SOURCES: sudo-ac.patch, sudo-pam-login.patch, sudo-selinux.patch -...
qboosh
qboosh at pld-linux.org
Sun Aug 5 00:29:32 CEST 2007
Author: qboosh Date: Sat Aug 4 22:29:32 2007 GMT
Module: SOURCES Tag: HEAD
---- Log message:
- updated for 1.6.9p3
---- Files affected:
SOURCES:
sudo-ac.patch (1.3 -> 1.4) , sudo-pam-login.patch (1.1 -> 1.2) , sudo-selinux.patch (1.4 -> 1.5)
---- Diffs:
================================================================
Index: SOURCES/sudo-ac.patch
diff -u SOURCES/sudo-ac.patch:1.3 SOURCES/sudo-ac.patch:1.4
--- SOURCES/sudo-ac.patch:1.3 Tue Sep 5 15:53:08 2006
+++ SOURCES/sudo-ac.patch Sun Aug 5 00:29:27 2007
@@ -1,51 +1,11 @@
-diff -Nur sudo-1.6.8p12.orig/acinclude.m4 sudo-1.6.8p12.ac/acinclude.m4
---- sudo-1.6.8p12.orig/acinclude.m4 2004-09-07 20:14:51.000000000 +0300
-+++ sudo-1.6.8p12.ac/acinclude.m4 2006-09-05 16:50:19.000000000 +0300
-@@ -224,9 +224,9 @@
- rm -f core core.* *.core])dnl
- AC_MSG_RESULT($sudo_cv_func_fnmatch)
- if test $sudo_cv_func_fnmatch = yes; then
-- [$1]
-+ $1
- else
-- [$2]
-+ $2
- fi
- ])
-
-diff -Nur sudo-1.6.8p12.orig/configure.in sudo-1.6.8p12.ac/configure.in
---- sudo-1.6.8p12.orig/configure.in 2006-09-05 16:50:19.000000000 +0300
-+++ sudo-1.6.8p12.ac/configure.in 2006-09-05 16:51:03.000000000 +0300
-@@ -1609,7 +1609,7 @@
+--- sudo-1.6.9p3/configure.in.orig 2007-08-04 23:19:04.049674000 +0200
++++ sudo-1.6.9p3/configure.in 2007-08-04 23:32:22.943201056 +0200
+@@ -1975,7 +1975,7 @@
AC_CHECK_FUNCS(getspnam, [CHECKSHADOW="false"], [AC_CHECK_LIB(gen, getspnam, AC_DEFINE(HAVE_GETSPNAM) [SUDO_LIBS="${SUDO_LIBS} -lgen"; LIBS="${LIBS} -lgen"])])
fi
if test "$CHECKSHADOW" = "true"; then
- AC_CHECK_FUNC(getprpwnam, [AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1], AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"])))])
-+ AC_CHECK_FUNC(getprpwnam, [AC_DEFINE(HAVE_GETPRPWNAM) AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"]))) [CHECKSHADOW="false"; SECUREWARE=1]])
++ AC_CHECK_FUNC(getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1], AC_CHECK_LIB(sec, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsec"; LIBS="${LIBS} -lsec"], AC_CHECK_LIB(security, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lsecurity"; LIBS="${LIBS} -lsecurity"], AC_CHECK_LIB(prot, getprpwnam, AC_DEFINE(HAVE_GETPRPWNAM) [CHECKSHADOW="false"; SECUREWARE=1; SUDO_LIBS="${SUDO_LIBS} -lprot"; LIBS="${LIBS} -lprot"]))))
fi
-
- dnl
-@@ -1703,9 +1703,9 @@
- AC_CHECK_FUNCS(lockf flock, [break])
- AC_CHECK_FUNCS(waitpid wait3, [break])
- AC_CHECK_FUNCS(innetgr _innetgr, [AC_CHECK_FUNCS(getdomainname) [break]])
--AC_CHECK_FUNCS(lsearch, , [AC_CHECK_LIB(compat, lsearch, AC_CHECK_HEADER(search.h, AC_DEFINE(HAVE_LSEARCH) [LIBS="${LIBS} -lcompat"], AC_LIBOBJ(lsearch), -), AC_LIBOBJ(lsearch))])
