summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDiego Elio Pettenò <flameeyes@gentoo.org>2014-09-29 21:29:18 +0000
committerDiego Elio Pettenò <flameeyes@gentoo.org>2014-09-29 21:29:18 +0000
commit3345d6a8e02b640815f52d082b109a03d22caf3b (patch)
tree548e6aa45bf83cccb092ee415d0ce661071dbfef /app-admin/sudo
parentClean up unused dependencies. (diff)
downloadhistorical-3345d6a8e02b640815f52d082b109a03d22caf3b.tar.gz
historical-3345d6a8e02b640815f52d082b109a03d22caf3b.tar.bz2
historical-3345d6a8e02b640815f52d082b109a03d22caf3b.zip
Version bump and remove old.
Package-Manager: portage-2.2.14_rc1/cvs/Linux x86_64 Manifest-Sign-Key: 0xD4301342
Diffstat (limited to 'app-admin/sudo')
-rw-r--r--app-admin/sudo/ChangeLog9
-rw-r--r--app-admin/sudo/Manifest30
-rw-r--r--app-admin/sudo/sudo-1.8.11.ebuild (renamed from app-admin/sudo/sudo-1.8.10_p2.ebuild)6
-rw-r--r--app-admin/sudo/sudo-1.8.6_p8.ebuild191
-rw-r--r--app-admin/sudo/sudo-1.8.8.ebuild191
-rw-r--r--app-admin/sudo/sudo-1.8.9_p5.ebuild191
6 files changed, 26 insertions, 592 deletions
diff --git a/app-admin/sudo/ChangeLog b/app-admin/sudo/ChangeLog
index c56c34410b8a..260c1f943876 100644
--- a/app-admin/sudo/ChangeLog
+++ b/app-admin/sudo/ChangeLog
@@ -1,6 +1,13 @@
# ChangeLog for app-admin/sudo
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.364 2014/05/09 10:08:23 flameeyes Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.365 2014/09/29 21:29:13 flameeyes Exp $
+
+*sudo-1.8.11 (29 Sep 2014)
+
+ 29 Sep 2014; Diego E. Pettenò <flameeyes@gentoo.org> +sudo-1.8.11.ebuild,
+ -sudo-1.8.10_p2.ebuild, -sudo-1.8.6_p8.ebuild, -sudo-1.8.8.ebuild,
+ -sudo-1.8.9_p5.ebuild:
+ Version bump and remove old.
*sudo-1.8.10_p3 (09 May 2014)
diff --git a/app-admin/sudo/Manifest b/app-admin/sudo/Manifest
index 4a9072e8d27f..027d1d7fa6ff 100644
--- a/app-admin/sudo/Manifest
+++ b/app-admin/sudo/Manifest
@@ -1,30 +1,26 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
-DIST sudo-1.8.10p2.tar.gz 2261235 SHA256 ba6cb8db6dccdb92a96e8ae63ca65c410f8b61270b603ab9af4b1154fef379f1 SHA512 c746489dbe57804d05261d784a949b2231e5b96a7c8caf51cf9021a092aebd04ebf31a0e89390a64197f684b2e63405b6715eff20b71b1f5772f183bcd47cce1 WHIRLPOOL 0842e85916cdbf6167ab7d632484973b3d43cdf93c2de53e70b59068245bac5545e2c9b9347f49437a00a08c1d726bc66535092d9fe114ab141eb2ebe5aaee76
DIST sudo-1.8.10p3.tar.gz 2262370 SHA256 6eda135fa68163108f1c24de6975de5ddb09d75730bb62d6390bda7b04345400 SHA512 714e20d7ea0e76b24acfa73818644fdf4094374b2000ef0cb879a92273230fdc2bda4cab041f224f19b57149f2ae289c377c693d3bca5a2d5e1bba79cf97c434 WHIRLPOOL 8677bf12f49f78af1ac4dcf4692194ac49116c5925258e2ad19e33e79bddfb6280ecbd11e98728bef57057c3461ca3b1fa29fc4533acf7b1bfb18e6836ea8c92
