Skip to content

Commit 948363f

Browse files
authored
Merge pull request #850 from trifectatechfoundation/url-change
change URLs to new repository location
2 parents cb99720 + 227327b commit 948363f

File tree

10 files changed

+19
-23
lines changed

10 files changed

+19
-23
lines changed

.github/PULL_REQUEST_TEMPLATE/pull_request_template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
A clear and concise description of the changes done by your pull request.
33

44
**Pull Request Checklist**
5-
- [] I have read and accepted the [code of conduct](https://github.com/memorysafety/sudo-rs/blob/master/CODE_OF_CONDUCT.md) for this project.
5+
- [] I have read and accepted the [code of conduct](https://github.com/trifectatechfoundation/sudo-rs/blob/master/CODE_OF_CONDUCT.md) for this project.
66
- [] I have tested, formatted and ran clippy over my changes.
77
- [] I have commented and documented my changes.
8-
- [] This pull request will fix issue https://github.com/memorysafety/sudo-rs/issues/<#issue> where a proper discussion about a solution has taken place.
8+
- [] This pull request will fix issue https://github.com/trifectatechfoundation/sudo-rs/issues/<#issue> where a proper discussion about a solution has taken place.

.github/workflows/ci.yaml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -397,11 +397,7 @@ jobs:
397397
shared-key: "stable"
398398

399399
- name: Run clippy
400-
uses: actions-rs/clippy-check@v1
401-
with:
402-
name: clippy-result
403-
token: ${{ secrets.GITHUB_TOKEN }}
404-
args: --no-deps -- --deny warnings
400+
run: cargo clippy --no-deps --all-targets --all-features -- --deny warnings
405401

406402
docs:
407403
needs: clippy

CHANGELOG.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -111,9 +111,9 @@
111111
- Use canonicalized paths for the executed binaries
112112
- Simplified CLI help to only display supported actions
113113

114-
[0.2.2]: https://github.com/memorysafety/sudo-rs/compare/v0.2.1...v0.2.2
115-
[0.2.1]: https://github.com/memorysafety/sudo-rs/compare/v0.2.0...v0.2.1
116-
[0.2.0]: https://github.com/memorysafety/sudo-rs/compare/v0.2.0-dev.20230711...v0.2.0
117-
[0.2.0-dev.20230711]: https://github.com/memorysafety/sudo-rs/compare/v0.2.0-dev.20230703...v0.2.0-dev.20230711
118-
[0.2.0-dev.20230703]: https://github.com/memorysafety/sudo-rs/compare/v0.2.0-dev.20230627...v0.2.0-dev.20230703
119-
[0.2.0-dev.20230627]: https://github.com/memorysafety/sudo-rs/compare/v0.1.0-dev.20230620...v0.2.0-dev.20230627
114+
[0.2.2]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.2.1...v0.2.2
115+
[0.2.1]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.2.0...v0.2.1
116+
[0.2.0]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.2.0-dev.20230711...v0.2.0
117+
[0.2.0-dev.20230711]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.2.0-dev.20230703...v0.2.0-dev.20230711
118+
[0.2.0-dev.20230703]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.2.0-dev.20230627...v0.2.0-dev.20230703
119+
[0.2.0-dev.20230627]: https://github.com/trifectatechfoundation/sudo-rs/compare/v0.1.0-dev.20230620...v0.2.0-dev.20230627

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ If you find a security problem that can be used to used to compromise a system,
5151
do follow our [security policy] and report a vulnerability instead of using the
5252
issue tracker.
5353

54-
[security policy]: https://github.com/memorysafety/sudo-rs/security/policy
54+
[security policy]: https://github.com/trifectatechfoundation/sudo-rs/security/policy
5555

5656
## Working on a bigger issue
5757

Cargo.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description = "A memory safe implementation of sudo and su."
44
version = "0.2.2"
55
license = "Apache-2.0 OR MIT"
66
edition = "2021"
7-
repository = "https://github.com/memorysafety/sudo-rs"
8-
homepage = "https://github.com/memorysafety/sudo-rs"
7+
repository = "https://github.com/trifectatechfoundation/sudo-rs"
8+
homepage = "https://github.com/trifectatechfoundation/sudo-rs"
99
publish = true
1010
categories = ["command-line-interface"]
1111