-+AC_CHECK_FUNCS(lsearch, , [AC_CHECK_LIB(compat, lsearch, [AC_CHECK_HEADER(search.h, AC_DEFINE(HAVE_LSEARCH) [LIBS="${LIBS} -lcompat"], [AC_LIBOBJ(lsearch)], -)], [AC_LIBOBJ(lsearch)])])
- AC_CHECK_FUNCS(utimes, [AC_CHECK_FUNCS(futimes futimesat, [break])], [AC_CHECK_FUNCS(futime) AC_LIBOBJ(utimes)])
--SUDO_FUNC_FNMATCH(AC_DEFINE(HAVE_FNMATCH), AC_LIBOBJ(fnmatch))
-+SUDO_FUNC_FNMATCH(AC_DEFINE(HAVE_FNMATCH), [AC_LIBOBJ(fnmatch)])
- SUDO_FUNC_ISBLANK
- AC_REPLACE_FUNCS(strerror strcasecmp sigaction strlcpy strlcat closefrom)
- AC_CHECK_FUNCS(snprintf vsnprintf asprintf vasprintf, , [NEED_SNPRINTF=1])
-diff -Nur sudo-1.6.8p12.orig/Makefile.in sudo-1.6.8p12.ac/Makefile.in
---- sudo-1.6.8p12.orig/Makefile.in 2006-09-05 16:50:19.000000000 +0300
-+++ sudo-1.6.8p12.ac/Makefile.in 2006-09-05 16:50:19.000000000 +0300
-@@ -187,7 +187,7 @@
- $(CC) -o $@ $(TESTOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
-
- sudo_noexec.la: sudo_noexec.lo
-- $(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -avoid-version -rpath $(noexecdir)
-+ $(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -module -avoid-version -rpath $(noexecdir)
-
- # Uncomment the following if you want "make distclean" to clean the parser
- @DEV at PARSESRCS = sudo.tab.h sudo.tab.c lex.yy.c def_data.c def_data.h
+ if test -n "$SECUREWARE"; then
+ AC_CHECK_FUNCS(bigcrypt set_auth_parameters initprivs)
================================================================
Index: SOURCES/sudo-pam-login.patch
diff -u SOURCES/sudo-pam-login.patch:1.1 SOURCES/sudo-pam-login.patch:1.2
--- SOURCES/sudo-pam-login.patch:1.1 Tue Mar 27 17:29:48 2007
+++ SOURCES/sudo-pam-login.patch Sun Aug 5 00:29:27 2007
@@ -18,42 +18,24 @@
AC_ARG_WITH(AFS, [ --with-AFS enable AFS support],
[case $with_AFS in
yes) AC_DEFINE(HAVE_AFS)
---- sudo-1.6.8p12/sudo.c.login 2006-07-16 15:39:26.000000000 +0200
-+++ sudo-1.6.8p12/sudo.c 2006-07-16 15:41:42.000000000 +0200
-@@ -109,7 +109,7 @@
- static struct passwd *get_authpw __P((void));
- extern int sudo_edit __P((int, char **));
- extern void list_matches __P((void));
--extern char **rebuild_env __P((char **, int, int));
-+extern char **rebuild_env __P((char **, int));
- extern char **zero_env __P((char **));
- extern struct passwd *sudo_getpwnam __P((const char *));
- extern struct passwd *sudo_getpwuid __P((uid_t));
-@@ -140,6 +140,7 @@
+--- sudo-1.6.9p3/sudo.c.orig 2007-08-04 22:30:23.307231082 +0200
++++ sudo-1.6.9p3/sudo.c 2007-08-04 22:31:28.238931329 +0200
+@@ -164,6 +164,7 @@
+ char *login_style;
#endif /* HAVE_BSD_AUTH_H */
sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp, saved_sa_chld;
- void (*set_perms) __P((int));
+int sudo_mode;
-
- int
-@@ -151,7 +152,6 @@
+ #ifdef WITH_SELINUX
+ security_context_t setup_tty_context(int fd, char *ttyn, security_context_t new_context) {
+@@ -319,7 +320,6 @@
int validated;
int fd;
int cmnd_status;
