summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2013-01-09Fix build on GNU HurdEmilio Pozuelo Monfort1-2/+3
https://bugs.freedesktop.org/show_bug.cgi?id=35685 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2013-01-09build: Remove generated introspection files on "make clean"Michael Biebl1-0/+1
https://bugs.freedesktop.org/show_bug.cgi?id=58869 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-12-19Set XAUTHORITY environment variable if is unsetDavid Zeuthen1-0/+22
The way it works is that if XAUTHORITY is unset, then its default value is $HOME/.Xauthority. But since we're changing user identity this will not work since $HOME will now change. Therefore, if XAUTHORITY is unset, just set its default value before changing identity. This bug only affected login managers using X Window Authorization but not explicitly setting the XAUTHORITY variable. You can argue that XAUTHORITY is broken since it forces uid-changing apps like pkexec(1) to do more work - and get involved in intimate details of how X works and so on - but that doesn't change how things work. Based on a patch from Peter Wu <lekensteyn@gmail.com>. https://bugs.freedesktop.org/show_bug.cgi?id=51623 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-12-19Post-release version bump to 0.110David Zeuthen2-2/+29
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-12-19Update NEWS for releaseDavid Zeuthen1-0/+31
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-15Don't require libmozjs185 devel packages for polkit rules to workDavid Zeuthen1-1/+1
The SO-name rules for SpiderMonkey are a little bit weird and we were opening wrong file. This problem was reported in https://bugs.freedesktop.org/show_bug.cgi?id=57146 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-14Include gmodule-2.0 to avoid linker errorsDavid Zeuthen1-1/+1
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-14Post-release version bump to 0.109David Zeuthen1-2/+2
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-14Update NEWS for releaseDavid Zeuthen1-0/+38
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-14docs: mention the audience for authorization rulesDavid Zeuthen2-0/+23
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-14Dynamically load libmozjs185.so and cope with it not being availableDavid Zeuthen2-147/+304
A number of downstream distributors have - one way or the other - requested this feature. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-11-13build: Fix .gir generation for parallel makeRyan Lortie2-0/+4
As per the intructions in the introspection Makefile, we should have a line declaring a dependency between the .gir and .la files. https://bugs.freedesktop.org/show_bug.cgi?id=57077 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-10-09PolkitAgent: Avoid crashing if initializing the server object failsAdam Jackson1-2/+1
Note that otherwise we return a freed server object. Since later in polkit_agent_listener_register_with_options we check against NULL to determine failure, this makes for sad times later when we call server_free() on it again. https://bugs.freedesktop.org/show_bug.cgi?id=55776 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-09-18Fall back to authenticating as uid 0 if the list of admin identities is emptyDavid Zeuthen1-6/+6
For example, this can happen if the wheel group has no members. This was reported in Red Hat bug 834494, see https://bugzilla.redhat.com/show_bug.cgi?id=834494 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-11Post-release version bump to 0.108David Zeuthen1-2/+2
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-11Update NEWS for releaseDavid Zeuthen1-0/+37
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-11pkexec: add support for argv1 annotation and mention shebang-wrappersDavid Zeuthen2-2/+55
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-06Introduce a polkit.Result enumeration for authorization rulesDavid Zeuthen6-52/+74
This way an authorization rule can do this return polkit.Result.YES; which is slightly nicer than return "yes"; https://bugs.freedesktop.org/show_bug.cgi?id=50983 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-06Nuke --enable-verbose flagDavid Zeuthen1-2/+0
It doesn't do anything. This was pointed out in https://bugs.freedesktop.org/show_bug.cgi?id=51470 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-06Nuke leftover polkit-backend-1.pc fileDavid Zeuthen3-13/+1
This was reported in https://bugs.freedesktop.org/show_bug.cgi?id=51466 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-07-06Try harder to look up the right localizationMatthias Clasen1-9/+7
The code for looking up localized strings for action descriptions was manually trying to break locale names into pieces, but didn't get it right for e.g. zh_CN.utf-8. Instead, use the GLib function g_get_locale_variants(), which handles this (and more). This fixes the translation problem reported in https://bugzilla.gnome.org/show_bug.cgi?id=665497 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-08Update guidance on situations where there is no polkit authorityDavid Zeuthen1-1/+6
