1. 03 Jun, 2015 1 commit
  2. 19 Feb, 2014 1 commit
  3. 23 May, 2012 1 commit
  4. 24 Apr, 2012 1 commit
  5. 20 Dec, 2011 1 commit
  6. 21 Feb, 2011 1 commit
  7. 27 Jan, 2009 1 commit
  8. 21 Jan, 2009 1 commit
  9. 07 Dec, 2008 1 commit
  10. 06 Nov, 2008 1 commit
  11. 31 Jul, 2008 2 commits
    • David Zeuthen's avatar
      add backend daemon · 08df7620
      David Zeuthen authored
      It's not right useful right now; it only says Hello() like a parrot
      
       $ dbus-send --print-reply --system --dest=org.freedesktop.PolicyKit.Backend / org.freedesktop.PolicyKit.Backend.Hello string:Hi!
       method return sender=:1.5180 -> dest=:1.5188 reply_serial=2
          string "You said 'Hi!'"
      08df7620
    • David Zeuthen's avatar
      bump to version 0.90 and ensure we're parallel installable with 0.9 · 2a356677
      David Zeuthen authored
      This is the first move towards 1.0; also
      
       - kill the config file
       - merge libpolkit and libpolkit-dbus
      
      Now to write a system daemon that libpolkit will use for the
      backend. Expect HEAD to be broken for a few weeks at least.
      
      Also see http://ometer.com/parallel.html for what "parallel
      installable" means. As a result, all the binaries, man pages, .policy
      file dir and so forth have been renamed too. I expect the API to
      change a bit. So some (not much though) porting to PolicyKit 1.0 will
      be required by current users.
      2a356677
  12. 12 Nov, 2007 2 commits
  13. 11 Nov, 2007 1 commit
  14. 10 Nov, 2007 1 commit
  15. 08 Nov, 2007 1 commit
  16. 03 Nov, 2007 1 commit
    • David Zeuthen's avatar
      add unit test framework with gcov coverage support (make check-coverage) · 1d037a7b
      David Zeuthen authored
      This is what it looks like
      
      ==============================================================================
      Test coverage for module polkit:
      ==============================================================================
      polkit-sysdeps.c                                        :   0% (0 of 38)
      polkit-error.c                                          :   0% (0 of 44)
      polkit-result.c                                         :   0% (0 of 16)
      polkit-context.c                                        :   0% (0 of 213)
      polkit-action.c                                         :  34% (20 of 58)
      polkit-seat.c                                           :   0% (0 of 34)
      polkit-session.c                                        :   0% (0 of 97)
      polkit-caller.c                                         :   0% (0 of 81)
      polkit-policy-file-entry.c                              :   0% (0 of 72)
      polkit-policy-file.c                                    :   0% (0 of 220)
      polkit-policy-cache.c                                   :   0% (0 of 98)
      polkit-policy-default.c                                 :   0% (0 of 67)
      polkit-debug.c                                          :   0% (0 of 15)
      polkit-utils.c                                          :   0% (0 of 42)
      polkit-config.c                                         :   0% (0 of 263)
      polkit-authorization.c                                  :   0% (0 of 162)
      polkit-authorization-constraint.c                       :   0% (0 of 107)
      polkit-authorization-db.c                               :   0% (0 of 222)
      
      Source lines          : 6919
      Actual statements     : 1849
      Executed statements   : 20
      Test coverage         : 1%
      1d037a7b
  17. 31 Oct, 2007 1 commit
    • David Zeuthen's avatar
      provide a polkit D-Bus service that is activated on demand · 871e4c93
      David Zeuthen authored
      Right now we provide two methods
      
       IsProcessAuthorized
       IsSystemBusNameAuthorized
      
      This is useful for a couple of reasons
      
       - some mechanisms (e.g. Avahi) runs in a chroot and their only
         life-line to the world is a system bus connection. If it were to
         use libpolkit (and Lennart says he wants it to, yay!) it would need
         to bindmount crazy stuff into the chroot.
      