- int sudo_mode;
int pwflag;
- char **new_environ;
sigaction_t sa;
-@@ -368,7 +368,7 @@
-
- /* Build a new environment that avoids any nasty bits if we have a cmnd. */
- if (ISSET(sudo_mode, MODE_RUN))
-- new_environ = rebuild_env(envp, sudo_mode, ISSET(validated, FLAG_NOEXEC));
-+ new_environ = rebuild_env(envp, ISSET(validated, FLAG_NOEXEC));
- else
- new_environ = envp;
-
+ extern int printmatches;
--- sudo-1.6.8p12/auth/pam.c.login 2006-07-16 15:41:59.000000000 +0200
+++ sudo-1.6.8p12/auth/pam.c 2006-07-16 15:45:15.000000000 +0200
@@ -89,7 +89,12 @@
@@ -70,38 +52,16 @@
if (pam_status != PAM_SUCCESS) {
log_error(USE_ERRNO|NO_EXIT|NO_MAIL, "unable to initialize PAM");
return(AUTH_FATAL);
---- sudo-1.6.8p12/env.c.login 2006-07-16 15:40:14.000000000 +0200
-+++ sudo-1.6.8p12/env.c 2006-07-16 15:57:19.000000000 +0200
-@@ -77,7 +77,7 @@
- /*
- * Prototypes
- */
--char **rebuild_env __P((char **, int, int));
-+char **rebuild_env __P((char **, int));
- char **zero_env __P((char **));
- static void insert_env __P((char *, int));
- static char *format_env __P((char *, ...));
-@@ -321,9 +321,8 @@
- * Also adds sudo-specific variables (SUDO_*).
- */
- char **
--rebuild_env(envp, sudo_mode, noexec)
-+rebuild_env(envp, noexec)
- char **envp;
-- int sudo_mode;
- int noexec;
- {
- char **ep, *cp, *ps1;
---- sudo-1.6.8p12/sudo.h.login 2006-07-16 15:59:08.000000000 +0200
-+++ sudo-1.6.8p12/sudo.h 2006-07-16 15:59:38.000000000 +0200
-@@ -251,6 +251,7 @@
+--- sudo-1.6.9p3/sudo.h.orig 2007-07-06 16:14:34.000000000 +0200
++++ sudo-1.6.9p3/sudo.h 2007-08-04 22:32:18.353787210 +0200
+@@ -268,6 +268,7 @@
extern FILE *sudoers_fp;
extern int tgetpass_flags;
extern uid_t timestamp_uid;
+extern int sudo_mode;
-
- extern void (*set_perms) __P((int));
#endif
+ #ifndef errno
+ extern int errno;
--- sudo-1.6.8p12/config.h.in.login 2006-07-16 15:32:09.000000000 +0200
+++ sudo-1.6.8p12/config.h.in 2006-07-16 15:32:56.000000000 +0200
@@ -230,6 +230,9 @@
================================================================
Index: SOURCES/sudo-selinux.patch
diff -u SOURCES/sudo-selinux.patch:1.4 SOURCES/sudo-selinux.patch:1.5
--- SOURCES/sudo-selinux.patch:1.4 Sun Sep 19 12:36:14 2004
+++ SOURCES/sudo-selinux.patch Sun Aug 5 00:29:27 2007
@@ -51,20 +51,20 @@
+ exit(-1);
+ }
+}
---- sudo-1.6.7p5/configure.in.selinux 2003-05-06 11:22:36.000000000 -0400
-+++ sudo-1.6.7p5/configure.in 2004-07-08 13:18:28.000000000 -0400
-@@ -90,7 +90,7 @@
+--- sudo-1.6.9p3/configure.in.orig 2007-07-30 15:30:15.000000000 +0200
++++ sudo-1.6.9p3/configure.in 2007-08-04 22:13:39.950053015 +0200
+@@ -101,7 +101,7 @@
dnl Initial values for Makefile variables listed above
dnl May be overridden by environment variables..
dnl
-PROGS="sudo visudo"
+PROGS="sudo visudo sesh"
- test -n "$MANTYPE" || MANTYPE="man"
- test -n "$mansrcdir" || mansrcdir="."