+DIST sudo-1.8.11.tar.gz 2399452 SHA256 a3177de7b5fbebfb43b32fc30aecaaf434762bf23e313de4c4a39e5ff715c845 SHA512 e35d42c8b15ded918b05a0522f8e167d6c672983bec593e0deee8ae2ccba6aed05170e88333f01b7c0b59f00cec690d8f3cf09404a7bde6fd10946a7622785fd WHIRLPOOL 236d23eb3c5db9a202a254e6cfaa50842e702aeddac584937eaf453156ec5c0b44a7dce1d84d1df29b8b2d59024f7d5b04407a33a0ffc9e2e43c47552542f415
DIST sudo-1.8.5p2.tar.gz 1746344 SHA256 c32ae2bc3faf83444c82ca75ccb10ad3684d8222e3535f164c4a4db7cdddf8cf SHA512 616967eea79f91cda2b0cd1d13ed453d20142521ecfca289432bdf5708ac0549c7873fd80170cc0481390e82f1e60fb0bffcfc7c6b70d5d721aa98d23361c5cb WHIRLPOOL ac0d2c040935c54947571a0d4671be70aaaf7a6f69cb097acd321718656d4c569b0db4191eaf943c6b642a1d641263429287241a236a0f2a0c9edf973710bf8b
DIST sudo-1.8.6p7.tar.gz 1858348 SHA256 301089edb22356f59d097f6abbe1303f03927a38691b02959d618546c2125036 SHA512 732bcbd53b77d329bbc77d3cd3644a595e938433053122fe3098385c0ad3a6a9cf4f4ab8709c7a79cad51dba77ffaa1be9ffde8e8834d3798822a1bd5b518d42 WHIRLPOOL 875984b44b571dc3765aab5ad8bd8859d0cd680e7da453109b5bee45aac336e3d0c05e1133ce0101a6dd2b9f19a26454d3e0b11c0edf32034f9fae04d3dfbb4d
-DIST sudo-1.8.6p8.tar.gz 1858612 SHA256 c0baaa87f59153967b650a0dde2f7d4147d358fa15f3fdabb47e84d0282fe625 SHA512 9c9d297e8cba4ae74a1358b23da15beea4649684afa09b3c3486bd25454008b4c7cd543266f8abc22aac48a56912d7174ccfc137a69670e737d6c9939708cb80 WHIRLPOOL f19c882a2b3de4f41ee97b1f26ebe284782c82500dfc2f86edd262b3ec9f10a2fb3c8b20f26cd1587910677b169ed0260a9672db4dc7b1ea8d5d817235f6197c
-DIST sudo-1.8.8.tar.gz 2117145 SHA256 9f911c1e9297fb8006deb52fa81197a8d06b9d54e70672f723c467ecae992fc9 SHA512 e56ea849c2e6470a3d97fc76bde6af145938cf2df4d17f3faef00368262d8e2dd5bcc7e3adf490e853e23466b15638000a527156bd694ce4980003d751c896d5 WHIRLPOOL 74fad850b4f370775f3c5611235b7f20837267f599ace4350f6498ce21cf12e94c1efb98017656106305398496c2f1ff992700fe5fbde4fcf47ca5210cddfdc6
-DIST sudo-1.8.9p5.tar.gz 2179066 SHA256 bc9d5c96de5f8b4d2b014f87a37870aef60d2891c869202454069150a21a5c21 SHA512 ebd1af9724e135db2e553e59c96f22f6f25885b7ba35767657a26d319bb074987833329084cc07271946b2ef7165567f63ccad11ccf290cef3f77953a6fd7a28 WHIRLPOOL 63940daa38d7d9dea8f3ca41c637935e00fd7439a09de3300f8b875382c142e4328c3d9034273e920a9987e70358157f3fba6d5683b6b94badf00ad5aa8b8293
