Accepting request 342694 from Base:System

1

OBS-URL: https://build.opensuse.org/request/show/342694
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/sudo?expand=0&rev=75
This commit is contained in:
Dominique Leuenberger 2015-11-12 18:39:25 +00:00 committed by Git OBS Bridge
commit 0da57a3452
4 changed files with 93 additions and 21 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:a8a697cbb113859058944850d098464618254804cf97961dee926429f00a1237
size 2570892

3
sudo-1.8.15.tar.gz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:4316381708324da8b6cb151f655c1a11855207c7c02244d8ffdea5104d7cc308
size 2660128

View File

@ -1,3 +1,75 @@
-------------------------------------------------------------------
Fri Nov 6 11:55:17 UTC 2015 - kstreitova@suse.com
- update to 1.8.15:
* Fixed a bug that prevented sudo from building outside the source
tree on some platforms. Bug #708.
* Fixed the location of the sssd library in the RHEL/Centos packages.
Bug #710.
* Fixed a build problem on systems that don't implicitly include
sys/types.h from other header files. Bug #711.
* Fixed a problem on Linux using containers where sudo would ignore
signals sent by a process in a different container.
* Sudo now refuses to run a command if the PAM session module returns
an error.
* When editing files with sudoedit, symbolic links will no longer be
followed by default. The old behavior can be restored by enabling
the sudoedit_follow option in sudoers or on a per-command basis with
the FOLLOW and NOFOLLOW tags. Bug #707.
* Fixed a bug introduced in version 1.8.14 that caused the last valid
editor in the sudoers "editor" list to be used by visudo and sudoedit
instead of the first. Bug #714.
* Fixed a bug in visudo that prevented the addition of a final newline
to edited files without one.
* Fixed a bug decoding certain base64 digests in sudoers when the
intermediate format included a '=' character.
* Individual records are now locked in the time stamp file instead of
the entire file. This allows sudo to avoid prompting for a password
multiple times on the same terminal when used in a pipeline.
In other words, sudo cat foo | sudo grep bar now only prompts for
the password once. Previously, both sudo processes would prompt for
a password, often making it impossible to enter. Bug #705.
* Fixed a bug where sudo would fail to run commands as a non-root user
on systems that lack both setresuid() and setreuid(). Bug #713.
* Fixed a bug introduced in sudo 1.8.14 that prevented visudo from
re-editing the correct file when a syntax error was detected.
* Fixed a bug where sudo would not relay a SIGHUP signal to the command
when the terminal is closed and the command is not run in its own
pseudo-tty. Bug #719.
* If some, but not all, of the LOGNAME, USER or USERNAME environment
variables have been preserved from the invoking user's environment,
sudo will now use the preserved value to set the remaining variables
instead of using the runas user. This ensures that if, for example,
only LOGNAME is present in the env_keep list, that sudo will not set
USER and USERNAME to the runas user.
* When the command sudo is running dies due to a signal, sudo will now
send itself that same signal with the default signal handler installed
instead of exiting. The bash shell appears to ignore some signals,
e.g. SIGINT, unless the command being run is killed by that signal.
This makes the behavior of commands run under sudo the same as
without sudo when bash is the shell. Bug #722.
* Slovak translation for sudo from translationproject.org.
* Hungarian and Slovak translations for sudoers from
translationproject.org.
* Previously, when env_reset was enabled (the default) and the
-s option was not used, the SHELL environment variable was set to the
shell of the invoking user. Now, when env_reset is enabled and the
-s option is not used, SHELL is set based on the target user.
* Fixed challenge/response style BSD authentication.
* Added the sudoedit_checkdir Defaults option to prevent sudoedit from
editing files located in a directory that is writable by the
invoking user.
* Added the always_query_group_plugin Defaults option to control
whether groups not found in the system group database are passed to
the group plugin. Previously, unknown system groups were always
passed to the group plugin.
* When creating a new file, sudoedit will now check that the file's
parent directory exists before running the editor.
* Fixed the compiler stack protector test in configure for compilers
that support -fstack-protector but don't actually have the ssp
library available.
- use spec-cleaner
------------------------------------------------------------------- -------------------------------------------------------------------
Wed Aug 12 18:29:20 UTC 2015 - jengelh@inai.de Wed Aug 12 18:29:20 UTC 2015 - jengelh@inai.de

