platform/upstream/polkit.git
14 years agoUpdate NEWS for release 0.96
David Zeuthen [Fri, 15 Jan 2010 19:11:00 +0000 (14:11 -0500)]
Update NEWS for release

14 years agoDon't log authorization checks
David Zeuthen [Fri, 15 Jan 2010 19:02:21 +0000 (14:02 -0500)]
Don't log authorization checks

It's a little too verbose to do this. See

 http://lists.freedesktop.org/archives/polkit-devel/2009-December/000283.html

for the rationale.

14 years agoPost-release version bump to 0.96
David Zeuthen [Fri, 15 Jan 2010 18:53:04 +0000 (13:53 -0500)]
Post-release version bump to 0.96

14 years agoComplain on stderr, not stdout
David Zeuthen [Tue, 15 Dec 2009 19:04:24 +0000 (14:04 -0500)]
Complain on stderr, not stdout

14 years agoSave original cwd in pkexec(1) since it will change during the life-time
David Zeuthen [Tue, 15 Dec 2009 19:02:47 +0000 (14:02 -0500)]
Save original cwd in pkexec(1) since it will change during the life-time

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoMake pkexec(1) use the syslogging facilities
David Zeuthen [Tue, 15 Dec 2009 18:48:37 +0000 (13:48 -0500)]
Make pkexec(1) use the syslogging facilities

Dec 15 13:48:05 localhost pkexec[29065]: davidz: Executing command [USER=root] [TTY=/dev/pts/8] [CWD=/root] [COMMAND=/usr/bin/pk-example-frobnicate]

Dec 15 13:49:30 localhost pkexec[29080]: davidz: The value for the SHELL variable was not found the /etc/shells file [USER=root] [TTY=/dev/pts/5] [CWD=/home/davidz] [COMMAND=/bin/bash]

Dec 15 13:49:45 localhost pkexec[29082]: davidz: The value for environment variable LC_ALL contains suscipious content [USER=root] [TTY=/dev/pts/5] [CWD=/home/davidz] [COMMAND=/bin/bash]

Dec 15 13:50:03 localhost pkexec[29086]: davidz: Error executing command as another user: Not authorized [USER=root] [TTY=/dev/pts/5] [CWD=/home/davidz] [COMMAND=/bin/bash]

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoMake pkexec(1) validate environment variables
David Zeuthen [Tue, 15 Dec 2009 18:08:55 +0000 (13:08 -0500)]
Make pkexec(1) validate environment variables

Suggested here

 http://lists.freedesktop.org/archives/polkit-devel/2009-December/000279.html

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoFix error message when no authentication agent is available
David Zeuthen [Tue, 15 Dec 2009 17:19:44 +0000 (12:19 -0500)]
Fix error message when no authentication agent is available

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoProperly handle return value from getpwnam_r()
David Zeuthen [Tue, 15 Dec 2009 17:03:53 +0000 (12:03 -0500)]
Properly handle return value from getpwnam_r()

Pointed out by Kay Sievers - thanks!

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoRemove trailing whitespace from log messages
David Zeuthen [Tue, 15 Dec 2009 17:03:26 +0000 (12:03 -0500)]
Remove trailing whitespace from log messages

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 25594 – System logging
David Zeuthen [Fri, 11 Dec 2009 20:14:49 +0000 (15:14 -0500)]
Bug 25594 – System logging

For now we log the following events

1. Daemon startup -> /var/log/messages
--------------------------------------

Dec 11 15:12:56 localhost polkitd[3035]: started daemon version 0.95 using authority implementation `local' version `0.95'

2. Authentication agent -> /var/log/secure
------------------------------------------

Dec 11 15:14:00 localhost polkitd(authority=local): Registered Authentication Agent for session /org/freedesktop/ConsoleKit/Session1 (system bus name :1.903 [./polkit-gnome-authentication-agent-1], object path /org/gnome/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)