- test -n "$SUDOERS_MODE" || SUDOERS_MODE=0440
---- sudo-1.6.8/sudo.c.orig 2004-08-07 01:42:52.000000000 +0200
-+++ sudo-1.6.8/sudo.c 2004-08-29 20:45:31.556903000 +0200
-@@ -92,6 +92,17 @@
+ : ${MANTYPE='man'}
+ : ${mansrcdir='.'}
+ : ${SUDOERS_MODE='0440'}
+--- sudo-1.6.9p3/sudo.c.orig 2007-07-22 21:21:01.000000000 +0200
++++ sudo-1.6.9p3/sudo.c 2007-08-04 22:15:26.464122906 +0200
+@@ -101,6 +101,17 @@
#include "interfaces.h"
#include "version.h"
@@ -80,11 +80,11 @@
+#endif
+
#ifndef lint
- static const char rcsid[] = "$Sudo: sudo.c,v 1.369 2004/08/06 23:42:52 millert Exp $";
+ __unused __unused static const char rcsid[] = "$Sudo: sudo.c,v 1.369.2.26 2007/07/22 19:21:01 millert Exp $";
#endif /* lint */
-@@ -141,7 +152,151 @@
+@@ -154,7 +165,151 @@
+ #endif /* HAVE_BSD_AUTH_H */
sigaction_t saved_sa_int, saved_sa_quit, saved_sa_tstp, saved_sa_chld;
- void (*set_perms) __P((int));
+#ifdef WITH_SELINUX
+security_context_t setup_tty_context(int fd, char *ttyn, security_context_t new_context) {
@@ -119,7 +119,7 @@
+
+ security_context_t old_context=NULL; /* our original securiy ID ("old_context") */
+ security_context_t new_context=NULL; /* our target security ID ("sid") */
-+
+
+ /*
+ *
+ * Step 1: Handle command-line arguments.
@@ -229,24 +229,12 @@
+
+ return new_context;
+}
-
++
+#endif
int
main(argc, argv, envp)
int argc;
-@@ -149,10 +304,10 @@
- char **envp;
- {
- int validated;
-- int fd;
- int cmnd_status;
- int sudo_mode;
- int pwflag;
-+ int fd;
- char **new_environ;
- sigaction_t sa;
- extern int printmatches;
-@@ -203,9 +358,6 @@
+@@ -216,9 +371,6 @@
/* Setup defaults data structures. */
init_defaults();
@@ -256,8 +244,8 @@
pwflag = 0;
if (ISSET(sudo_mode, MODE_SHELL))
user_cmnd = "shell";
-@@ -219,6 +371,8 @@
- putchar('\n');
+@@ -233,6 +385,8 @@
+ (void) printf("Sudoers path: %s\n", _PATH_SUDOERS);
dump_auth_methods();
dump_defaults();
+ /* Load the list of local ip addresses and netmasks. */
@@ -265,7 +253,7 @@
dump_interfaces();
}
exit(0);
-@@ -445,7 +599,43 @@
+@@ -442,7 +596,43 @@
#ifndef PROFILING
if (ISSET(sudo_mode, MODE_BACKGROUND) && fork() > 0)
