Package: sudo
Version: 1.9.9-1
Severity: normal

Hi,

I noticed that the latest version of sudo ships a mask
 /etc/systemd/system/sudo.service -> /dev/null
which is created dynamically via the maintainer scripts.

Please consider simply shipping the mask in the package statically in
/lib/systemd/system/ as was done before.

Regards,
Michael


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-3-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages sudo depends on:
ii  init-system-helpers  1.61
ii  libaudit1            1:3.0.6-1+b1
ii  libc6                2.33-5
ii  libpam-modules       1.4.0-11
ii  libpam0g             1.4.0-11
ii  libselinux1          3.3-1+b1
ii  lsb-base             11.1.0
ii  zlib1g               1:1.2.11.dfsg-2

sudo recommends no packages.

sudo suggests no packages.

-- Configuration Files:
/etc/sudoers [Errno 13] Keine Berechtigung: '/etc/sudoers'
/etc/sudoers.d/README [Errno 13] Keine Berechtigung: '/etc/sudoers.d/README'

-- no debconf information

Reply via email to