summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorVincent Mihalkovic <vmihalko@redhat.com>2022-03-17 13:12:27 +0100
committerVincent Mihalkovic <vmihalko@redhat.com>2022-03-21 15:27:11 +0100
commit074b2d548daa240032ec7267bdedc2afb740c696 (patch)
tree04b16d345710e142ff89213fa743bc8a00f4c448
parentb10a1bdb697045db40774f2a9a8c58ae5c7189c3 (diff)
downloadpolkit-074b2d548daa240032ec7267bdedc2afb740c696.tar.gz
docs: transform repo doc files to Markdown
-rw-r--r--HACKING.md (renamed from HACKING)37
-rw-r--r--Makefile.am2
-rw-r--r--NEWS1593
-rw-r--r--NEWS.md1596
-rw-r--r--README.md (renamed from README)23
-rw-r--r--configure.ac2
6 files changed, 1630 insertions, 1623 deletions
diff --git a/HACKING b/HACKING.md
index 2befb00..d6cee62 100644
--- a/HACKING
+++ b/HACKING.md
@@ -3,45 +3,47 @@ SCM
- anonymous checkouts
- $ git clone git://git.freedesktop.org/git/PolicyKit.git
+ `$ git clone git://git.freedesktop.org/git/PolicyKit.git`
- checkouts if you got an ssh account on fd.o (username@ is optional)
- $ git clone ssh://[username@]git.freedesktop.org/git/PolicyKit.git
+ `$ git clone ssh://[username@]git.freedesktop.org/git/PolicyKit.git`
- commit to local repository
- $ git commit -a
+ `$ git commit -a`
- push local repository to master repository at fd.o (remember most patches
requires review at the mailing list)
- $ git push
+ `$ git push`
- pull changes from master repository at fd.o
- $ git pull
+ `$ git pull`
- diff of working tree versus local repository
- $ git diff
+ `$ git diff`
- diff of local repository vs. master repository at fd.o
synchronize with upstream repo:
- $ git pull
+ `$ git pull`
(possibly merge changes)
generate the diff:
- $ git diff origin HEAD
+ `$ git diff origin HEAD`
- influential environment variables (set these in e.g. .bash_profile)
+```bash
export GIT_AUTHOR_NAME='Your Full Name'
export GIT_COMMITTER_NAME='Your Full Name'
export GIT_COMMITTER_EMAIL=youremail@domain.net
export GIT_AUTHOR_EMAIL=youremail@domain.net
+```
- see also
@@ -54,13 +56,15 @@ Committing code
- Commit messages should be of the form (the five lines between the
lines starting with ===)
-=== begin example commit ===
-short explanation of the commit
-
-Longer explanation explaining exactly what's changed, whether any
-external or private interfaces changed, what bugs were fixed (with bug
-tracker reference if applicable) and so forth. Be concise but not too brief.
-=== end example commit ===
+> === **begin example commit** ===
+> short explanation of the commit
+>
+>
+>
+> Longer explanation explaining exactly what's changed, whether any
+> external or private interfaces changed, what bugs were fixed (with bug
+> tracker reference if applicable) and so forth. Be concise but not too brief.
+> === **end example commit** ===
- Always add a brief description of the commit to the _first_ line of
the commit and terminate by two newlines (it will work without the
@@ -75,6 +79,7 @@ tracker reference if applicable) and so forth. Be concise but not too brief.
sent to a mailing list it's copied from there.
- When committing code on behalf of others use the --author option, e.g.
