This affects me as well. @abone Yes, that's necessary. It doesn't matter where you put it in the file, though. For example:
/etc/pam.d/sudo ===== auth required pam_env.so readenv=1 user_readenv=0 auth required pam_env.so readenv=1 envfile=/etc/default/locale user_readenv=0 @include common-auth @include common-account @include common-session-noninteractive session required pam_env.so readenv=1 ===== -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to sudo in Ubuntu. https://bugs.launchpad.net/bugs/1301557 Title: sudo not setting environment variables in /etc/environment Status in “sudo” package in Ubuntu: Confirmed Bug description: With 1.8.9p5-1ubuntu1 sudo does not load environment variables from /etc/environment, which is a change in behaviour from Ubuntu 13.10. lsb_release -rd Description: Ubuntu Trusty Tahr (development branch) Release: 14.04 apt-cache policy sudo sudo: Installed: 1.8.9p5-1ubuntu1 Candidate: 1.8.9p5-1ubuntu1 Version table: *** 1.8.9p5-1ubuntu1 0 500 http://gb.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages 100 /var/lib/dpkg/status Steps to reproduce: cat /etc/environment PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usrgames:/usr/local/games" JAVA_HOME="/usr/lib/jvm/java-7-openjdk-amd64/jre/" env | grep JAVA_HOME JAVA_HOME=/usr/lib/jvm/java-7-openjdk-amd64/jre/ sudo env | grep JAVA_HOME sudo -s root@sant-idp:~# env | grep JAVA_HOME root@sant-idp:~# exit exit cat /etc/sudoers # # This file MUST be edited with the 'visudo' command as root. # # Please consider adding local content in /etc/sudoers.d/ instead of # directly modifying this file. # # See the man page for details on how to write a sudoers file. # Defaults env_reset Defaults mail_badpass Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" # Host alias specification # User alias specification # Cmnd alias specification # User privilege specification root ALL=(ALL:ALL) ALL # Members of the admin group may gain root privileges %admin ALL=(ALL) ALL # Allow members of group sudo to execute any command %sudo ALL=(ALL:ALL) ALL # See sudoers(5) for more information on "#include" directives: #includedir /etc/sudoers.d Please advise if this is a bug or new intended behaviour? Thanks. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1301557/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp

