- 17 Apr, 2007 1 commit
-
-
David Zeuthen authored
It's more consistent and, uhm, easier to type.
-
- 15 Apr, 2007 1 commit
-
-
David Zeuthen authored
- Split libpolkit into three libraries - libpolkit : to be used only by mechanisms and modules - libpolkit-dbus : utility library for libpolkit to get caller, session etc. info from the bus and ConsoleKit - libpolkit-grant : client side library for obtaining privileges; uses a setgid helper internally - grant functionality - a helper library, libpolkit-grant, to gain privileges - includes a setgid $POLKIT_GROUP helper to write granted privileges - a PK module, to read and interpret granted privileges - a cmdline app, polkit-grant, using said library - Other changes - so it turns out that sizeof(bool) != sizeof(gboolean), sizeof(dbus_bool_t) This blows so define our own polkit_bool_t type - add some validation routines The grant functionality, especially the setgid helper needs thorough security review before we can release it.
-
- 09 Apr, 2007 1 commit
-
-
David Zeuthen authored
This paves the way for getting rid of a glib dependency; when and if that happens is to be determined; right now it just doesn't make a lot of sense to reimplement GKeyFile, GSList, GHashTable, g_spawn_sync and other useful routines. But it might make sense if we want to get the message bus daemon to link with libpolkit so you e.g. can say <policy polkit="acme-frobnicate"> <allow send_interface="com.acme.Frobnicator" </policy> to allow a caller on the system message bus to access that interface if, and only if, he can do the "acme-frobnicate" action according to PolicyKit.
-
- 08 Apr, 2007 3 commits
-
-
David Zeuthen authored
Privilege -> Action PrivilegeFile -> PolicyFile PrivilegeFileEntry -> PolicyFileEntry PrivilegeCache -> PolicyCache Hopefully it makes a bit more sense now.
-
David Zeuthen authored
-
David Zeuthen authored
This paves the way for writing 1. A module that tracks temporary (look in /var/run) and permanent (look in /var/lib) privilege grants 2. A D-Bus service to authenticate a client to obtain to a privilege grant and then writing the grant in temporary or permanent storage Also, this feature lets people very easily lock down the system; just edit /etc/PolicyKit/PolicyKit.conf; add pam-module-deny-all / -allow-all stanzas with various privilege=<regexp> and user=<username> options.
-