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ A safety oriented and memory safe implementation of sudo and su written in Rust.
77
Sudo-rs is being developed further; features you might expect from original sudo
88
may still be unimplemented or not planned. If there is an important one you need,
99
please request it using the issue tracker. If you encounter any usability bugs,
10-
also please report them on the [issue tracker](https://github.com/memorysafety/sudo-rs/issues).
11-
Suspected vulnerabilities can be reported on our [security page](https://github.com/memorysafety/sudo-rs/security).
10+
also please report them on the [issue tracker](https://github.com/trifectatechfoundation/sudo-rs/issues).
11+
Suspected vulnerabilities can be reported on our [security page](https://github.com/trifectatechfoundation/sudo-rs/security).
1212

1313
An [audit of sudo-rs version 0.2.0](docs/audit/audit-report-sudo-rs.pdf) has been performed in August 2023.
1414
The findings from that audit are addressed in the current version.

SECURITY.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Security policy
22
**Do not report security vulnerabilities through public GitHub issues.**
33

4-
Instead, you can report them using [our security page](https://github.com/memorysafety/sudo-rs/security). Alternatively, you can also send them
4+
Instead, you can report them using [our security page](https://github.com/trifectatechfoundation/sudo-rs/security). Alternatively, you can also send them
55
by email to [email protected]. You can encrypt your email using GnuPG if you want. Use the GPG key with fingerprint
66
[C2E4 CAC4 B122 25DE 1C3B B1C9 289D 0820 03D0 1E95](https://keys.openpgp.org/search?q=C2E4CAC4B12225DE1C3BB1C9289D082003D01E95).
77

@@ -24,4 +24,4 @@ We prefer to receive reports in English. If necessary, we also understand Spanis
2424
Like original sudo, we adhere to the principle of [Coordinated Vulnerability Disclosure](https://vuls.cert.org/confluence/display/CVD/Executive+Summary).
2525

2626
# Security Advisories
27-
Security advisories will be published [on GitHub](https://github.com/memorysafety/sudo-rs/security/advisories) and possibly through other channels.
27+
Security advisories will be published [on GitHub](https://github.com/trifectatechfoundation/sudo-rs/security/advisories) and possibly through other channels.

src/sudoers/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -456,7 +456,7 @@ fn match_group_alias(group: &impl UnixGroup) -> impl Fn(&UserSpecifier) -> bool
456456
move |spec| match spec {
457457
UserSpecifier::User(ident) => match_group(group)(ident),
458458
/* the parser does not allow this, but can happen due to Runas_Alias,
459-
* see https://github.com/memorysafety/sudo-rs/issues/13 */
459+
* see https://github.com/trifectatechfoundation/sudo-rs/issues/13 */
460460
_ => {
461461
auth_warn!("warning: ignoring %group syntax in runas_alias for checking sudo -g");
462462
false

src/system/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -645,7 +645,7 @@ pub fn escape_os_str_lossy(s: &std::ffi::OsStr) -> String {
645645
pub fn make_zeroed_sigaction() -> libc::sigaction {
646646
// SAFETY: since sigaction is a C struct, all-zeroes is a valid representation
647647
// We cannot use a "literal struct" initialization method since the exact representation
648-
// of libc::sigaction is not fixed, see e.g. https://github.com/memorysafety/sudo-rs/issues/829
648+
// of libc::sigaction is not fixed, see e.g. https://github.com/trifectatechfoundation/sudo-rs/issues/829
649649
unsafe { std::mem::zeroed() }
650650
}
651651

test-framework/sudo-compliance-tests/src/sudo/flag_user.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ fn user_can_become_another_user() -> Result<()> {
108108
Ok(())
109109
}
110110

111-
// regression test for memorysafety/sudo-rs#81
111+
// regression test for trifectatechfoundation/sudo-rs#81
112112
#[test]
113113
fn invoking_user_groups_are_lost_when_becoming_another_user() -> Result<()> {
114114
let invoking_user = USERNAME;

0 commit comments

Comments
 (0)