K2LL33D SHELL

 Apache/2.4.7 (Ubuntu)
 Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64
 uid=33(www-data) gid=33(www-data) groups=33(www-data)
 safemode : OFF
 MySQL: ON | Perl: ON | cURL: OFF | WGet: ON
  >  / var / lib / dpkg / info /
server ip : 172.67.156.115

your ip : 172.70.80.31

H O M E


Filename/var/lib/dpkg/info/sudo.prerm
Size1.38 kb
Permissionrwxr-xr-x
Ownerroot : root
Create time27-Apr-2025 09:50
Last modified11-Feb-2014 03:16
Last accessed06-Jul-2025 22:16
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
#!/bin/sh

set -e

check_password() {
if [ ! "$SUDO_FORCE_REMOVE" = "yes" ]; then
# let's check whether the root account is locked.
# if it is, we're not going another step. No Sirreee!
passwd=$(getent shadow root|cut -f2 -d:)
passwd1=$(echo "$passwd" |cut -c1)
# Note: we do need the 'xfoo' syntax here, since POSIX special-cases
# the $passwd value '!' as negation.
if [ "x$passwd" = "x*" ] || [ "x$passwd1" = "x!" ]; then
# yup, password is locked
echo "You have asked that the sudo package be removed,"
echo "but no root password has been set."
echo "Without sudo, you may not be able to gain administrative privileges."
echo
echo "If you would prefer to access the root account with su(1)"
echo "or by logging in directly,"
echo "you must set a root password with \"sudo passwd\"."
echo
echo "If you have arranged other means to access the root account,"
echo "and you are sure this is what you want,"
echo "you may bypass this check by setting an environment variable "
echo "(export SUDO_FORCE_REMOVE=yes)."
echo
echo "Refusing to remove sudo."
exit 1
fi
fi
}

case $1 in
remove)
check_password;
;;
*)
;;
esac

# Automatically added by dh_installinit
if [ -x "/etc/init.d/sudo" ] || [ -e "/etc/init/sudo.conf" ]; then
invoke-rc.d sudo stop || exit $?
fi
# End automatically added section


exit 0