-EBUILD sudo-1.8.10_p2.ebuild 5633 SHA256 cb364c572d24e4d96df9240b931c9d4d364cd1acdc267aaa8afcbf8507bc2050 SHA512 fdf1537faa27d9ebc5fdba71c419b042da380e0705d3f25a9f9156f467a282f64e6b903744adecd0885943297909849ee5982d4b7335be01aa65c23b17c659e6 WHIRLPOOL 375474860c6ed504c70aa291353031dee1e2f5dcce5df3d2041c510905109445d34eb616acca0e5054431dfc177c2e31151ea3b2a44ac7b0656e3d8d35c3e48a
EBUILD sudo-1.8.10_p3.ebuild 5630 SHA256 7ffab9d8c9f6fcddb5cfc815f94b67c37929e3394ce336ea595caa2a77d93589 SHA512 186a6ba9ca67d904f857e507dce2002113f3fc5771ff90885ee88909c13be9a5fd436c25f73e204a4a89108a59d0638a870c446d7a26f62397069cf7aec47920 WHIRLPOOL 5134e735ab4e2d171c9bbf81e289731e5c6cfb2facece69a048402a132bc82dac14bb1b3dd55d2607902e11d995f8fe9ed78db4dd977094d84cbbc066f5dfdd0
+EBUILD sudo-1.8.11.ebuild 5762 SHA256 a37d2f2e3e95a506fe88555c32a0cf6c1b4fc8b89a8c04b49202268ba0d20a8d SHA512 e02c54b352cca2a8de95b16f236e2a119b5ae8b082c2450400a81970c8e36efb6fb1888e0e93bb4a61332b33d37875cad730ba54a38f7d60c5cde457ea2cd38b WHIRLPOOL 05ce51b06dcaff1fa7030ef10aa3e3bb88828ed8e2790a3ab77ae5b76e09194e7798ff3bc6fd51627a7e6b8acc7701c8b56a37ac7f22803bff8ed9ef47441eb2
EBUILD sudo-1.8.5_p2.ebuild 5464 SHA256 5a647b0c4a2949e476277ead580f6a42747f7778b282dd1e034a2c010c784a9e SHA512 34cc788ee019ccaf8e2f74dbae5e668d8fb94dab066bea49f3a37f31210a66c9327686e5c5f44a966321f26e3ccc5e2aa47fdb46b35285e96f266eafbddbc741 WHIRLPOOL 532a4151b0acbec600552cca4b18b54afba14a48e91640dd85642c4571e993e1a8eb20e03e83ef3f901a8f6eb6c63c2a5aec7650020e5e58f0d7911790d419f5
EBUILD sudo-1.8.6_p7.ebuild 5464 SHA256 4f58dcb19ec413e99144a4806d5d7d68c5f9e3bbc4d8b0d77efb8df8dd147e57 SHA512 ed1575681e3e84d42d97f4465af3c3f33fa82d645d49a2219047728b22d0d7cbfb7c4e8a34ffce55da18ce67db84d6e40907c571231fa16acdef18bfa41cabc4 WHIRLPOOL a74177a5effbe3379a7da469f6cdaf5bd0263b777cbdecf8c02bf9956bc4cce3de35a2727f0e275f76ba94b1f0fff738d04d5102b83ac739bb99db624d919a1b
-EBUILD sudo-1.8.6_p8.ebuild 5474 SHA256 9a8b19e57ca0ed59d0b371352842c6539c714b8c163c97f81fbcf2f2d227cd9a SHA512 730229e13bb4b3591ab6a0a0ba3a9090d47b8cb3d425b4472ef33ca845b3522771443568fcf05f83b9cd7e465d8566a1e569de11ca0427693a74c9438118fbaf WHIRLPOOL ff4756e3505a293bbc67ae2933414b3c42b0cb5006bded4e280d97487f593cc288dddaa1b196137bebc03f97c928528226d52f06f170304dba3b868b0a8ef291
-EBUILD sudo-1.8.8.ebuild 5474 SHA256 597d3cfa588d3e47d07be11cd2aa6df137951167c27043ce5ac06f710f49fdaf SHA512 223c0b1caf6797242a0db709eef46a5951959ed83aaeb25624c47ca39b76d2922ea79e8b8b1204195ad6bf7ec1ab4985770552d26be2a57728767ece2ce9bd43 WHIRLPOOL 7dad9dfaaf610212bbc5c1d6f133f1761885757df32cc3bb1166a29910a68089281c84b256d2b61bf3bf150e3bd458081f7039ff697a9b20bc5e86d36d8c1309
