{ stdenv, fetchurl, coreutils, pam, groff, sssd, nixosTests , sendmailPath ? "/run/wrappers/bin/sendmail" , withInsults ? false , withSssd ? false }: stdenv.mkDerivation rec { pname = "sudo"; version = "1.9.4p2"; src = fetchurl { url = "https://www.sudo.ws/dist/${pname}-${version}.tar.gz"; sha256 = "0r0g8z289ipw0zpkhmm33cpfm42j01jds2q1wilhh3flg7xg2jn3"; }; prePatch = '' # do not set sticky bit in nix store substituteInPlace src/Makefile.in --replace 04755 0755 ''; configureFlags = [ "--with-env-editor" "--with-editor=/run/current-system/sw/bin/nano" "--with-rundir=/run/sudo" "--with-vardir=/var/db/sudo" "--with-logpath=/var/log/sudo.log" "--with-iologdir=/var/log/sudo-io" "--with-sendmail=${sendmailPath}" "--enable-tmpfiles.d=no" ] ++ stdenv.lib.optional withInsults [ "--with-insults" "--with-all-insults" ] ++ stdenv.lib.optional withSssd [ "--with-sssd" "--with-sssd-lib=${sssd}/lib" ]; configureFlagsArray = [ "--with-passprompt=[sudo] password for %p: " # intentional trailing space ]; postConfigure = '' cat >> pathnames.h <<'EOF' #undef _PATH_MV #define _PATH_MV "${coreutils}/bin/mv" EOF makeFlags="install_uid=$(id -u) install_gid=$(id -g)" installFlags="sudoers_uid=$(id -u) sudoers_gid=$(id -g) sysconfdir=$out/etc rundir=$TMPDIR/dummy vardir=$TMPDIR/dummy DESTDIR=/" ''; nativeBuildInputs = [ groff ]; buildInputs = [ pam ]; enableParallelBuilding = true; doCheck = false; # needs root postInstall = '' rm -f $out/share/doc/sudo/ChangeLog ''; passthru.tests = { inherit (nixosTests) sudo; }; meta = { description = "A command to run commands as root"; longDescription = '' Sudo (su "do") allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments. ''; homepage = "https://www.sudo.ws/"; license = "https://www.sudo.ws/sudo/license.html"; maintainers = with stdenv.lib.maintainers; [ eelco delroth ]; platforms = stdenv.lib.platforms.linux; }; }