" = '${exec_prefix}/bin' && bindir='$(exec_prefix)/bin' --test "$sbindir" = '${exec_prefix}/sbin' && sbindir='$(exec_prefix)/sbin' --test "$sysconfdir" = '${prefix}/etc' && sysconfdir='/etc' -+test "$sbindir" = '${exec_prefix}/sbin' || sbindir='$(exec_prefix)/sbin' -+test "$sysconfdir" = '${prefix}/etc' || sysconfdir='/etc' - - - # Check whether --with-CC or --without-CC was given. -@@ -7170,7 +7188,7 @@ +--- configure.orig Thu Dec 9 13:03:12 1999 ++++ configure Sat Dec 11 01:18:32 1999 +@@ -7737,7 +7737,7 @@ fi if test "$with_skey" = "yes"; then diff -ruN sudo.prev/patches/patch-ab sudo/patches/patch-ab --- sudo.prev/patches/patch-ab Mon Mar 29 09:52:36 1999 +++ sudo/patches/patch-ab Sat Dec 11 01:25:53 1999 @@ -1,6 +1,6 @@ ---- ./Makefile.in.org Sun Aug 25 10:29:31 1996 -+++ ./Makefile.in Wed Oct 16 00:43:03 1996 -@@ -219,6 +219,7 @@ +--- Makefile.in.orig Sun Dec 5 11:18:45 1999 ++++ Makefile.in Sat Dec 11 01:18:33 1999 +@@ -288,6 +288,7 @@ $(INSTALL) -o $(sudoers_uid) -g $(sudoers_gid) -m $(sudoers_mode) \ $(srcdir)/sudoers $(sudoersdir)/sudoers; \ fi diff -ruN sudo.prev/patches/patch-ad sudo/patches/patch-ad --- sudo.prev/patches/patch-ad Thu Jan 1 09:00:00 1970 +++ sudo/patches/patch-ad Sat Dec 11 01:35:24 1999 @@ -0,0 +1,29 @@ +--- sudo.man.orig Sat Dec 11 01:20:41 1999 ++++ sudo.man Sat Dec 11 01:35:15 1999 +@@ -208,7 +208,7 @@ + (five minutes by default). + .PP + \fBsudo\fR determines who is an authorized user by consulting the +-file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user ++file \fI!!PREFIX!!/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user + can update the time stamp without running a \fIcommand.\fR + The password prompt itself will also time out if the user's password is + not entered with N minutes (again, this is defined at configure +@@ -386,7 +386,7 @@ + .SH "FILES" + .PP + .Vb 2 +-\& /etc/sudoers List of who can run what ++\& !!PREFIX!!/etc/sudoers List of who can run what + \& /var/run/sudo Directory containing timestamps + .Ve + \fBsudo\fR utilizes the following environment variables: +@@ -409,7 +409,7 @@ + .SH "FILES" + .PP + .Vb 3 +-\& /etc/sudoers List of who can run what ++\& !!PREFIX!!/etc/sudoers List of who can run what + \& /var/run/sudo Directory containing timestamps + \& /tmp/.odus Same as above if no /var/run exists + .Ve diff -ruN sudo.prev/patches/patch-ae sudo/patches/patch-ae --- sudo.prev/patches/patch-ae Thu Jan 1 09:00:00 1970 +++ sudo/patches/patch-ae Sat Dec 11 01:47:45 1999 @@ -0,0 +1,11 @@ +--- sudoers.man.orig Sun Dec 5 11:18:47 1999 ++++ sudoers.man Sat Dec 11 01:47:13 1999 +@@ -794,7 +794,7 @@ + .SH "FILES" + .PP + .Vb 3 +-\& /etc/sudoers List of who can run what ++\& !!PREFIX!!/etc/sudoers List of who can run what + \& /etc/group Local groups file + \& /etc/netgroup List of network groups + .Ve diff -ruN sudo.prev/patches/patch-af sudo/patches/patch-af --- sudo.prev/patches/patch-af Thu Jan 1 09:00:00 1970 +++ sudo/patches/patch-af Sat Dec 11 01:50:12 1999 @@ -0,0 +1,31 @@ +--- visudo.man.orig Sun Dec 5 11:18:47 1999 ++++ visudo.man Sat Dec 11 01:49:19 1999 +@@ -232,7 +232,7 @@ + .SH "ERRORS" + .Ip "sudoers file busy, try again later." 4 + Someone else is currently editing the \fIsudoers\fR file. +-.Ip "/etc/sudoers.tmp: Permission denied" 4 ++.Ip "!!PREFIX!!/etc/sudoers.tmp: Permission denied" 4 + You didn't run \fBvisudo\fR as root. + .Ip "Can't find you in the passwd database" 4 + Your userid does not appear in the system passwd file. +@@ -254,8 +254,8 @@ + .SH "FILES" + .PP + .Vb 2 +-\& /etc/sudoers List of who can run what +-\& /etc/sudoers.tmp Lock file for visudo ++\& !!PREFIX!!/etc/sudoers List of who can run what ++\& !!PREFIX!!/etc/sudoers.tmp Lock file for visudo + .Ve + .SH "AUTHOR" + Many people have worked on \fIsudo\fR over the years, this version of +@@ -299,7 +299,7 @@ + + .IX Item "sudoers file busy, try again later." + +-.IX Item "/etc/sudoers.tmp: Permission denied" ++.IX Item "!!PREFIX!!/etc/sudoers.tmp: Permission denied" + + .IX Item "Can't find you in the passwd database" + diff -ruN sudo.prev/pkg/DESCR sudo/pkg/DESCR --- sudo.prev/pkg/DESCR Tue Jan 13 22:49:02 1998 +++ sudo/pkg/DESCR Sat Dec 11 01:42:23 1999 @@ -1,4 +1,4 @@ -This is the CU version of sudo, release 1.5.4. +This is the CU version of sudo, release 1.6.1. Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86vh66en8x.wl>