This (sudoers.d) looks completely sensible to me (and indeed, I saw the same issue and realized the danger of overwriting the sudoers file accidentally removing access to the host). Perhaps time to start to get ready to re-roll the image with accrued fixes. (this one, Libc6, etc). if anyone needs access to the AWS account for resource access in order to test, please let me know.
James PS: If you do overwrite /etc/sudoers, then you can recover it by stopping the host (not terminate), present the root volume to another host, mounting it, edit the sudoers file, unmount, unpresent, and then start the host again. But sudoers/d may be neater. ;) James Bromberger | Solution Architect | Amazon Web Services E: [email protected] -----Original Message----- From: Anders Ingemann [mailto:[email protected]] Sent: Monday, 7 January 2013 8:18 AM To: Chris Fordham Cc: Charles Plessy; [email protected] Subject: Bug#697490: cloud: 697490: use sudoers.d On 6 January 2013 22:55, Chris Fordham <[email protected]> wrote: > This is a good example of why template-based configuration is better > used rather than regex/stream based editing. well. d'uh! :-P I did not know about sudoers.d when I wrote it, otherwise I can assure you that we wouldn't be talking about this to begin with ;-) -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/camcogxhnnz_mgmdu_upwmrfqrcpmfdbu7r8b5eqjaxvumho...@mail.gmail.com