Dec 11 15:16:18 localhost polkitd(authority=local): Unregistered Authentication Agent for session /org/freedesktop/ConsoleKit/Session1 (system bus name :1.903, object path /org/gnome/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) (disconnected from bus)

3. Authorization checks
-----------------------

Dec 11 15:17:57 localhost polkitd(authority=local): ALLOWING action org.freedesktop.policykit.example.pkexec.run-frobnicate for unix-process:2517:25785526 [bash] owned by unix-user:davidz (check requested by system-bus-name::1.905 [pkexec /usr/bin/pk-example-frobnicate])

Dec 11 15:18:10 localhost polkitd(authority=local): ALLOWING action org.freedesktop.udisks.filesystem-mount-system-internal for system-bus-name::1.902 [palimpsest] owned by unix-user:davidz (check requested by system-bus-name::1.380 [/usr/libexec/udisks-daemon])

4. Authorizations through authentication (both success and
   failures) -> /var/log/secure
----------------------------------------------------------

Dec 11 15:19:01 localhost polkitd(authority=local): Operator of unix-session:/org/freedesktop/ConsoleKit/Session1 successfully authenticated as unix-user:davidz to gain TEMPORARY authorization for action org.freedesktop.policykit.example.pkexec.run-frobnicate for unix-process:2517:25785526 [bash] (owned by unix-user:davidz)
Dec 11 15:19:01 localhost polkitd(authority=local): ALLOWING action org.freedesktop.policykit.example.pkexec.run-frobnicate for unix-process:2517:25785526 [bash] owned by unix-user:davidz (check requested by system-bus-name::1.906 [pkexec /usr/bin/pk-example-frobnicate])

Dec 11 15:19:10 localhost polkitd(authority=local): Operator of unix-session:/org/freedesktop/ConsoleKit/Session1 successfully authenticated as unix-user:davidz to gain ONE-SHOT authorization for action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] (owned by unix-user:davidz)
Dec 11 15:19:10 localhost polkitd(authority=local): ALLOWING action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] owned by unix-user:davidz (check requested by system-bus-name::1.908 [pkexec bash])

Dec 11 15:19:10 localhost pkexec: pam_unix(polkit-1:session): session opened for user root by davidz(uid=500)
Dec 11 15:19:22 localhost polkitd(authority=local): Operator of unix-session:/org/freedesktop/ConsoleKit/Session1 FAILED to authenticate to gain authorization for action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] (owned by unix-user:davidz)
Dec 11 15:19:22 localhost polkitd(authority=local): DENYING action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] owned by unix-user:davidz (check requested by system-bus-name::1.910 [pkexec bash])

Dec 11 15:20:06 localhost polkitd(authority=local): Operator of unix-session:/org/freedesktop/ConsoleKit/Session1 successfully authenticated as unix-user:bateman to gain ONE-SHOT authorization for action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] (owned by unix-user:davidz)
Dec 11 15:20:06 localhost polkitd(authority=local): ALLOWING action org.freedesktop.policykit.exec for unix-process:2517:25785526 [bash] owned by unix-user:davidz (check requested by system-bus-name::1.913 [pkexec bash])

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoFix up last comment
David Zeuthen [Fri, 11 Dec 2009 17:42:16 +0000 (12:42 -0500)]
Fix up last comment

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoRun the open_session part of the PAM stack in pkexec(1)
David Zeuthen [Fri, 11 Dec 2009 17:29:45 +0000 (12:29 -0500)]
Run the open_session part of the PAM stack in pkexec(1)

This was pointed out in

http://lists.freedesktop.org/archives/polkit-devel/2009-December/000276.html

We already run the authentication and acct_mgmt parts in the
authentication agent.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoFix logic error in pk-example-frobnicate
David Zeuthen [Fri, 11 Dec 2009 16:35:01 +0000 (11:35 -0500)]
Fix logic error in pk-example-frobnicate

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 25367 — Also read local authority configuration data from /etc
David Zeuthen [Thu, 10 Dec 2009 19:45:10 +0000 (14:45 -0500)]
Bug 25367 — Also read local authority configuration data from /etc

Turns out some people would rather edit local files in /etc rather
than shipping them in a package (as e.g. Fedora does with the
polkit-desktop-policy RPM).