View File

@ -17,7 +17,7 @@
Name: sudo Name: sudo
Version: 1.8.14p3 Version: 1.8.15
Release: 0 Release: 0
Summary: Execute some commands as root Summary: Execute some commands as root
License: ISC License: ISC
@ -44,7 +44,7 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build
%description %description
Sudo is a command that allows users to execute some commands as root. Sudo is a command that allows users to execute some commands as root.
The /etc/sudoers file (edited with 'visudo') specifies which users have The %{_sysconfdir}/sudoers file (edited with 'visudo') specifies which users have
access to sudo and which commands they can run. Sudo logs all its access to sudo and which commands they can run. Sudo logs all its
activities to syslogd, so the system administrator can keep an eye on activities to syslogd, so the system administrator can keep an eye on
things. Sudo asks for the password for initializing a check period of a things. Sudo asks for the password for initializing a check period of a
@ -69,11 +69,11 @@ Tests for fate#313276
%prep %prep
%setup -q %setup -q
%patch0 -p1 %patch0 -p1
%patch1 -p1 %patch1 -p1
%build %build
%ifarch s390 s390x %sparc %ifarch s390 s390x %{sparc}
F_PIE=-fPIE F_PIE=-fPIE
%else %else
F_PIE=-fpie F_PIE=-fpie
@ -102,7 +102,7 @@ export LDFLAGS="-pie"
--without-secure-path \ --without-secure-path \
--with-passprompt='%%p\x27s password:' \ --with-passprompt='%%p\x27s password:' \
--with-rundir=%{_localstatedir}/lib/sudo \ --with-rundir=%{_localstatedir}/lib/sudo \
--with-sssd --with-sssd
make %{?_smp_mflags} make %{?_smp_mflags}
%install %install
@ -123,9 +123,9 @@ rm -f %{buildroot}%{_docdir}/%{name}/schema.OpenLDAP
%find_lang sudoers %find_lang sudoers
cat sudoers.lang >> %{name}.lang cat sudoers.lang >> %{name}.lang
# tests # tests
install -d -m 755 %{buildroot}/var/lib/tests/sudo install -d -m 755 %{buildroot}%{_localstatedir}/lib/tests/sudo
install -m 755 %{SOURCE3} %{buildroot}/var/lib/tests/sudo install -m 755 %{SOURCE3} %{buildroot}%{_localstatedir}/lib/tests/sudo
install -m 755 %{SOURCE4} %{buildroot}/var/lib/tests/sudo install -m 755 %{SOURCE4} %{buildroot}%{_localstatedir}/lib/tests/sudo
install -d %{buildroot}%{_docdir}/%{name}-test install -d %{buildroot}%{_docdir}/%{name}-test
install -m 644 %{buildroot}%{_docdir}/%{name}/LICENSE %{buildroot}%{_docdir}/%{name}-test/LICENSE install -m 644 %{buildroot}%{_docdir}/%{name}/LICENSE %{buildroot}%{_docdir}/%{name}-test/LICENSE
@ -134,23 +134,23 @@ chmod 0440 %{_sysconfdir}/sudoers
%if 0%{?suse_version} <= 1130 %if 0%{?suse_version} <= 1130
%run_permissions %run_permissions
%else %else
%set_permissions /usr/bin/sudo %set_permissions %{_bindir}/sudo
%endif %endif
%tmpfiles_create %{_tmpfilesdir}/sudo.conf %tmpfiles_create %{_tmpfilesdir}/sudo.conf
%verifyscript %verifyscript
%verify_permissions -e /usr/bin/sudo %verify_permissions -e %{_bindir}/sudo
%files -f %{name}.lang %files -f %{name}.lang
%defattr(-,root,root) %defattr(-,root,root)
%doc %{_docdir}/%{name} %doc %{_docdir}/%{name}
%doc %{_mandir}/man5/sudoers.5* %{_mandir}/man5/sudoers.5*
%doc %{_mandir}/man5/sudo.conf.5* %{_mandir}/man5/sudo.conf.5*
%doc %{_mandir}/man5/sudoers.ldap.5* %{_mandir}/man5/sudoers.ldap.5*
%doc %{_mandir}/man8/sudo.8* %{_mandir}/man8/sudo.8*
%doc %{_mandir}/man8/sudoedit.8* %{_mandir}/man8/sudoedit.8*
%doc %{_mandir}/man8/sudoreplay.8* %{_mandir}/man8/sudoreplay.8*
%doc %{_mandir}/man8/visudo.8* %{_mandir}/man8/visudo.8*
%config(noreplace) %attr(0440,root,root) %{_sysconfdir}/sudoers %config(noreplace) %attr(0440,root,root) %{_sysconfdir}/sudoers
%dir %{_sysconfdir}/sudoers.d %dir %{_sysconfdir}/sudoers.d
@ -184,7 +184,7 @@ chmod 0440 %{_sysconfdir}/sudoers
%files test %files test
%defattr(-,root, root) %defattr(-,root, root)
/var/lib/tests %{_localstatedir}/lib/tests
%{_docdir}/%{name}-test/ %{_docdir}/%{name}-test/
%changelog %changelog