-EBUILD sudo-1.8.9_p5.ebuild 5481 SHA256 8705bae8d24b7730840b2897846a72bbe031fe2d1c50284e87785ec3353bf7d2 SHA512 5a83aadb46ecd1076f486a3a9dcc5f7cbfe244de49bc2413a2cdfb80c2eccfe4e1db767099db29bd4bd311ecd469ceec7c1a2ac3c60fa71fb3639ac48cc84075 WHIRLPOOL 21bb3e3e0eb7fd828afc3e4bc122843642844c7c6d9046382daac52f28bf10cac57aa08dbc37e9bc48c41d2955736698c53f1a39e0801b3efa801ca7d44e643c
-MISC ChangeLog 52769 SHA256 520f55bf10a49026bc723660ce3b3cfd41cc70293657585572e4743018ede0f4 SHA512 7344a48514632ce5fdf58de1b99fc3bd78696a5a64ef5d162d1f575de963531b74686aedc2e13ff156b6fdd98177988535c09b6e4c2848862be0dc36d7d22130 WHIRLPOOL aaf384e8d91737631881281e4146026a130f5140e47d5b3d08a91ab94877a699516b48ca23727cf94501481d7e2b4fad39dd0b892498ccb7a70abc2fedfc093d
+MISC ChangeLog 53000 SHA256 69282874dc7e38c36f9445ef9b15689372d4aad72c8323f25a374b2c04d948a2 SHA512 3ccd9374aa81e1649b106a956d5081e67999b4c525cbedbd1a1b5031997bb35f67941cc9beaeabd5ae72d41a353d17a3284d2e8a9e4af09d9273468bf25715cc WHIRLPOOL 88958018ddb5b03624a26fb60f73fa666e4248b532c7b00834f8f7d59ccb3c9252535a7d818321eb596f7f1bb1dbb633ef2ed3d522d72426642d5d150db05cac
MISC metadata.xml 726 SHA256 242e8a573d76b2163a928259e5226fff2c237b3e9c244860a1430fa79c5b390e SHA512 d0a7e5f53ec823d84e3c38c2bd64ba566d7cbd08c12ebf3e9b9fed10b77ce2e3e951e262f1a307aa8f0819a662559ca6f9bcf86cf05088480413e4534ce299d3 WHIRLPOOL b919b1825e68eb3285523f057fc42b5fde9e59a738ecdb1de0835af827db6284fc66848a10517a215389c4466f21b70e376f3fffc993aa338e47fca971d0af83
-----BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.22 (GNU/Linux)
+Version: GnuPG v2.0
-iQEcBAEBCAAGBQJTbKlFAAoJEBzRPIrUMBNCDvgH/jgYe0kbLUNP2zky/mX7OB6X
-mYyCMCnV5OJfsBThZcm163qxsygbW4ulWI8Qwv9thjOGXh9B2xBTSsOzT6L9B12f
-5cdBazANXDDawgharxtGnl2LS9ZP4dG+xBTPLLroRNipn2bT+VwjKHFI8DFJO48T
-ji17zxMgfKVuLoSjno8StUw94SaJ1hae2Ag96efUljkGqVHqHQ0BMKdSD4d2a8Vl
-cjSVK454ZCPeVloL1hITN9kmhLQiEAnYDDTqSXvKAj4+0bpgK5AEG8/A5xOCTYrY
-ua0pv3OA1AFhPL+Zj2wIZOYPE2MpSbbtPJqM+QaVbb3GpFS2d48EnFaHa50WTtM=
-=iyzN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=
+=8rD5
-----END PGP SIGNATURE-----
diff --git a/app-admin/sudo/sudo-1.8.10_p2.ebuild b/app-admin/sudo/sudo-1.8.11.ebuild
index 9e01169f6a3e..bdf3d5f1bc38 100644
--- a/app-admin/sudo/sudo-1.8.10_p2.ebuild
+++ b/app-admin/sudo/sudo-1.8.11.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.10_p2.ebuild,v 1.2 2014/04/25 18:21:54 polynomial-c Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.11.ebuild,v 1.1 2014/09/29 21:29:13 flameeyes Exp $
EAPI=5
@@ -47,6 +47,10 @@ S=${WORKDIR}/${MY_P}
REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
+# The check_ttyname fails in the ebuild for various reasons.
