Install a PAM policy, rather than just suggesting that the admin do so.

This commit is contained in:
Dag-Erling Smørgrav 2007-04-10 12:47:09 +00:00
parent 0eddb1a32d
commit 8e649aef1d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=189667
4 changed files with 20 additions and 21 deletions

View File

@ -7,7 +7,7 @@
PORTNAME= sudo
PORTVERSION= 1.6.8.12
PORTREVISION= 1
PORTREVISION= 2
CATEGORIES= security
MASTER_SITES= http://www.sudo.ws/sudo/dist/ \
http://probsd.org/sudoftp/ \
@ -68,6 +68,6 @@ post-install:
${INSTALL_DATA} ${WRKSRC}/sample.sudoers ${PREFIX}/etc/sudoers.sample
${INSTALL_DATA} ${WRKSRC}/sudoers ${PREFIX}/etc/sudoers.default
${RM} ${PREFIX}/libexec/sudo_noexec.la
${CAT} ${PKGMESSAGE}
${INSTALL_DATA} ${FILESDIR}/pam.conf ${PREFIX}/etc/pam.d/sudo
.include <bsd.port.post.mk>

View File

@ -0,0 +1,17 @@
#
# $Id$
#
# PAM configuration for the "sudo" service
#
# auth
auth include system
# account
account include system
# session
session include system
# password
password include system

View File

@ -1,19 +0,0 @@
If you store accounts in external place and want to use password
authentication for sudo, you must create /etc/pam.d/sudo file like:
=====================================================================
#
# PAM configuration for the "sudoers" service
#
# auth
auth include system
# account
account include system
# session
session include system
# password
password include system
=====================================================================

View File

@ -1,6 +1,7 @@
@unexec if cmp -s %D/etc/sudoers %D/etc/sudoers.default; then rm -f %D/etc/sudoers; fi
bin/sudo
bin/sudoedit
etc/pam.d/sudo
etc/sudoers.default
etc/sudoers.sample
libexec/sudo_noexec.so