packages: sudo/sudo-libtool.patch, sudo/sudo-pam-login.patch, sudo/sudo.spe...
glen
glen at pld-linux.org
Mon Jul 12 12:10:35 CEST 2010
Author: glen Date: Mon Jul 12 10:10:35 2010 GMT
Module: packages Tag: HEAD
---- Log message:
- up to 1.7.3
---- Files affected:
packages/sudo:
sudo-libtool.patch (1.2 -> 1.3) , sudo-pam-login.patch (1.5 -> 1.6) , sudo.spec (1.160 -> 1.161)
---- Diffs:
================================================================
Index: packages/sudo/sudo-libtool.patch
diff -u packages/sudo/sudo-libtool.patch:1.2 packages/sudo/sudo-libtool.patch:1.3
--- packages/sudo/sudo-libtool.patch:1.2 Mon Sep 10 22:50:44 2007
+++ packages/sudo/sudo-libtool.patch Mon Jul 12 12:10:29 2010
@@ -1,11 +1,11 @@
---- sudo-1.6.9p3/Makefile.in.orig 2007-08-04 23:32:54.360991000 +0200
-+++ sudo-1.6.9p3/Makefile.in 2007-08-04 23:41:47.219357321 +0200
-@@ -191,7 +191,7 @@
+--- sudo-1.7.3/Makefile.in~ 2010-06-19 01:41:13.000000000 +0300
++++ sudo-1.7.3/Makefile.in 2010-07-12 12:57:38.509586169 +0300
+@@ -210,7 +210,7 @@
$(LIBTOOL) --mode=compile $(CC) -c $(CPPFLAGS) $(CFLAGS) $(DEFS) $(OPTIONS) $(srcdir)/sudo_noexec.c
- sudo_noexec.la: sudo_noexec.lo
+ libsudo_noexec.la: sudo_noexec.lo
- $(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -avoid-version -rpath $(noexecdir)
+ $(LIBTOOL) --mode=link $(CC) $(LDFLAGS) -o $@ sudo_noexec.lo -avoid-version -module -rpath $(noexecdir)
# Uncomment the following if you want "make distclean" to clean the parser
- @DEV at PARSESRCS = sudo.tab.h sudo.tab.c lex.yy.c def_data.c def_data.h
+ @DEV at GENERATED = gram.h gram.c toke.c def_data.c def_data.h getdate
================================================================
Index: packages/sudo/sudo-pam-login.patch
diff -u packages/sudo/sudo-pam-login.patch:1.5 packages/sudo/sudo-pam-login.patch:1.6
--- packages/sudo/sudo-pam-login.patch:1.5 Mon Jul 13 19:55:22 2009
+++ packages/sudo/sudo-pam-login.patch Mon Jul 12 12:10:29 2010
@@ -19,25 +19,17 @@
AC_ARG_WITH(AFS, [AS_HELP_STRING([--with-AFS], [enable AFS support])],
[case $with_AFS in
yes) AC_DEFINE(HAVE_AFS)
---- sudo-1.6.9p3/sudo.c.orig 2007-08-04 22:30:23.307231082 +0200
-+++ sudo-1.6.9p3/sudo.c 2007-08-04 22:31:28.238931329 +0200
-@@ -157,6 +157,7 @@
- static char *runas_user;
- static char *runas_group;
+--- sudo-1.7.3/sudo.c~ 2010-06-29 19:33:55.000000000 +0300
++++ sudo-1.7.3/sudo.c 2010-07-12 12:56:28.390424928 +0300
+@@ -147,7 +147,7 @@
+ char *runas_user;
+ char *runas_group;
static struct sudo_nss_list *snl;
+-static int sudo_mode;
+int sudo_mode;
/* For getopt(3) */
extern char *optarg;
-@@ -169,7 +170,7 @@
- char **envp;
- {
- int sources = 0, validated;
-- int fd, cmnd_status, sudo_mode, pwflag, rc = 0;
-+ int fd, cmnd_status, pwflag, rc = 0;
- sigaction_t sa;
- struct sudo_nss *nss;
- #if defined(SUDO_DEVEL) && defined(__OpenBSD__)
--- sudo-1.6.8p12/auth/pam.c.login 2006-07-16 15:41:59.000000000 +0200
+++ sudo-1.6.8p12/auth/pam.c 2006-07-16 15:45:15.000000000 +0200
@@ -89,7 +89,12 @@
@@ -54,16 +46,16 @@
if (pam_status != PAM_SUCCESS) {
log_error(USE_ERRNO|NO_EXIT|NO_MAIL, "unable to initialize PAM");
return(AUTH_FATAL);
---- sudo-1.6.9p3/sudo.h.orig 2007-07-06 16:14:34.000000000 +0200
-+++ sudo-1.6.9p3/sudo.h 2007-08-04 22:32:18.353787210 +0200