+# See upstream http://www.sudo.ws/bugs/show_bug.cgi?id=643
+RESTRICT=test
+
MAKEOPTS+=" SAMPLES="
src_prepare() {
diff --git a/app-admin/sudo/sudo-1.8.6_p8.ebuild b/app-admin/sudo/sudo-1.8.6_p8.ebuild
deleted file mode 100644
index 173c31cd3615..000000000000
--- a/app-admin/sudo/sudo-1.8.6_p8.ebuild
+++ /dev/null
@@ -1,191 +0,0 @@
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.6_p8.ebuild,v 1.2 2013/05/27 21:35:20 zx2c4 Exp $
-
-EAPI=4
-
-inherit eutils pam multilib libtool
-
-MY_P=${P/_/}
-MY_P=${MY_P/beta/b}
-
-uri_prefix=
-case ${P} in
-*_beta*|*_rc*) uri_prefix=beta/ ;;
-esac
-
-DESCRIPTION="Allows users or groups to run commands as other users"
-HOMEPAGE="http://www.sudo.ws/"
-SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
- ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
-
-# Basic license is ISC-style as-is, some files are released under
-# 3-clause BSD license
-LICENSE="ISC BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
-IUSE="ldap nls pam offensive selinux skey +sendmail"
-
-DEPEND="pam? ( virtual/pam )
- skey? ( >=sys-auth/skey-1.1.5-r1 )
- ldap? (
- >=net-nds/openldap-2.1.30-r1
- dev-libs/cyrus-sasl
- )
- sys-libs/zlib"
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-sudo )
- ldap? ( dev-lang/perl )
- pam? ( sys-auth/pambase )
- >=app-misc/editor-wrapper-3
- virtual/editor
- sendmail? ( virtual/mta )"
-DEPEND="${DEPEND}
- sys-devel/bison"
-
-S=${WORKDIR}/${MY_P}
-
-REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
-
-MAKEOPTS+=" SAMPLES="
-
-src_prepare() {
- elibtoolize
-}
-
-set_rootpath() {
- # FIXME: secure_path is a compile time setting. using ROOTPATH
- # is not perfect, env-update may invalidate this, but until it
- # is available as a sudoers setting this will have to do.
- einfo "Setting secure_path ..."
-
- # first extract the default ROOTPATH from build env
- ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
- if [[ -z ${ROOTPATH} ]] ; then
- ewarn " Failed to find ROOTPATH, please report this"
- fi
-
- # then remove duplicate path entries
- cleanpath() {
- local newpath thisp IFS=:
- for thisp in $1 ; do
- if [[ :${newpath}: != *:${thisp}:* ]] ; then
- newpath+=:$thisp
- else
- einfo " Duplicate entry ${thisp} removed..."
- fi
- done
- ROOTPATH=${newpath#:}
- }
- cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
-
- # finally, strip gcc paths #136027
- rmpath() {
- local e newpath thisp IFS=:
- for thisp in ${ROOTPATH} ; do
- for e ; do [[ $thisp == $e ]] && continue 2 ; done
- newpath+=:$thisp
- done
- ROOTPATH=${newpath#:}
- }
- rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
-
- einfo "... done"
-}
-
-src_configure() {
- local ROOTPATH
- set_rootpath
-
- # audit: somebody got to explain me how I can test this before I
- # enable it.. - Diego
- # plugindir: autoconf code is crappy and does not delay evaluation
- # until `make` time, so we have to use a full path here rather than
- # basing off other values.
- econf \
- --enable-zlib=system \
- --with-secure-path="${ROOTPATH}" \
- --with-editor="${EPREFIX}"/usr/libexec/editor \
- --with-env-editor \
- $(use_with offensive insults) \
- $(use_with offensive all-insults) \
- $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
- $(use_with ldap) \
- $(use_enable nls) \
- $(use_with pam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_with sendmail) \
- --without-opie \
- --without-linux-audit \
- --with-timedir="${EPREFIX}"/var/db/sudo \
- --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
- --docdir="${EPREFIX}"/usr/share/doc/${PF}
-}
-
-src_install() {
- default
-
- if use ldap ; then
- dodoc README.LDAP doc/schema.OpenLDAP
- dosbin plugins/sudoers/sudoers2ldif
-
- cat <<-EOF > "${T}"/ldap.conf.sudo
- # See ldap.conf(5) and README.LDAP for details
- # This file should only be readable by root
-
- # supported directives: host, port, ssl, ldap_version
- # uri, binddn, bindpw, sudoers_base, sudoers_debug
- # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
- EOF
-
- insinto /etc
- doins "${T}"/ldap.conf.sudo
- fperms 0440 /etc/ldap.conf.sudo
- fi
-
- pamd_mimic system-auth sudo auth account session
-
- keepdir /var/db/sudo
- fperms 0700 /var/db/sudo
-}
-
-pkg_postinst() {
- if use ldap ; then
- ewarn
- ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
- ewarn
- if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
- ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
- ewarn "configured in /etc/nsswitch.conf."