exit(0);
@@ -307,12 +295,12 @@
+ }
+ }
+#endif
- EXECV(safe_cmnd, NewArgv); /* run the command */
+ execve(safe_cmnd, NewArgv, environ);
#else
exit(0);
-@@ -729,6 +919,30 @@
- NewArgv++;
- break;
+@@ -766,6 +956,30 @@
+ NewArgv++;
+ break;
#endif
+#ifdef WITH_SELINUX
+ case 'r':
@@ -339,9 +327,9 @@
+ break;
+#endif
#ifdef HAVE_LOGIN_CAP_H
- case 'c':
- /* Must have an associated login class. */
-@@ -1111,6 +1325,9 @@
+ case 'c':
+ /* Must have an associated login class. */
+@@ -1247,6 +1461,9 @@
#ifdef HAVE_LOGIN_CAP_H
" [-c class|-]",
#endif
@@ -350,22 +338,23 @@
+#endif
" [-p prompt]",
" [-u username|#uid]",
- " { -e file [...] | -i | -s | <command> }",
---- sudo-1.6.8/sudo.man.in.orig 2004-08-17 20:53:39.000000000 +0200
-+++ sudo-1.6.8/sudo.man.in 2004-08-29 20:48:39.189378528 +0200
-@@ -156,7 +156,7 @@
- .IX Header "SYNOPSIS"
- \&\fBsudo\fR \fB\-K\fR | \fB\-L\fR | \fB\-V\fR | \fB\-h\fR | \fB\-k\fR | \fB\-l\fR | \fB\-v\fR
+ " [VAR=value]",
+--- sudo-1.6.9p3/sudo.man.in.orig 2007-08-02 17:51:59.000000000 +0200
++++ sudo-1.6.9p3/sudo.man.in 2007-08-04 22:17:59.880865627 +0200
+@@ -157,7 +157,8 @@
+ \&\fBsudo\fR \fB\-h\fR | \fB\-K\fR | \fB\-k\fR | \fB\-L\fR | \fB\-l\fR | \fB\-V\fR | \fB\-v\fR
.PP
--\&\fBsudo\fR [\fB\-HPSb\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR]
-+\&\fBsudo\fR [\fB\-HPSb\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-r\fR \fIrole\fR ] [\fB\-t\fR \fItype\fR ]
- [\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
- {\fB\-e\fR\ file\ [...]\ |\ \fB\-i\fR\ |\ \fB\-s\fR\ |\ \fIcommand\fR}
+ \&\fBsudo\fR [\fB\-bEHPS\fR] [\fB\-a\fR\ \fIauth_type\fR]
+-[\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
++[\fB\-c\fR\ \fIclass\fR|\fI\-\fR] [\fB\-r\fR \fIrole\fR ] [\fB\-t\fR \fItype\fR ]
++[\fB\-p\fR\ \fIprompt\fR] [\fB\-u\fR\ \fIusername\fR|\fI#uid\fR]
+ [\fB\s-1VAR\s0\fR=\fIvalue\fR] {\fB\-i\fR\ |\ \fB\-s\fR\ |\ \fIcommand\fR}
.PP
-@@ -235,6 +235,16 @@
- \&\fBsudo\fR will initialize the group vector to the list of groups the
- target user is in. The real and effective group IDs, however, are
- still set to match the target user.
