char *str2;
uid_t uid;
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
recurse = FALSE;
switch (node->node_type) {
for (i = node->children; i != NULL; i = g_slist_next (i)) {
ConfigNode *child_node = i->data;
result = config_node_test (child_node, action, caller, session);
- if (result != POLKIT_RESULT_UNKNOWN_ACTION) {
+ if (result != POLKIT_RESULT_UNKNOWN) {
goto out;
}
}
if (pk_config->top_config_node != NULL)
result = config_node_test (pk_config->top_config_node, action, NULL, session);
else
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
return result;
}
if (pk_config->top_config_node != NULL)
result = config_node_test (pk_config->top_config_node, action, caller, NULL);
else
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
return result;
}
* Determine if a given session can do a given action.
*
* Returns: A #PolKitResult - can only be one of
- * #POLKIT_RESULT_NOT_AUTHORIZED_TO_KNOW,
* #POLKIT_RESULT_YES, #POLKIT_RESULT_NO.
*/
PolKitResult
} else {
g_warning ("no action with name '%s'", action_name);
}
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
goto out;
}
/* check if the config file specifies a result */
result = polkit_config_can_session_do_action (pk_context->config, action, session);
- if (result != POLKIT_RESULT_UNKNOWN_ACTION)
+ if (result != POLKIT_RESULT_UNKNOWN)
goto found;
/* if no, just use the defaults */
result = polkit_policy_default_can_session_do_action (policy_default, action, session);
found:
- /* Never return UNKNOWN_ACTION to user */
- if (result == POLKIT_RESULT_UNKNOWN_ACTION)
+ /* Never return UNKNOWN to user */
+ if (result == POLKIT_RESULT_UNKNOWN)
result = POLKIT_RESULT_NO;
out:
} else {
g_warning ("no action with name '%s'", action_name);
}
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
goto out;
}
/* first, check if the grant database specifies a result */
result = _polkit_grantdb_check_can_caller_do_action (pk_context, action, caller);
- if (result != POLKIT_RESULT_UNKNOWN_ACTION)
+ if (result != POLKIT_RESULT_UNKNOWN)
goto found;
/* second, check if the config file specifies a result */
result = polkit_config_can_caller_do_action (pk_context->config, action, caller);
- if (result != POLKIT_RESULT_UNKNOWN_ACTION)
+ if (result != POLKIT_RESULT_UNKNOWN)
goto found;
/* if no, just use the defaults */
found:
- /* Never return UNKNOWN_ACTION to user */
- if (result == POLKIT_RESULT_UNKNOWN_ACTION)
+ /* Never return UNKNOWN to user */
+ if (result == POLKIT_RESULT_UNKNOWN)
result = POLKIT_RESULT_NO;
out:
_pk_debug ("... result was %s", polkit_result_to_string_representation (result));
unsigned long long pid_start_time;
grant_file = NULL;
- result = POLKIT_RESULT_UNKNOWN_ACTION;
+ result = POLKIT_RESULT_UNKNOWN;
if (caller == NULL)
goto out;
* session can do a given action.
*
* Returns: A #PolKitResult - can only be one of
- * #POLKIT_RESULT_NOT_AUTHORIZED_TO_KNOW,
* #POLKIT_RESULT_YES, #POLKIT_RESULT_NO.
**/
PolKitResult
const char *str;
} mapping[] =
{
- {POLKIT_RESULT_UNKNOWN_ACTION, "unknown"},
- {POLKIT_RESULT_NOT_AUTHORIZED_TO_KNOW, "not_authorized"},
+ {POLKIT_RESULT_UNKNOWN, "unknown"},
{POLKIT_RESULT_NO, "no"},
{POLKIT_RESULT_ONLY_VIA_ADMIN_AUTH, "auth_admin"},
{POLKIT_RESULT_ONLY_VIA_ADMIN_AUTH_KEEP_SESSION, "auth_admin_keep_session"},
/**
* PolKitResult:
- * @POLKIT_RESULT_UNKNOWN_ACTION: The passed action is unknown.
- * @POLKIT_RESULT_NOT_AUTHORIZED_TO_KNOW: The caller of polkit is not sufficiently privilege to know the answer.
+ * @POLKIT_RESULT_UNKNOWN: The result is unknown / cannot be
+ * computed. This is mostly used internally in libpolkit.
* @POLKIT_RESULT_NO: Access denied.
* @POLKIT_RESULT_ONLY_VIA_ADMIN_AUTH: Access denied, but
* authentication by the caller as administrator (e.g. root or a
*/
typedef enum
{
- POLKIT_RESULT_UNKNOWN_ACTION,
- POLKIT_RESULT_NOT_AUTHORIZED_TO_KNOW,
+ POLKIT_RESULT_UNKNOWN,
+
POLKIT_RESULT_NO,
POLKIT_RESULT_ONLY_VIA_ADMIN_AUTH,