-@@ -268,6 +268,7 @@
- extern FILE *sudoers_fp;
+--- sudo-1.7.3/sudo.h~ 2010-06-29 19:58:19.000000000 +0300
++++ sudo-1.7.3/sudo.h 2010-07-12 12:55:18.229600104 +0300
+@@ -356,6 +356,7 @@
extern int tgetpass_flags;
+ extern int long_list;
extern uid_t timestamp_uid;
+extern int sudo_mode;
+ /* XXX - conflicts with the one in visudo */
+ int run_command __P((const char *path, char *argv[], char *envp[], uid_t uid, int dowait));
#endif
- #ifndef errno
- extern int errno;
--- sudo-1.6.8p12/config.h.in.login 2006-07-16 15:32:09.000000000 +0200
+++ sudo-1.6.8p12/config.h.in 2006-07-16 15:32:56.000000000 +0200
@@ -230,6 +230,9 @@
================================================================
Index: packages/sudo/sudo.spec
diff -u packages/sudo/sudo.spec:1.160 packages/sudo/sudo.spec:1.161
--- packages/sudo/sudo.spec:1.160 Mon Jun 7 14:27:59 2010
+++ packages/sudo/sudo.spec Mon Jul 12 12:10:29 2010
@@ -21,13 +21,13 @@
Summary(ru.UTF-8): Позволяет определенным пользователям исполнять команды от имени root
Summary(uk.UTF-8): Дозволяє вказаним користувачам виконувати команди від імені root
Name: sudo
-Version: 1.7.2p7
-Release: 6
+Version: 1.7.3
+Release: 1
Epoch: 1
License: BSD
Group: Applications/System
Source0: ftp://ftp.sudo.ws/pub/sudo/%{name}-%{version}.tar.gz
-# Source0-md5: 3ac78668427a53e12d7639fdfab2f1af
+# Source0-md5: c22115b47cb2591bceedb914b673f031
Source1: %{name}.pamd
Source2: %{name}-i.pamd
Source3: %{name}.logrotate
@@ -139,6 +139,8 @@
mv -f aclocal.m4 acinclude.m4
# kill libtool.m4 copy
rm -f acsite.m4
+# do not load libtool macros from acinclude
+%{__sed} -i -e '/Pull in libtool macros/,$d' acinclude.m4
%patch0 -p1
%patch1 -p1
@@ -176,6 +178,9 @@
rm -rf $RPM_BUILD_ROOT
install -d $RPM_BUILD_ROOT{%{_sysconfdir}/{pam.d,logrotate.d},/var/{log,run/sudo},%{_mandir}/man8}
+# makefile broken?
+touch .libs/sudo_noexec.so
+
%{__make} -j1 install \
DESTDIR=$RPM_BUILD_ROOT \
install_uid=$(id -u) \
@@ -231,6 +236,7 @@
%attr(600,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/pam.d/sudo-i
%attr(4755,root,root) %{_bindir}/sudo
%attr(4755,root,root) %{_bindir}/sudoedit
+%attr(755,root,root) %{_bindir}/sudoreplay
%attr(755,root,root) %{_sbindir}/visudo
%{?with_selinux:%attr(755,root,root) %{_libdir}/sesh}
%attr(755,root,root) %{_libdir}/sudo_noexec.so
@@ -238,6 +244,7 @@
%{?with_ldap:%{_mandir}/man5/sudoers.ldap.5*}
%{_mandir}/man8/sudo.8*
%{_mandir}/man8/sudoedit.8*
+%{_mandir}/man8/sudoreplay.8*
%{_mandir}/man8/visudo.8*
%attr(600,root,root) %ghost /var/log/sudo
%attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/logrotate.d/sudo
@@ -253,6 +260,9 @@
All persons listed below can be reached at <cvs_login>@pld-linux.org
$Log$
+Revision 1.161 2010/07/12 10:10:29 glen
+- up to 1.7.3
+
Revision 1.160 2010/06/07 12:27:59 glen
- release 6
================================================================
---- CVS-web:
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/sudo/sudo-libtool.patch?r1=1.2&r2=1.3&f=u
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/sudo/sudo-pam-login.patch?r1=1.5&r2=1.6&f=u
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/sudo/sudo.spec?r1=1.160&r2=1.161&f=u
More information about the pld-cvs-commit
mailing list