This also drops the hard-coded list of directory names such as
10-vendor.d, 20-org.d - we now monitor the
/var/lib/polkit-1/localauthority and /etc/polkit-1/localauthority
directories for changes - whenever we see a subdirectory in any of
these directories, we create an AuthorizationStore object that looks
for .pkla files.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoUpdate NEWS for release 0.95
David Zeuthen [Fri, 13 Nov 2009 17:28:14 +0000 (12:28 -0500)]
Update NEWS for release

14 years agoFix make distcheck
David Zeuthen [Fri, 13 Nov 2009 17:25:14 +0000 (12:25 -0500)]
Fix make distcheck

14 years agoAdd Python example
David Zeuthen [Fri, 13 Nov 2009 16:41:20 +0000 (11:41 -0500)]
Add Python example

14 years agoProperly validate all arguments passed via D-Bus
David Zeuthen [Fri, 13 Nov 2009 16:36:53 +0000 (11:36 -0500)]
Properly validate all arguments passed via D-Bus

14 years agoClarify pklocalauthority(8) man page
David Zeuthen [Thu, 12 Nov 2009 18:49:35 +0000 (13:49 -0500)]
Clarify pklocalauthority(8) man page

Suggestions from

 https://bugzilla.redhat.com/show_bug.cgi?id=534140

Thanks.

14 years agoRemove TODO about symbol visibility as this has been fixed for a while
David Zeuthen [Wed, 11 Nov 2009 23:00:32 +0000 (18:00 -0500)]
Remove TODO about symbol visibility as this has been fixed for a while

See 6a35bf6132d2d27ed507e894df9ba8d9e0dfc9f9
4a3cdac63bc62497e5a2682772162b2ae60147ed and
784236e9f4ef2688c2c3d9a59494870b8b9d5a6e

14 years agoDrop ununsed policykit actions
David Zeuthen [Wed, 11 Nov 2009 22:55:04 +0000 (17:55 -0500)]
Drop ununsed policykit actions

14 years agoPort lockdown from pklalockdown(1) to D-Bus methods
David Zeuthen [Wed, 11 Nov 2009 22:08:36 +0000 (17:08 -0500)]
Port lockdown from pklalockdown(1) to D-Bus methods

Also rename the action from org.freedesktop.policykit.localauthority.lockdown
to org.freedesktop.policykit.lockdown since any authority implementation
can now implement this.

This changes only ABI/API used by e.g. polkit-gnome. This is fine
since we're not at 1.0 yet.

14 years agoAdd methods AddLockdownForAction() and RemoveLockdownForAction()
David Zeuthen [Wed, 11 Nov 2009 15:46:50 +0000 (10:46 -0500)]
Add methods AddLockdownForAction() and RemoveLockdownForAction()

Now to implement this in the interactive authority...

14 years agoBug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS
Michael Biebl [Wed, 21 Oct 2009 17:13:21 +0000 (13:13 -0400)]
Bug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 24235 – polkit-agent-helper may call pam_end with a stale pam handle
Andreas Sandberg [Wed, 21 Oct 2009 17:09:51 +0000 (13:09 -0400)]
Bug 24235 – polkit-agent-helper may call pam_end with a stale pam handle

polkit-agent-helper calls pam_end on pam_h without setting pam_h to
NULL. This causes the error handler to call pam_end on the stale
handler if the send_dbus_message procedure fails, which in turn
generates a SIGSEGV.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 24640 – Typos in pklocalauthority(8)
Matthias Clasen [Wed, 21 Oct 2009 16:45:04 +0000 (12:45 -0400)]
Bug 24640 – Typos in pklocalauthority(8)