- ewarn
- ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
- ewarn " sudoers: ldap files"
- ewarn
- fi
- fi
- if use prefix ; then
- ewarn
- ewarn "To use sudo, you need to change file ownership and permissions"
- ewarn "with root privileges, as follows:"
- ewarn
- ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
- ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
- ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
- ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
- ewarn
- fi
-
- elog "To use the -A (askpass) option, you need to install a compatible"
- elog "password program from the following list. Starred packages will"
- elog "automatically register for the use with sudo (but will not force"
- elog "the -A option):"
- elog ""
- elog " [*] net-misc/ssh-askpass-fullscreen"
- elog " net-misc/x11-ssh-askpass"
- elog ""
- elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
- elog "variable to the program you want to use."
-}
diff --git a/app-admin/sudo/sudo-1.8.8.ebuild b/app-admin/sudo/sudo-1.8.8.ebuild
deleted file mode 100644
index e4f42bd85811..000000000000
--- a/app-admin/sudo/sudo-1.8.8.ebuild
+++ /dev/null
@@ -1,191 +0,0 @@
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.8.ebuild,v 1.1 2013/10/10 18:49:58 chainsaw Exp $
-
-EAPI=5
-
-inherit eutils pam multilib libtool
-
-MY_P=${P/_/}
-MY_P=${MY_P/beta/b}
-
-uri_prefix=
-case ${P} in
-*_beta*|*_rc*) uri_prefix=beta/ ;;
-esac
-
-DESCRIPTION="Allows users or groups to run commands as other users"
-HOMEPAGE="http://www.sudo.ws/"
-SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
- ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
-
-# Basic license is ISC-style as-is, some files are released under
-# 3-clause BSD license
-LICENSE="ISC BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
-IUSE="ldap nls pam offensive selinux skey +sendmail"
-
-DEPEND="pam? ( virtual/pam )
- skey? ( >=sys-auth/skey-1.1.5-r1 )
- ldap? (
- >=net-nds/openldap-2.1.30-r1
- dev-libs/cyrus-sasl
- )
- sys-libs/zlib"
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-sudo )
- ldap? ( dev-lang/perl )
- pam? ( sys-auth/pambase )
- >=app-misc/editor-wrapper-3
- virtual/editor
- sendmail? ( virtual/mta )"
-DEPEND="${DEPEND}
- sys-devel/bison"
-
-S=${WORKDIR}/${MY_P}
-
-REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
-
-MAKEOPTS+=" SAMPLES="
-
-src_prepare() {
- elibtoolize
-}
-
-set_rootpath() {
- # FIXME: secure_path is a compile time setting. using ROOTPATH
- # is not perfect, env-update may invalidate this, but until it
- # is available as a sudoers setting this will have to do.
- einfo "Setting secure_path ..."
-
- # first extract the default ROOTPATH from build env
- ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
- if [[ -z ${ROOTPATH} ]] ; then
- ewarn " Failed to find ROOTPATH, please report this"
- fi
-
- # then remove duplicate path entries
- cleanpath() {
- local newpath thisp IFS=:
- for thisp in $1 ; do
- if [[ :${newpath}: != *:${thisp}:* ]] ; then
- newpath+=:$thisp
- else
- einfo " Duplicate entry ${thisp} removed..."
- fi
- done
- ROOTPATH=${newpath#:}
- }
- cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
-
- # finally, strip gcc paths #136027
- rmpath() {
- local e newpath thisp IFS=:
- for thisp in ${ROOTPATH} ; do
- for e ; do [[ $thisp == $e ]] && continue 2 ; done
- newpath+=:$thisp
- done
- ROOTPATH=${newpath#:}
- }
- rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
-
- einfo "... done"
-}
-
-src_configure() {
- local ROOTPATH
- set_rootpath
-
- # audit: somebody got to explain me how I can test this before I
- # enable it.. - Diego
- # plugindir: autoconf code is crappy and does not delay evaluation
- # until `make` time, so we have to use a full path here rather than
- # basing off other values.
