1. 02 Apr, 2020 1 commit
  2. 07 Oct, 2019 1 commit
  3. 14 Sep, 2019 1 commit
  4. 19 May, 2019 1 commit
  5. 06 Nov, 2018 1 commit
  6. 25 Sep, 2018 1 commit
  7. 12 Sep, 2018 1 commit
  8. 23 Aug, 2018 1 commit
  9. 04 Sep, 2017 1 commit
  10. 24 Apr, 2017 1 commit
  11. 13 Feb, 2017 1 commit
  12. 09 Aug, 2016 1 commit
  13. 15 Apr, 2016 1 commit
  14. 25 Jan, 2016 2 commits
  15. 21 Nov, 2015 1 commit
  16. 18 Nov, 2015 1 commit
  17. 16 Nov, 2015 1 commit
  18. 06 Oct, 2015 1 commit
  19. 28 Aug, 2015 1 commit
  20. 04 Jun, 2013 1 commit
  21. 03 Jun, 2013 1 commit
  22. 13 May, 2013 1 commit
    • Miloslav Trmač's avatar
      Don't spawn man for --help · e8e18d18
      Miloslav Trmač authored
      Convert pkaction and pkttyagent to use GOptionContext.
      
      Don't convert pkcheck and only add --help output text because its
      non-standard --details(which requires two arguments) can't be
      implemented using GOptionContext.
      
      Don't touch pkexec, in a (futile?) attempt to minimize the amount
      of complex code running before authentication.
      
      This leaves the option processing lax as it was (e.g. accepting
      contradicting options, ignoring non-option arguments), and should only
      affect the handling of --help and behavior when invalid arguments are
      detected.
      
      https://bugs.freedesktop.org/show_bug.cgi?id=29936
      e8e18d18
  23. 23 May, 2012 1 commit
  24. 20 Apr, 2011 1 commit
  25. 03 Mar, 2011 1 commit
    • David Zeuthen's avatar
      Deprecated PolkitBackendActionLookup · 02cebdb0
      David Zeuthen authored
      
      
      Instead, pass the untranslated message as polkit.message and set the
      gettext domain on polkit.gettext_domain. For printf()-style messages,
      occurences of the form $(name_of_key) in the translated version of
      polkit.message are expanded with the value of the property
      name_of_key. See the pkexec(1) mechanism for an example of how to use
      this.
      
      Additionally, the property polkit.icon_name can be set to the
      icon. Note that not all authentication agents use this - in
      particular, gnome-shell does not.
      
      It is no longer possible to set the details to be shown in the
      authentication dialog. It was never a good idea to hide information
      there anyway. Instead, the mechanism should format a meaningful
      message.
      Signed-off-by: default avatarDavid Zeuthen <davidz@redhat.com>
      02cebdb0
  26. 13 Nov, 2009 1 commit
  27. 15 May, 2009 1 commit
  28. 27 Jan, 2009 1 commit
  29. 07 Dec, 2008 1 commit
    • David Zeuthen's avatar
      port the .policy file parser and implement EnumerateActions · 14013ef2
      David Zeuthen authored
      Also added Danish translations to test that translations work
      
      $ dbus-send --system --print-reply --dest=org.freedesktop.PolicyKit1 /org/freedesktop/PolicyKit1/Authority org.freedesktop.PolicyKit1.Authority.EnumerateActions string:da
      method return sender=:1.4481 -> dest=:1.4483 reply_serial=2
         array [
            struct {
               string "org.freedesktop.policykit.modify-defaults"
               string "Konfigurer implicit autorisering"
               string "Autentificering er påkrævet for ændre implicit autorisering"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
            struct {
               string "org.freedesktop.policykit.read"
               string "Læs andre brugers autoriseringer"
               string "Autentificering er påkrævet for at læse andre brugers autoriseringer"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
                  dict entry(
                     string "org.freedesktop.PolicyKit.run-as-superuser.path"
                     string "/usr/bin/BlahBlaster"
                  )
               ]
            }
            struct {
               string "org.freedesktop.policykit.grant"
               string "Autoriser en anden bruger"
               string "Autentificering er påkrævet for at autorisere andre brugere"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
            struct {
               string "org.freedesktop.policykit.revoke"
               string "Fjern autorisering fra en anden bruger"
               string "Autentificering er påkrævet for at fjerne en autosering fra en anden bruger"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
         ]
      
      $ dbus-send --system --print-reply --dest=org.freedesktop.PolicyKit1 /org/freedesktop/PolicyKit1/Authority org.freedesktop.PolicyKit1.Authority.EnumerateActions string:
      method return sender=:1.4481 -> dest=:1.4484 reply_serial=2
         array [
            struct {
               string "org.freedesktop.policykit.modify-defaults"
               string "Modify defaults for implicit authorizations"
               string "Authentication is required to modify the defaults for implicit authorizations"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
            struct {
               string "org.freedesktop.policykit.read"
               string "Read authorizations of other users"
               string "Authentication is required to read authorizations of other users"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
                  dict entry(
                     string "org.freedesktop.PolicyKit.run-as-superuser.path"
                     string "/usr/bin/BlahBlaster"
                  )
               ]
            }
            struct {
               string "org.freedesktop.policykit.grant"
               string "Grant authorizations to other users"
               string "Authentication is required to grant authorizations to other users"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
            struct {
               string "org.freedesktop.policykit.revoke"
               string "Revoke authorizations from other users"
               string "Authentication is required to revoke authorizations other users"
               string "The PolicyKit Project"
               string "http://hal.freedesktop.org/docs/PolicyKit/"
               string ""
               array [
               ]
            }
         ]
      14013ef2
  30. 06 Nov, 2008 1 commit
  31. 28 Oct, 2007 1 commit
    • David Zeuthen's avatar
      rewrite authorization database and polkit-grant (now known as polkit-auth) · bed2fe1c
      David Zeuthen authored
      Also,
      
       - Rename polkit-list-actions to polkit-action.
       - Add a bash completion script to the polkit commandline tools.
      
      Authorizations are no longer world-readable. So for this to work with
      hal you now need to do this as root
      
       # polkit-auth --user haldaemon --grant org.freedesktop.policykit.read
      
      Distributions needs to do this in the %post scripts or similar.
      
      Sorry for this huge monster patch.
      bed2fe1c