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 24566 – Properly _ref authority in singleton constructor
Alexander Sack [Thu, 15 Oct 2009 17:16:57 +0000 (19:16 +0200)]
Bug 24566 – Properly _ref authority in singleton constructor

http://bugs.freedesktop.org/show_bug.cgi?id=24566

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoBug 24495 – Fails to build on platforms without PATH_MAX (like hurd)
Samuel Thibault [Thu, 15 Oct 2009 20:52:40 +0000 (16:52 -0400)]
Bug 24495 – Fails to build on platforms without PATH_MAX (like hurd)

PATH_MAX, which hurd-i386 doesn't define since it doesn't have such
arbitrary limitation.  The attached patch fixes it by just using
glibc's get_current_dir_name() extension when available.

Signed-off-by: Michael Biebl <mbiebl@gmail.com>
Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoClarify when AllowUserInteraction should and shouldn't be used
David Zeuthen [Tue, 29 Sep 2009 15:57:23 +0000 (11:57 -0400)]
Clarify when AllowUserInteraction should and shouldn't be used

See https://bugzilla.redhat.com/show_bug.cgi?id=526053 for more details.

14 years agoAdd properties with information about the currently used authority
David Zeuthen [Wed, 16 Sep 2009 15:47:34 +0000 (11:47 -0400)]
Add properties with information about the currently used authority

Also bump requirement on EggDBus to 0.6 (to be released later) for a
bug-fix with flag properties.

14 years agoFix process start time when using polkit_unix_process_new_full()
Bastien Nocera [Mon, 14 Sep 2009 17:10:27 +0000 (13:10 -0400)]
Fix process start time when using polkit_unix_process_new_full()

When using polkit_unix_process_new_full() the start-time
wasn't being set from the process' PID if it wasn't
passed to the function.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoClarify comment on where to find process start-time on Linux
David Zeuthen [Mon, 14 Sep 2009 16:06:37 +0000 (12:06 -0400)]
Clarify comment on where to find process start-time on Linux

Also handle 64-bit jiffies (rather than 63-bit) for maximum
correctness.

14 years agoPass --libtool to g-ir-scanner
David Zeuthen [Sun, 13 Sep 2009 18:53:14 +0000 (14:53 -0400)]
Pass --libtool to g-ir-scanner

Without this, builds with --enable-introspection fails in the Fedora
buildsystem.

14 years agoAdd missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE
David Zeuthen [Sun, 13 Sep 2009 17:55:34 +0000 (13:55 -0400)]
Add missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE

14 years agoRemove POLKIT_USER from configuration summary
David Zeuthen [Sun, 13 Sep 2009 17:40:16 +0000 (13:40 -0400)]
Remove POLKIT_USER from configuration summary

14 years agoDon't include Polkit-1.0.gir in the dist tarball
Michael Biebl [Mon, 31 Aug 2009 23:38:28 +0000 (01:38 +0200)]
Don't include Polkit-1.0.gir in the dist tarball

Polkit-1.0.gir is a generated file and only built with
--enable-instrospection. So remove it from EXTRA_DIST, otherwise
"make dist" fails with --disable-introspection.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoRemove POLKIT_USER option
Michael Biebl [Mon, 31 Aug 2009 23:30:54 +0000 (01:30 +0200)]
Remove POLKIT_USER option

PK 1.0 no longer uses a separate user, so remove this ./configure option
which also means we no longer have to mangle the dbus policy file.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoEnable silent rules
Michael Biebl [Mon, 31 Aug 2009 23:18:42 +0000 (01:18 +0200)]
Enable silent rules

Enable silent build rules which were introduced in automake 1.11.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoMake examples optional
Michael Biebl [Mon, 31 Aug 2009 23:16:11 +0000 (01:16 +0200)]
Make examples optional

Add --enable-examples configure switch which allows to disable the
compilation and installation of the examples.
Default is off.