- econf \
- --enable-zlib=system \
- --with-secure-path="${ROOTPATH}" \
- --with-editor="${EPREFIX}"/usr/libexec/editor \
- --with-env-editor \
- $(use_with offensive insults) \
- $(use_with offensive all-insults) \
- $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
- $(use_with ldap) \
- $(use_enable nls) \
- $(use_with pam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_with sendmail) \
- --without-opie \
- --without-linux-audit \
- --with-timedir="${EPREFIX}"/var/db/sudo \
- --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
- --docdir="${EPREFIX}"/usr/share/doc/${PF}
-}
-
-src_install() {
- default
-
- if use ldap ; then
- dodoc README.LDAP doc/schema.OpenLDAP
- dosbin plugins/sudoers/sudoers2ldif
-
- cat <<-EOF > "${T}"/ldap.conf.sudo
- # See ldap.conf(5) and README.LDAP for details
- # This file should only be readable by root
-
- # supported directives: host, port, ssl, ldap_version
- # uri, binddn, bindpw, sudoers_base, sudoers_debug
- # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
- EOF
-
- insinto /etc
- doins "${T}"/ldap.conf.sudo
- fperms 0440 /etc/ldap.conf.sudo
- fi
-
- pamd_mimic system-auth sudo auth account session
-
- keepdir /var/db/sudo
- fperms 0700 /var/db/sudo
-}
-
-pkg_postinst() {
- if use ldap ; then
- ewarn
- ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
- ewarn
- if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
- ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
- ewarn "configured in /etc/nsswitch.conf."
- ewarn
- ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
- ewarn " sudoers: ldap files"
- ewarn
- fi
- fi
- if use prefix ; then
- ewarn
- ewarn "To use sudo, you need to change file ownership and permissions"
- ewarn "with root privileges, as follows:"
- ewarn
- ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
- ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
- ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
- ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
- ewarn
- fi
-
- elog "To use the -A (askpass) option, you need to install a compatible"
- elog "password program from the following list. Starred packages will"
- elog "automatically register for the use with sudo (but will not force"
- elog "the -A option):"
- elog ""
- elog " [*] net-misc/ssh-askpass-fullscreen"
- elog " net-misc/x11-ssh-askpass"
- elog ""
- elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
- elog "variable to the program you want to use."
-}
diff --git a/app-admin/sudo/sudo-1.8.9_p5.ebuild b/app-admin/sudo/sudo-1.8.9_p5.ebuild
deleted file mode 100644
index da99399e3678..000000000000
--- a/app-admin/sudo/sudo-1.8.9_p5.ebuild
+++ /dev/null
@@ -1,191 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.8.9_p5.ebuild,v 1.1 2014/02/21 09:39:21 polynomial-c Exp $
-
-EAPI=5
-
-inherit eutils pam multilib libtool
-
-MY_P=${P/_/}
-MY_P=${MY_P/beta/b}
-
-uri_prefix=
-case ${P} in
-*_beta*|*_rc*) uri_prefix=beta/ ;;
-esac
-
-DESCRIPTION="Allows users or groups to run commands as other users"
-HOMEPAGE="http://www.sudo.ws/"
-SRC_URI="http://www.sudo.ws/sudo/dist/${uri_prefix}${MY_P}.tar.gz
- ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
-
-# Basic license is ISC-style as-is, some files are released under
-# 3-clause BSD license
-LICENSE="ISC BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~sparc-solaris"
-IUSE="ldap nls pam offensive selinux skey +sendmail"
-
-DEPEND="pam? ( virtual/pam )
- skey? ( >=sys-auth/skey-1.1.5-r1 )
- ldap? (
- >=net-nds/openldap-2.1.30-r1
- dev-libs/cyrus-sasl
- )
- sys-libs/zlib"
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-sudo )
- ldap? ( dev-lang/perl )
- pam? ( sys-auth/pambase )
- >=app-misc/editor-wrapper-3
- virtual/editor
- sendmail? ( virtual/mta )"
-DEPEND="${DEPEND}
- sys-devel/bison"
-
-S=${WORKDIR}/${MY_P}
-
-REQUIRED_USE="pam? ( !skey ) skey? ( !pam )"
-
-MAKEOPTS+=" SAMPLES="
-
-src_prepare() {
- elibtoolize
-}
-
-set_rootpath() {
- # FIXME: secure_path is a compile time setting. using ROOTPATH
- # is not perfect, env-update may invalidate this, but until it
- # is available as a sudoers setting this will have to do.
- einfo "Setting secure_path ..."