       - languages for which libpolkit bindings not yet exist can use
         this interface
      
      Going forward, this service can expose a private interface meaning we
      can get rid of (almost) all of our setgid helpers.
      871e4c93
  18. 28 Oct, 2007 1 commit
    • David Zeuthen's avatar
      rewrite authorization database and polkit-grant (now known as polkit-auth) · bed2fe1c
      David Zeuthen authored
      Also,
      
       - Rename polkit-list-actions to polkit-action.
       - Add a bash completion script to the polkit commandline tools.
      
      Authorizations are no longer world-readable. So for this to work with
      hal you now need to do this as root
      
       # polkit-auth --user haldaemon --grant org.freedesktop.policykit.read
      
      Distributions needs to do this in the %post scripts or similar.
      
      Sorry for this huge monster patch.
      bed2fe1c
  19. 31 Aug, 2007 1 commit
  20. 12 Jul, 2007 1 commit
  21. 17 Apr, 2007 1 commit
  22. 15 Apr, 2007 1 commit
    • David Zeuthen's avatar
      add grant functionality + lots of other changes · a0570c50
      David Zeuthen authored
       - Split libpolkit into three libraries
         - libpolkit : to be used only by mechanisms and modules
         - libpolkit-dbus : utility library for libpolkit to get caller, session
                            etc. info from the bus and ConsoleKit
         - libpolkit-grant : client side library for obtaining privileges; uses
                             a setgid helper internally
      
       - grant functionality
         - a helper library, libpolkit-grant, to gain privileges
           - includes a setgid $POLKIT_GROUP helper to write granted privileges
         - a PK module, to read and interpret granted privileges
         - a cmdline app, polkit-grant, using said library
      
       - Other changes
         - so it turns out that sizeof(bool) != sizeof(gboolean), sizeof(dbus_bool_t)
           This blows so define our own polkit_bool_t type
         - add some validation routines
      
      The grant functionality, especially the setgid helper needs thorough
      security review before we can release it.
      a0570c50
  23. 08 Apr, 2007 5 commits
    • David Zeuthen's avatar
      mass renaming of classes · ce556c72
      David Zeuthen authored
       Privilege -> Action
       PrivilegeFile -> PolicyFile
       PrivilegeFileEntry -> PolicyFileEntry
       PrivilegeCache -> PolicyCache
      
      Hopefully it makes a bit more sense now.
      ce556c72
    • David Zeuthen's avatar
      fix up Makefile.am · 8035e5d1
      David Zeuthen authored
      8035e5d1
    • David Zeuthen's avatar
      generate and dist ChangeLog · d140ff6a
      David Zeuthen authored
      d140ff6a
    • David Zeuthen's avatar
      stop disting ChangeLog and start disting modules/PolicyKit.conf · 0973db30
      David Zeuthen authored
      Am happy to report that 'make distcheck' now works!
      0973db30
    • David Zeuthen's avatar
      add module loading to PolicyKit · 3638c6c1
      David Zeuthen authored
      This paves the way for writing
      
       1. A module that tracks temporary (look in /var/run) and permanent (look
          in /var/lib) privilege grants
       2. A D-Bus service to authenticate a client to obtain to a privilege
          grant and then writing the grant in temporary or permanent storage
      
      Also, this feature lets people very easily lock down the system; just
      edit /etc/PolicyKit/PolicyKit.conf; add pam-module-deny-all / -allow-all
      stanzas with various privilege=<regexp> and user=<username> options.
      3638c6c1
  24. 06 Apr, 2007 1 commit
  25. 28 Mar, 2007 1 commit
  26. 28 Jul, 2006 1 commit
  27. 05 Jun, 2006 1 commit
  28. 14 Mar, 2006 1 commit
  29. 08 Mar, 2006 1 commit