14 years agoMake private symbols accessible to libpolkitagent and libpolkitbackend
Michael Biebl [Mon, 31 Aug 2009 16:19:31 +0000 (18:19 +0200)]
Make private symbols accessible to libpolkitagent and libpolkitbackend

libpolkit{agent,backend} use private symbols from libpolkit-gobject.
As we no longer export them, the build fails.
Move those symbols into a separate noinst lib libpolkit-private, which
those three libs can link against.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoUse _polkit_agent_marshal prefix
Michael Biebl [Mon, 31 Aug 2009 03:08:34 +0000 (05:08 +0200)]
Use _polkit_agent_marshal prefix

Use _polkit_agent_marshal prefix with glib-genmarshal to hide the
(autogenerated) symbols. Update the code accordingly.

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoTrim the list of exported symbols
Michael Biebl [Mon, 31 Aug 2009 03:06:05 +0000 (05:06 +0200)]
Trim the list of exported symbols

Add -export-symbols-regex '(^polkit_.*) to LDFLAGS for libpolkit*

Signed-off-by: David Zeuthen <davidz@redhat.com>
14 years agoImplement lockdown for the Local Authority implementation
David Zeuthen [Sat, 12 Sep 2009 19:49:53 +0000 (15:49 -0400)]
Implement lockdown for the Local Authority implementation

14 years agoBug 23867 – UnixProcess vs. SystemBusName aliasing
David Zeuthen [Fri, 11 Sep 2009 19:35:10 +0000 (15:35 -0400)]
Bug 23867 – UnixProcess vs. SystemBusName aliasing

For now, convert SystemBusName to UnixProcess when storing/checking
temporary authorizations. See

http://git.gnome.org/cgit/PolicyKit-gnome/commit/?id=ad5fe38a1f7a7a670c3d8e9384b9cd0d037c9222

for a test-case for this.

14 years agoSort by action id in pkaction(1) output
David Zeuthen [Fri, 11 Sep 2009 15:35:58 +0000 (11:35 -0400)]
Sort by action id in pkaction(1) output

15 years agoUse correct program name when complaining about not being setuid root
David Zeuthen [Wed, 19 Aug 2009 17:47:01 +0000 (13:47 -0400)]
Use correct program name when complaining about not being setuid root

15 years agoPost-release version bump to 0.95
David Zeuthen [Wed, 12 Aug 2009 19:20:09 +0000 (15:20 -0400)]
Post-release version bump to 0.95

15 years agoUpdate NEWS for release 0.94
David Zeuthen [Wed, 12 Aug 2009 19:14:32 +0000 (15:14 -0400)]
Update NEWS for release

15 years agoGenerate GI gir and typelibs for libpolkit-gobject-1
David Zeuthen [Wed, 12 Aug 2009 18:40:46 +0000 (14:40 -0400)]
Generate GI gir and typelibs for libpolkit-gobject-1

This includes changing from POSIX types (uid_t, gid_t, pid_t) to
gint. Won't affect much since the size is the same. And we want this
anyway since it is needed to build the library on non-POSIX platforms.

15 years agoRemove temporary authorization when the subject it applies to vanishes
David Zeuthen [Wed, 12 Aug 2009 15:52:46 +0000 (11:52 -0400)]
Remove temporary authorization when the subject it applies to vanishes

This makes it easier to write the desktop component showing a
notification icon - said component now only needs to watch ::changed
and reenumerate temporary authorizations. If this is done, then the
notification icon is updated in near-realtime.

Also emit ::changed on ConsoleKit changes. This helps remind
Mechanisms that they should redo an authorization check (if this is
how the Mechanism decides to cache authorizations).

15 years agoDon't set the GError if the process doesn't exist
David Zeuthen [Wed, 12 Aug 2009 15:51:52 +0000 (11:51 -0400)]
Don't set the GError if the process doesn't exist

15 years agoPass the right struct offset for the ::changed class signal handler
David Zeuthen [Wed, 12 Aug 2009 15:51:14 +0000 (11:51 -0400)]
Pass the right struct offset for the ::changed class signal handler

15 years agoBug 23093 – FreeBSD portability fixes
Joe Marcus Clarke [Wed, 12 Aug 2009 14:04:15 +0000 (10:04 -0400)]
Bug 23093 – FreeBSD portability fixes

There are a few issues with building polkit-0.93 on FreeBSD:

 * No clearenv() function on FreeBSD

 * While FreeBSD has a /proc, it is deprecated, and kinfo_proc should
   be used instead.