-
- # first extract the default ROOTPATH from build env
- ROOTPATH=$(unset ROOTPATH; . "${EPREFIX}"/etc/profile.env; echo "${ROOTPATH}")
- if [[ -z ${ROOTPATH} ]] ; then
- ewarn " Failed to find ROOTPATH, please report this"
- fi
-
- # then remove duplicate path entries
- cleanpath() {
- local newpath thisp IFS=:
- for thisp in $1 ; do
- if [[ :${newpath}: != *:${thisp}:* ]] ; then
- newpath+=:$thisp
- else
- einfo " Duplicate entry ${thisp} removed..."
- fi
- done
- ROOTPATH=${newpath#:}
- }
- cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}}
-
- # finally, strip gcc paths #136027
- rmpath() {
- local e newpath thisp IFS=:
- for thisp in ${ROOTPATH} ; do
- for e ; do [[ $thisp == $e ]] && continue 2 ; done
- newpath+=:$thisp
- done
- ROOTPATH=${newpath#:}
- }
- rmpath '*/gcc-bin/*' '*/gnat-gcc-bin/*' '*/gnat-gcc/*'
-
- einfo "... done"
-}
-
-src_configure() {
- local ROOTPATH
- set_rootpath
-
- # audit: somebody got to explain me how I can test this before I
- # enable it.. - Diego
- # plugindir: autoconf code is crappy and does not delay evaluation
- # until `make` time, so we have to use a full path here rather than
- # basing off other values.
- econf \
- --enable-zlib=system \
- --with-secure-path="${ROOTPATH}" \
- --with-editor="${EPREFIX}"/usr/libexec/editor \
- --with-env-editor \
- $(use_with offensive insults) \
- $(use_with offensive all-insults) \
- $(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
- $(use_with ldap) \
- $(use_enable nls) \
- $(use_with pam) \
- $(use_with skey) \
- $(use_with selinux) \
- $(use_with sendmail) \
- --without-opie \
- --without-linux-audit \
- --with-timedir="${EPREFIX}"/var/db/sudo \
- --with-plugindir="${EPREFIX}"/usr/$(get_libdir)/sudo \
- --docdir="${EPREFIX}"/usr/share/doc/${PF}
-}
-
-src_install() {
- default
-
- if use ldap ; then
- dodoc README.LDAP doc/schema.OpenLDAP
- dosbin plugins/sudoers/sudoers2ldif
-
- cat <<-EOF > "${T}"/ldap.conf.sudo
- # See ldap.conf(5) and README.LDAP for details
- # This file should only be readable by root
-
- # supported directives: host, port, ssl, ldap_version
- # uri, binddn, bindpw, sudoers_base, sudoers_debug
- # tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
- EOF
-
- insinto /etc
- doins "${T}"/ldap.conf.sudo
- fperms 0440 /etc/ldap.conf.sudo
- fi
-
- pamd_mimic system-auth sudo auth account session
-
- keepdir /var/db/sudo
- fperms 0700 /var/db/sudo
-}
-
-pkg_postinst() {
- if use ldap ; then
- ewarn
- ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
- ewarn
- if grep -qs '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf ; then
- ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
- ewarn "configured in /etc/nsswitch.conf."
- ewarn
- ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
- ewarn " sudoers: ldap files"
- ewarn
- fi
- fi
- if use prefix ; then
- ewarn
- ewarn "To use sudo, you need to change file ownership and permissions"
- ewarn "with root privileges, as follows:"
- ewarn
- ewarn " # chown root:root ${EPREFIX}/usr/bin/sudo"
- ewarn " # chown root:root ${EPREFIX}/usr/lib/sudo/sudoers.so"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers"
- ewarn " # chown root:root ${EPREFIX}/etc/sudoers.d"
- ewarn " # chown root:root ${EPREFIX}/var/db/sudo"
- ewarn " # chmod 4111 ${EPREFIX}/usr/bin/sudo"
- ewarn
- fi
-
- elog "To use the -A (askpass) option, you need to install a compatible"
- elog "password program from the following list. Starred packages will"
- elog "automatically register for the use with sudo (but will not force"
- elog "the -A option):"
- elog ""
- elog " [*] net-misc/ssh-askpass-fullscreen"
- elog " net-misc/x11-ssh-askpass"
- elog ""
- elog "You can override the choice by setting the SUDO_ASKPASS environmnent"
- elog "variable to the program you want to use."
-}