EXEEXT
ac_ct_CC
CC
-PLUGINDIR
+plugindir
pam_login_service
pam_session
editor
secure_path="not set"
pam_session=on
pam_login_service=sudo
-PLUGINDIR="$libexecdir/sudo"
+plugindir="$libexecdir/sudo"
DIGEST=digest.lo
devsearch="/dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev"
#
;;
no) as_fn_error $? "\"--without-plugindir not supported.\"" "$LINENO" 5
;;
- *) PLUGINDIR="$with_plugindir"
+ *) plugindir="$with_plugindir"
;;
esac
fi
eval sesh_file="$_sesh_file"
done
-# Update exec_prefix in PLUGINDIR
-_PLUGINDIR=
-while test X"$PLUGINDIR" != X"$_PLUGINDIR"; do
- _PLUGINDIR="$PLUGINDIR"
- eval PLUGINDIR="$_PLUGINDIR"
+# Update exec_prefix in plugindir
+_plugindir=
+while test X"$plugindir" != X"$_plugindir"; do
+ _plugindir="$plugindir"
+ eval plugindir="$_plugindir"
done
exec_prefix="$oexec_prefix"
fi
if test X"$enable_shared" != X"no"; then
cat >>confdefs.h <<EOF
-#define _PATH_SUDO_PLUGIN_DIR "$PLUGINDIR/"
+#define _PATH_SUDO_PLUGIN_DIR "$plugindir/"
EOF
AC_SUBST([editor])
AC_SUBST([pam_session])
AC_SUBST([pam_login_service])
-AC_SUBST([PLUGINDIR])
+AC_SUBST([plugindir])
#
# Begin initial values for man page substitution
#
secure_path="not set"
pam_session=on
pam_login_service=sudo
-PLUGINDIR="$libexecdir/sudo"
+plugindir="$libexecdir/sudo"
DIGEST=digest.lo
devsearch="/dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev"
#
;;
no) AC_MSG_ERROR(["--without-plugindir not supported."])
;;
- *) PLUGINDIR="$with_plugindir"
+ *) plugindir="$with_plugindir"
;;
esac])
eval sesh_file="$_sesh_file"
done
-# Update exec_prefix in PLUGINDIR
-_PLUGINDIR=
-while test X"$PLUGINDIR" != X"$_PLUGINDIR"; do
- _PLUGINDIR="$PLUGINDIR"
- eval PLUGINDIR="$_PLUGINDIR"
+# Update exec_prefix in plugindir
+_plugindir=
+while test X"$plugindir" != X"$_plugindir"; do
+ _plugindir="$plugindir"
+ eval plugindir="$_plugindir"
done
exec_prefix="$oexec_prefix"
SUDO_DEFINE_UNQUOTED(_PATH_SUDO_SESH, NULL)
fi
if test X"$enable_shared" != X"no"; then
- SUDO_DEFINE_UNQUOTED(_PATH_SUDO_PLUGIN_DIR, "$PLUGINDIR/")
+ SUDO_DEFINE_UNQUOTED(_PATH_SUDO_PLUGIN_DIR, "$plugindir/")
AC_DEFINE(ENABLE_SUDO_PLUGIN_API, 1, [Define to 1 to enable sudo's plugin interface.])
else
SUDO_DEFINE_UNQUOTED(_PATH_SUDO_PLUGIN_DIR, NULL)
\fIplugin_dir\fR
\fRPath\fR
setting, which defaults to
-\fI@PLUGINDIR@\fR.
+\fI@plugindir@\fR.
In other words:
.nf
.sp
.nf
.sp
.RS 6n
-Plugin sudoers_policy @PLUGINDIR@/sudoers.so
+Plugin sudoers_policy @plugindir@/sudoers.so
.RE
.fi
.PP
The default directory to use when searching for plugins
that are specified without a fully qualified path name.
The default value is
-\fI@PLUGINDIR@\fR.
+\fI@plugindir@\fR.
.if \n(SL \{\
.TP 10n
sesh
# Debug sudo /var/log/sudo_debug all@warn
# Set disable_coredump true
#
-# The plugin_path is relative to @PLUGINDIR@ unless
+# The plugin_path is relative to @plugindir@ unless
# fully qualified.
# The plugin_name corresponds to a global symbol in the plugin
# that contains the plugin interface structure.
.Em plugin_dir
.Li Path
setting, which defaults to
-.Pa @PLUGINDIR@ .
+.Pa @plugindir@ .
In other words:
.Bd -literal -offset indent
Plugin sudoers_policy sudoers.so
.Pp
is equivalent to:
.Bd -literal -offset indent
-Plugin sudoers_policy @PLUGINDIR@/sudoers.so
+Plugin sudoers_policy @plugindir@/sudoers.so
.Ed
.Pp
If the plugin was compiled statically into the
The default directory to use when searching for plugins
that are specified without a fully qualified path name.
The default value is
-.Pa @PLUGINDIR@ .
+.Pa @plugindir@ .
.if \n(SL \{\
.It sesh
The fully-qualified path to the
# Debug sudo /var/log/sudo_debug all@warn
# Set disable_coredump true
#
-# The plugin_path is relative to @PLUGINDIR@ unless
+# The plugin_path is relative to @plugindir@ unless
# fully qualified.
# The plugin_name corresponds to a global symbol in the plugin
# that contains the plugin interface structure.
group plugin with optional arguments.
The string should consist of the plugin
path, either fully-qualified or relative to the
-\fI@PLUGINDIR@\fR
+\fI@plugindir@\fR
directory, followed by any configuration arguments the plugin requires.
These arguments (if any) will be passed to the plugin's initialization function.
If arguments are present, the string must be enclosed in double quotes
The argument to
\fIgroup_plugin\fR
should consist of the plugin path, either fully-qualified or relative to the
-\fI@PLUGINDIR@\fR
+\fI@plugindir@\fR
directory, followed by any configuration options the plugin requires.
These options (if specified) will be passed to the plugin's initialization
function.
group plugin with optional arguments.
The string should consist of the plugin
path, either fully-qualified or relative to the
-.Pa @PLUGINDIR@
+.Pa @plugindir@
directory, followed by any configuration arguments the plugin requires.
These arguments (if any) will be passed to the plugin's initialization function.
If arguments are present, the string must be enclosed in double quotes
The argument to
.Em group_plugin
should consist of the plugin path, either fully-qualified or relative to the
-.Pa @PLUGINDIR@
+.Pa @plugindir@
directory, followed by any configuration options the plugin requires.
These options (if specified) will be passed to the plugin's initialization
function.
libexecdir = @libexecdir@
datarootdir = @datarootdir@
localstatedir = @localstatedir@
-plugindir = @PLUGINDIR@
+plugindir = @plugindir@
# File mode and map file to use for shared libraries/objects
shlib_enable = @SHLIB_ENABLE@
libexecdir = @libexecdir@
datarootdir = @datarootdir@
localstatedir = @localstatedir@
-plugindir = @PLUGINDIR@
+plugindir = @plugindir@
# File mode and map file to use for shared libraries/objects
shlib_enable = @SHLIB_ENABLE@
shlib_opt = sudoers.opt
# Directory in which to install the sudoers plugin
-plugindir = @PLUGINDIR@
+plugindir = @plugindir@
# Directory in which to install the sudoers file
sudoersdir = $(sysconfdir)
libexecdir = @libexecdir@
datarootdir = @datarootdir@
localstatedir = @localstatedir@
-plugindir = @PLUGINDIR@
+plugindir = @plugindir@
# File mode and map file to use for shared libraries/objects
shlib_enable = @SHLIB_ENABLE@