 * FreeBSD's printf() functions do not support the %m notation.  This
   is only supported for syslog().

  * You can't call GINT_TO_POINTER() on a 64-bit value, as this will
    break on 64-bit OSes.

The attached patch fixes these problems.  First, a check for
clearenv() is added to configure.  Second, I moved the check for
process uid to polkit/polkitunixprocess.c.  This may not be ideal, but
it seems to fit, and reduces code duplication.  Third, I replaces all
%m with %s ... g_strerror (errno).  Finally, I replaced
GINT_TO_POINTER() with GSIZE_TO_POINTER.

Signed-off-by: David Zeuthen <davidz@redhat.com>
15 years agoBe more careful when determining process start time
David Zeuthen [Mon, 10 Aug 2009 14:17:51 +0000 (10:17 -0400)]
Be more careful when determining process start time

15 years agoEnsure all fds except stdin/stdout/stderr are closed after exec(2)
David Zeuthen [Thu, 30 Jul 2009 14:33:03 +0000 (10:33 -0400)]
Ensure all fds except stdin/stdout/stderr are closed after exec(2)

15 years agoAdd polkit.retains_authorization_after_challenge to authz result
David Zeuthen [Tue, 28 Jul 2009 15:25:20 +0000 (11:25 -0400)]
Add polkit.retains_authorization_after_challenge to authz result

Also make this and other details available via methods on the
PolkitAuthorizationResult object.

See this and surrounding messages

 http://lists.freedesktop.org/archives/polkit-devel/2009-July/000189.html

for more information.

15 years agoDon't spawn man(1) from a setuid program
David Zeuthen [Mon, 27 Jul 2009 14:03:34 +0000 (10:03 -0400)]
Don't spawn man(1) from a setuid program

15 years agoAllow unprivileged callers to check authorizations
David Zeuthen [Mon, 27 Jul 2009 02:05:38 +0000 (22:05 -0400)]
Allow unprivileged callers to check authorizations

But only allow this if

 - the caller and the subject being checked is the same user
 - no details are passed (otherwise dialogs can be spoofed)

Also add a RevokeTemporaryAuthorizationById() method.

15 years agoIgnore .pkla files starting with dot and don't segfault on error path
David Zeuthen [Thu, 23 Jul 2009 13:27:47 +0000 (09:27 -0400)]
Ignore .pkla files starting with dot and don't segfault on error path

15 years agoRequire correct versions of glib and eggdbus
David Zeuthen [Tue, 21 Jul 2009 16:56:16 +0000 (12:56 -0400)]
Require correct versions of glib and eggdbus

Pointed out by Michael Biebl, thanks.

15 years agoPost-release version bump to 0.94
David Zeuthen [Tue, 21 Jul 2009 00:26:05 +0000 (20:26 -0400)]
Post-release version bump to 0.94

15 years agoUpdate NEWS for release 0.93
David Zeuthen [Tue, 21 Jul 2009 00:03:58 +0000 (20:03 -0400)]
Update NEWS for release

15 years agoUpdate TODO
David Zeuthen [Mon, 20 Jul 2009 23:43:29 +0000 (19:43 -0400)]
Update TODO

15 years agoFix make distcheck
David Zeuthen [Mon, 20 Jul 2009 23:07:30 +0000 (19:07 -0400)]
Fix make distcheck

15 years agoAdd support for querying and revoking temporary authorizations
David Zeuthen [Mon, 20 Jul 2009 22:49:25 +0000 (18:49 -0400)]
Add support for querying and revoking temporary authorizations

Also change how authentication agents are registered (take a Subject
instead of the session-id) and add convenience functions to
asynchronously construct a PolkitUnixSession object given a process id
(by querying ConsoleKit).

