From: Todd C. Miller Date: Fri, 18 Feb 2000 17:11:43 +0000 (+0000) Subject: enveditor -> env_editor X-Git-Tag: SUDO_1_6_3~46 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=44c5092fabd8702c42c669c0acd556523375c9d9;p=sudo enveditor -> env_editor --- diff --git a/CHANGES b/CHANGES index f2d9cc266..6b5ea41d0 100644 --- a/CHANGES +++ b/CHANGES @@ -1249,3 +1249,7 @@ Sudo 1.6.2 released. by 'secure-path'. Patch from jmknoble@pobox.com. 394) Pam now works on HP-UX 11.0, thanks to Jeff A. Earickson. + +395) It is now possible to set the path to the editor for visudo as well + as the flag that determines whether or not visudo will look at + $EDITOR in the sudoers file. diff --git a/defaults.c b/defaults.c index 8f10be41f..77d93a916 100644 --- a/defaults.c +++ b/defaults.c @@ -182,7 +182,7 @@ struct sudo_defs_types sudo_defs_table[] = { "requiretty", T_FLAG, "Only allow the user to run sudo if they have a tty" }, { - "enveditor", T_FLAG, + "env_editor", T_FLAG, "Visudo will honor the EDITOR environment variable" }, { "loglinelen", T_INT|T_BOOL, diff --git a/sudoers.cat b/sudoers.cat index f6ce5f171..271b063db 100644 --- a/sudoers.cat +++ b/sudoers.cat @@ -61,7 +61,7 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN -15/Feb/2000 1.6.3 1 +18/Feb/2000 1.6.3 1 @@ -127,7 +127,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 2 +18/Feb/2000 1.6.3 2 @@ -193,7 +193,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 3 +18/Feb/2000 1.6.3 3 @@ -259,7 +259,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 4 +18/Feb/2000 1.6.3 4 @@ -325,7 +325,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 5 +18/Feb/2000 1.6.3 5 @@ -374,7 +374,7 @@ sudoers(5) FILE FORMATS sudoers(5) flag to prevent a user from entering a visible password. This flag is off by default. - enveditor If set, visudo will use the value of the + env_editor If set, visudo will use the value of the EDITOR or VISUAL environment falling back on the default editor. Note that this may create a security hole as most editors allow a user @@ -391,7 +391,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 6 +18/Feb/2000 1.6.3 6 @@ -457,7 +457,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 7 +18/Feb/2000 1.6.3 7 @@ -523,7 +523,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 8 +18/Feb/2000 1.6.3 8 @@ -589,7 +589,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 9 +18/Feb/2000 1.6.3 9 @@ -655,7 +655,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 10 +18/Feb/2000 1.6.3 10 @@ -721,7 +721,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 11 +18/Feb/2000 1.6.3 11 @@ -787,7 +787,7 @@ EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS -15/Feb/2000 1.6.3 12 +18/Feb/2000 1.6.3 12 @@ -853,7 +853,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 13 +18/Feb/2000 1.6.3 13 @@ -919,7 +919,7 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 14 +18/Feb/2000 1.6.3 14 @@ -985,7 +985,7 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS -15/Feb/2000 1.6.3 15 +18/Feb/2000 1.6.3 15 @@ -1051,7 +1051,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO -15/Feb/2000 1.6.3 16 +18/Feb/2000 1.6.3 16 @@ -1117,6 +1117,6 @@ sudoers(5) FILE FORMATS sudoers(5) -15/Feb/2000 1.6.3 17 +18/Feb/2000 1.6.3 17 diff --git a/sudoers.man b/sudoers.man index 4570bc0cf..083b35917 100644 --- a/sudoers.man +++ b/sudoers.man @@ -2,8 +2,8 @@ ''' $RCSfile$$Revision$$Date$ ''' ''' $Log$ -''' Revision 1.25 2000/02/16 00:07:28 millert -''' crank versino to 1.6.3 +''' Revision 1.26 2000/02/18 17:11:43 millert +''' enveditor -> env_editor ''' ''' .de Sh @@ -96,7 +96,7 @@ .nr % 0 .rr F .\} -.TH sudoers 5 "1.6.3" "15/Feb/2000" "FILE FORMATS" +.TH sudoers 5 "1.6.3" "18/Feb/2000" "FILE FORMATS" .UC .if n .hy 0 .if n .na @@ -464,7 +464,7 @@ tty. This will disallow things like \f(CW"rsh somehost sudo ls"\fR since of echo when there is no tty present, some sites may with to set this flag to prevent a user from entering a visible password. This flag is off by default. -.Ip "enveditor" 12 +.Ip "env_editor" 12 If set, visudo will use the value of the \s-1EDITOR\s0 or \s-1VISUAL\s0 environment falling back on the default editor. Note that this may create a security hole as most editors allow a user to get a shell (which @@ -1007,7 +1007,7 @@ as returned by the \f(CWhostname\fR command or use the \fIfqdn\fR option in .IX Item "requiretty" -.IX Item "enveditor" +.IX Item "env_editor" .IX Item "passwd_tries" diff --git a/sudoers.pod b/sudoers.pod index 66c9a745f..aeca4b2bd 100644 --- a/sudoers.pod +++ b/sudoers.pod @@ -346,7 +346,7 @@ of echo when there is no tty present, some sites may with to set this flag to prevent a user from entering a visible password. This flag is off by default. -=item enveditor +=item env_editor If set, visudo will use the value of the EDITOR or VISUAL environment falling back on the default editor. Note that this may create a diff --git a/visudo.c b/visudo.c index 752bf2561..fc14425f1 100644 --- a/visudo.c +++ b/visudo.c @@ -210,7 +210,7 @@ main(argc, argv) (void) close(stmp_fd); (void) touch(stmp, sudoers_sb.st_mtime); - /* Parse sudoers to pull in editor and enveditor conf values. */ + /* Parse sudoers to pull in editor and env_editor conf values. */ if ((yyin = fopen(stmp, "r"))) { yyout = stdout; init_defaults();