<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Feb 2, 2016 at 7:40 AM, Harald Hanche-Olsen <span dir="ltr"><<a href="mailto:hanche@math.ntnu.no" target="_blank">hanche@math.ntnu.no</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">-----Original Message-----<br>
From: Phil Oertel <<a href="mailto:phillipao@gmail.com">phillipao@gmail.com</a>><br>
</span><span class="">Date: 2 February 2016 at 16:31:12<br>
<br>
> Entirely possible. I didn't make any such modification personally, but it's<br>
> a work laptop, so I don't know what they've done to the image prior to<br>
> giving it to me. Maybe I'll get them to stop whatever it is they're doing<br>
> to sudoers. Thanks, Brandon and Harald, this makes a lot more sense than<br>
> there being an installer bug :)<br>
<br>
</span>You might look to see if they have set secure_path. If you can run sudo, surely you can look inside /etc/suoers and see what is there. 8-)<br></blockquote><div><br></div><div>Yes, it has both env_reset and a secure_path. And some comments at the top indicating that the file is periodically overwritten by Puppet.</div><div> </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<span class="HOEnZb"><font color="#888888"><br>
– Harald</font></span></blockquote></div><br></div></div>