15 years agoAdd docs detailing how the Local Authority works
David Zeuthen [Wed, 15 Jul 2009 22:56:18 +0000 (18:56 -0400)]
Add docs detailing how the Local Authority works

15 years agoRename some man pages and the daemon binary
David Zeuthen [Wed, 15 Jul 2009 21:08:41 +0000 (17:08 -0400)]
Rename some man pages and the daemon binary

15 years agoIn .pkla files, use Result{Any,Inactive,Active} instead of just Result
David Zeuthen [Wed, 15 Jul 2009 20:20:08 +0000 (16:20 -0400)]
In .pkla files, use Result{Any,Inactive,Active} instead of just Result

15 years agoActually make the local authority look up authorization files
David Zeuthen [Wed, 15 Jul 2009 19:21:35 +0000 (15:21 -0400)]
Actually make the local authority look up authorization files

Still need to add test cases / docs but this seems to work great.

15 years agoAlso pass the identity of the subject we are checking for
David Zeuthen [Wed, 15 Jul 2009 17:13:05 +0000 (13:13 -0400)]
Also pass the identity of the subject we are checking for

15 years agoMove authentication agent bits to separate authority subclass
David Zeuthen [Wed, 15 Jul 2009 16:48:32 +0000 (12:48 -0400)]
Move authentication agent bits to separate authority subclass

15 years agoRip out polkit-local and refactor local authority to only use tmp authz
David Zeuthen [Wed, 15 Jul 2009 15:17:25 +0000 (11:17 -0400)]
Rip out polkit-local and refactor local authority to only use tmp authz

15 years agoMove local authority management to a separate library
David Zeuthen [Mon, 13 Jul 2009 16:59:46 +0000 (12:59 -0400)]
Move local authority management to a separate library

15 years agoPlug a couple of memory leaks
David Zeuthen [Sat, 4 Jul 2009 23:32:34 +0000 (19:32 -0400)]
Plug a couple of memory leaks

15 years agoCancel an authentication if the unique name for the subject vanishes
David Zeuthen [Fri, 19 Jun 2009 15:47:46 +0000 (11:47 -0400)]
Cancel an authentication if the unique name for the subject vanishes

This makes it easier to write mechanisms as they don't have to watch
for the client requesting service vanishing.

15 years agoGIO modules need to be prefix with lib
David Zeuthen [Wed, 17 Jun 2009 19:31:28 +0000 (15:31 -0400)]
GIO modules need to be prefix with lib

For some weird reason.

15 years agoMore unique ids to get the docs build fully predictable
Yanko Kaneti [Tue, 16 Jun 2009 20:38:52 +0000 (23:38 +0300)]
More unique ids to get the docs build fully predictable

15 years agoUse unique ids for sections to prevent them being autogenerated
Yanko Kaneti [Tue, 16 Jun 2009 17:26:49 +0000 (13:26 -0400)]
Use unique ids for sections to prevent them being autogenerated

Signed-off-by: David Zeuthen <davidz@redhat.com>
15 years agoPost-release version bump to 0.93
David Zeuthen [Mon, 8 Jun 2009 21:16:18 +0000 (17:16 -0400)]
Post-release version bump to 0.93

15 years agoAlso dist polkitd-1.xml 0.92
David Zeuthen [Mon, 8 Jun 2009 20:30:15 +0000 (16:30 -0400)]
Also dist polkitd-1.xml

15 years agoUpdate NEWS
David Zeuthen [Mon, 8 Jun 2009 20:01:49 +0000 (16:01 -0400)]
Update NEWS

15 years agoFix make distcheck
David Zeuthen [Mon, 8 Jun 2009 19:56:06 +0000 (15:56 -0400)]
Fix make distcheck

15 years agoChange GNOME to freedesktop.org in the docs
David Zeuthen [Mon, 8 Jun 2009 19:00:17 +0000 (15:00 -0400)]
Change GNOME to freedesktop.org in the docs