Now that GDBusProxy does something reasonable for a masked systemd service, see https://bugzilla.gnome.org/show_bug.cgi?id=677718 construction of the PolkitAuthority object does not fail anymore. That doesn't mean the authority is available, though, so mention that users should check the result of the CheckAuthorization() call as well. Or in the case of PolkitAuthority, that the error is not a POLKIT_ERROR. This is actually a nice feature, it means that if you unmask polkit.service then mechanisms using PolkitAuthority will start using it without a restart. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-07Post-release version bump to 0.107David Zeuthen1-2/+2
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-07Update NEWS for releaseDavid Zeuthen1-0/+103
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-07docs: add a "make sure your app works when there's no polkitd(8)" noteDavid Zeuthen1-0/+22
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-07Mention the implications of returning *_keep in an authorization ruleDavid Zeuthen1-2/+18
Pointed out by Dan Williams <dcbw@redhat.com> on IRC. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-06Make it work when using ConsoleKit instead of libsystemd-loginDavid Zeuthen5-9/+59
... although it would be nicer to just rip out the CK bits and simply hard-require libsystemd-login instead - it should work just fine on non-systemd systems, same way systemd-udev works fine there. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-06agenthelper-pam: Fix newline-trimming codeColin Walters1-3/+8
First, we were using == instead of =, as the author probably intended. But after changing that, we're now assigning to const memory. Fix that by writing to a temporary string buffer. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-06autogen.sh: Fix check for libtool (we only need libtoolize)Colin Walters1-1/+1
A pre-built libtool copy may not be installed on all systems; all we need is libtoolize. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-06build: Check for mozjs185, not libjsColin Walters1-1/+1
libjs is a Fedora-specific invention; mozjs185.pc lives in the upstream tarball. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-04State that authorization rules must not rely on SpiderMonkey featuresDavid Zeuthen1-5/+13
... e.g. we reserve the right to switch out the JS engine. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-04Small updates to the "Writing polkit applications" chapterDavid Zeuthen1-74/+161
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-04Update pkexec(1) man page with exampleDavid Zeuthen1-0/+1
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-06-04Update links to udisks docsDavid Zeuthen1-4/+2
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
2012-05-25Rewrite the "Writing polkit applications" chapterDavid Zeuthen1-38/+142
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Log when the name org.fd.PolicyKit1 has been acquiredDavid Zeuthen1-6/+6
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Run polkitd as an unprivileged userDavid Zeuthen7-14/+136
There's really no reason to run all this code as uid 0. Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Remove unused DBUS_GLIB_* and GIO_* variablesDavid Zeuthen2-5/+0
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Ensure polkitd is rebuilt if libpolkit-backend-1.la changesDavid Zeuthen1-1/+1
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Move polkitd into src/polkitbackendDavid Zeuthen5-43/+27
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-25Use g_unix_signal_add() from GLib 2.30David Zeuthen5-199/+4
... instead of the one I wrote myself. Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-24Clarify pkexec(1) variablesDavid Zeuthen5-38/+42
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-24Combine action and details parametersDavid Zeuthen9-352/+382
This also removes the ability to change detail parameters which is actually a good thing. If we later need a way to change the authentication message, we can always add something like polkit.addAuthenticationMessageRule() so the user can register a function returning a string. Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-24Use a condition variable to signal that runaway killer thread is readyDavid Zeuthen1-5/+16
... instead of the unsafe g_thread_yield() busy-wait loop. Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-24Terminate runaway scriptsDavid Zeuthen4-25/+205
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-23Use "rules", not "scripts" to refer to files in rules.dDavid Zeuthen1-3/+3
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-23Pass expanded identity list to the AuthenticationSessionDavid Zeuthen1-24/+24
... otherwise it things like admin-identities being set to ["unix-group:session"] won't work. Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-23Add default rulesDavid Zeuthen3-10/+16
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-23Store private binaries in /usr/lib/polkit-1 instead of /usr/libexecDavid Zeuthen7-19/+16
Signed-off-by: David Zeuthen <davidz@redhat.com>
2012-05-23Mention systemd(1) in the polkitd(8) man pageDavid Zeuthen1-3/+11
Signed-off-by: David Zeuthen <davidz@redhat.com>