+ \&\fBsudoedit\fR [\fB\-S\fR] [\fB\-a\fR\ \fIauth_type\fR] [\fB\-c\fR\ \fIclass\fR|\fI\-\fR]
+@@ -354,6 +355,16 @@
+ .RE
+ .RS 4
+ .RE
+.IP "\-r" 4
+.IX Item "-r"
+The \fB\-r\fR (\fRrole\fR) option causes the new (SELinux) security context to have the role specified by
@@ -379,8 +368,8 @@
.IP "\-S" 4
.IX Item "-S"
The \fB\-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
---- sudo-1.6.8p1/Makefile.in.orig 2004-09-15 22:11:22.000000000 +0200
-+++ sudo-1.6.8p1/Makefile.in 2004-09-19 12:26:11.212233352 +0200
+--- sudo-1.6.9p3/Makefile.in.orig 2007-08-02 17:51:59.000000000 +0200
++++ sudo-1.6.9p3/Makefile.in 2007-08-04 22:18:17.657878682 +0200
@@ -43,7 +43,8 @@
# Libraries
LIBS = @LIBS@
@@ -401,11 +390,11 @@
#### End of system configuration section. ####
@@ -104,7 +105,7 @@
- parse.c parse.lex parse.yacc set_perms.c sigaction.c snprintf.c \
- strcasecmp.c strerror.c strlcat.c strlcpy.c sudo.c sudo_noexec.c \
- sudo.tab.c sudo_edit.c testsudoers.c tgetpass.c utimes.c visudo.c \
-- zero_bytes.c $(AUTH_SRCS)
-+ zero_bytes.c $(AUTH_SRCS) sesh.c
+ logging.c memrchr.c mkstemp.c parse.c parse.lex parse.yacc set_perms.c \
+ sigaction.c snprintf.c strcasecmp.c strerror.c strlcat.c strlcpy.c \
+ sudo.c sudo_noexec.c sudo.tab.c sudo_edit.c testsudoers.c tgetpass.c \
+- utimes.c visudo.c zero_bytes.c $(AUTH_SRCS)
++ utimes.c visudo.c zero_bytes.c $(AUTH_SRCS) sesh.c
AUTH_SRCS = auth/afs.c auth/aix_auth.c auth/bsdauth.c auth/dce.c auth/fwtk.c \
auth/kerb4.c auth/kerb5.c auth/pam.c auth/passwd.c auth/rfc1938.c \
@@ -418,7 +407,7 @@
TESTOBJS = interfaces.o testsudoers.o $(PARSEOBJS)
LIBOBJS = @LIBOBJS@ @ALLOCA@
-@@ -145,7 +148,7 @@
+@@ -146,7 +149,7 @@
BINFILES= BUGS CHANGES HISTORY LICENSE README TODO TROUBLESHOOTING \
UPGRADE install-sh mkinstalldirs sample.syslog.conf sample.sudoers \
sudo sudo.cat sudo.man sudo.pod sudoers sudoers.cat sudoers.man \
@@ -427,7 +416,7 @@
BINSPECIAL= INSTALL.binary Makefile.binary libtool
-@@ -177,6 +180,9 @@
+@@ -178,6 +181,9 @@
visudo: $(VISUDOBJS) $(LIBOBJS)
$(CC) -o $@ $(VISUDOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
@@ -437,7 +426,7 @@
testsudoers: $(TESTOBJS) $(LIBOBJS)
$(CC) -o $@ $(TESTOBJS) $(LIBOBJS) $(LDFLAGS) $(LIBS) $(NET_LIBS)
-@@ -215,6 +221,7 @@
+@@ -219,6 +225,7 @@
set_perms.o: set_perms.c $(SUDODEP)
tgetpass.o: tgetpass.c $(SUDODEP)
visudo.o: visudo.c $(SUDODEP) version.h
@@ -445,7 +434,7 @@
sudo.o: sudo.c $(SUDODEP) interfaces.h version.h
interfaces.o: interfaces.c $(SUDODEP) interfaces.h
testsudoers.o: testsudoers.c $(SUDODEP) parse.h interfaces.h
-@@ -306,6 +313,7 @@
+@@ -314,6 +321,7 @@
ln $(DESTDIR)$(sudodir)/sudo $(DESTDIR)$(sudodir)/sudoedit
$(INSTALL) -O $(install_uid) -G $(install_gid) -M 0111 -s visudo $(DESTDIR)$(visudodir)/visudo
================================================================
---- CVS-web:
http://cvs.pld-linux.org/SOURCES/sudo-ac.patch?r1=1.3&r2=1.4&f=u
http://cvs.pld-linux.org/SOURCES/sudo-pam-login.patch?r1=1.1&r2=1.2&f=u
http://cvs.pld-linux.org/SOURCES/sudo-selinux.patch?r1=1.4&r2=1.5&f=u
More information about the pld-cvs-commit
mailing list