15 years agoMove the doc chapters around a bit
David Zeuthen [Mon, 8 Jun 2009 18:57:35 +0000 (14:57 -0400)]
Move the doc chapters around a bit

15 years agoMinor doc fixes
David Zeuthen [Mon, 8 Jun 2009 18:48:41 +0000 (14:48 -0400)]
Minor doc fixes

15 years agoUse .../extensions instead of ../backends for loading extensions
David Zeuthen [Mon, 8 Jun 2009 18:21:27 +0000 (14:21 -0400)]
Use .../extensions instead of ../backends for loading extensions

15 years agoExpand on the D-Bus docs
David Zeuthen [Mon, 8 Jun 2009 18:20:55 +0000 (14:20 -0400)]
Expand on the D-Bus docs

15 years agoConsolidate all gtk-doc stuff in docs/polkit
David Zeuthen [Mon, 8 Jun 2009 17:11:13 +0000 (13:11 -0400)]
Consolidate all gtk-doc stuff in docs/polkit

15 years agoAdd a "PolicyKit Overview" section to the docs
David Zeuthen [Mon, 8 Jun 2009 16:35:56 +0000 (12:35 -0400)]
Add a "PolicyKit Overview" section to the docs

15 years agoAdd some more API docs
David Zeuthen [Mon, 8 Jun 2009 14:53:36 +0000 (10:53 -0400)]
Add some more API docs

15 years agoImprove pkexec(1) man page by adding screenshots of authentication dialogs
David Zeuthen [Fri, 5 Jun 2009 20:43:28 +0000 (16:43 -0400)]
Improve pkexec(1) man page by adding screenshots of authentication dialogs

15 years agoFirst cut at some high-level docs
David Zeuthen [Fri, 5 Jun 2009 20:11:27 +0000 (16:11 -0400)]
First cut at some high-level docs

15 years agoAdd a man page for polkit-1(8)
David Zeuthen [Wed, 3 Jun 2009 17:11:30 +0000 (13:11 -0400)]
Add a man page for polkit-1(8)

15 years agoUpdate SEE ALSO sections in man pages
David Zeuthen [Wed, 3 Jun 2009 16:44:39 +0000 (12:44 -0400)]
Update SEE ALSO sections in man pages

15 years agoAdd pkaction(1) and nuke polkit-1(1) commands
David Zeuthen [Wed, 3 Jun 2009 16:36:03 +0000 (12:36 -0400)]
Add pkaction(1) and nuke polkit-1(1) commands

All the functionality of polkit-1(1), sans managing the local
authority, is now available in pkaction(1) and pkcheck(1). In the
future we might want to add something like pklamanage(1) to manage the
local authority.

15 years agoReturn the icon name instead of a GIcon in PolkitActionDescription
David Zeuthen [Tue, 2 Jun 2009 16:25:17 +0000 (12:25 -0400)]
Return the icon name instead of a GIcon in PolkitActionDescription

15 years agonullbackend: Catch up with latest API changes
David Zeuthen [Tue, 2 Jun 2009 16:24:48 +0000 (12:24 -0400)]
nullbackend: Catch up with latest API changes

15 years agoAdd pkcheck(1) command to check for authorizations
David Zeuthen [Fri, 29 May 2009 15:12:05 +0000 (11:12 -0400)]
Add pkcheck(1) command to check for authorizations

This is just a simple wrapper for the CheckAuthorization() D-Bus method.

See these messages

 https://www.redhat.com/archives/fedora-devel-list/2009-May/msg01364.html
 https://www.redhat.com/archives/fedora-devel-list/2009-May/msg01397.html

where this helper was discussed - it may make it a lot easier to use
polkit from code that pretends to care about OOM conditions.

15 years agoClarify docs for is_challenge member of the AuthorizationResult struct
David Zeuthen [Fri, 29 May 2009 15:11:03 +0000 (11:11 -0400)]
Clarify docs for is_challenge member of the AuthorizationResult struct