+ ```bash
git commit -a --author "Joe Coder <joe@coder.org>"
Coding Style
@@ -99,5 +104,5 @@ Code of Conduct, based on the Contributor Covenant. Please conduct
yourself in a respectful and civilized manner when using the above
mailing lists, bug trackers, etc:
- https://www.freedesktop.org/wiki/CodeOfConduct
+ `https://www.freedesktop.org/wiki/CodeOfConduct`
diff --git a/Makefile.am b/Makefile.am
index bfdfa8c..1ac687a 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -9,7 +9,7 @@ endif
NULL =
EXTRA_DIST = \
- HACKING \
+ HACKING.md \
meson.build \
meson_options.txt \
meson_post_install.py \
diff --git a/NEWS b/NEWS
deleted file mode 100644
index d2753ef..0000000
--- a/NEWS
+++ /dev/null
@@ -1,1593 +0,0 @@
---------------
-polkit 0.120
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-
-NOTICE:
-This is the LAST version to support AUTOTOOLS build system, as it has been obsoleted
-by meson build system.
-The next release of polkit will REQUIRE meson build system.
-
-
-Highlights:
- tarball fix-ups
- re-enabled documentation
- Intltool to gettext migration
- new translations
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-78
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
- gettext
- meson (optional)
- autotools (DEPRECATED)
-
-Changes since polkit 0.119:
-
- Inigo Martinez:
- transition from Intltool to gettext
-
- Simon McVittie:
- several tarball, meson and pipeline fixups
-
- Hugo Carvalho:
- Portuguese translation
-
- Sergiu Bivol:
- Romanian translation
-
-
-Many thanks to all contributors!
-
-Jan Rybar et al.,
-September 30, 2021
-
-
---------------
-polkit 0.119
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.119.
-
-Highlights:
- meson build system added
- CVE-2021-3560 mitigation
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-78
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.118:
-
- Inigo Martinez:
- meson build system added alongside autotools (many thanks!!)
-
- Matthias Classen:
- properties in text listener
-
- René Genz:
- typos fixups
-
- Balázs Úr:
- Update Hungarian translation
-
- Hendrik Werner:
- meson post-install script mod to avoid calling external processes
-
- Kevin Backhouse, Jan Rybar:
- CVE-2021-3560 mitigation
-
-Many thanks to all contributors!
-
-Jan Rybar et al.,
-June 3, 2021
-
---------------
-polkit 0.118
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.118.
-
-Highlights:
- move to mozjs78
- tarball CI fix
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-78
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.117:
-
- Xi Ruoyao:
- tarball fixup for distcheck
-
- Valentin David:
- updated dependency to mozjs78
-
-Many thanks to all contributors!
-
-Jan Rybar et al.,
-September 8, 2020
-
---------------
-polkit 0.117
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.117.
-
-Highlights:
- Gitlab CI activation - all merge requests are tested before merged
- New Norwegian translation, several other language updates
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-68
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.116:
-
- Bastien Nocera:
- Activated Gitlab CI
-
- Xi Ruoyao:
- Updated dependency to mozjs68
-
- Kalev Lember, Jan Rybar
- Memory management fixes
-
- Anders Jonsson, Karl Ove Hufthammer, Andika Triwidada, Yuri Chornoivan:
- Language updates
-
-Many thanks to all contributors!
-
-Jan Rybar et al.,
-July 24, 2020
-
---------------
-polkit 0.116
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.116.
-
-Highlights:
- Fix of CVE-2018-19788, high UIDs caused overflow in polkit;
- Fix of CVE-2019-6133, kernel vulnerability (Slowfork) allowed local privilege escalation.
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-60
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.115:
-
- Kyle Walker:
- Leaking zombie child processes
-
- Jan Rybar:
- Possible resource leak found by static analyzer
- Output messages tuneup
- Sanity fixes
- pkttyagent tty echo disabled on SIGINT
-
- Ray Strode:
- HACKING: add link to Code of Conduct
-
- Philip Withnall:
- polkitbackend: comment typos fix
-
- Zbigniew Jędrzejewski-Szmek:
- configure.ac: fix detection of systemd with cgroups v2
- CVE-2018-19788 High UIDs overflow fix
-
- Colin Walters:
- CVE-2019-6133 Slowfork vulnerability fix
-
- Matthew Leeds:
- Allow unset process-uid
-
- Emmanuele Bassi
- Port the JS authority to mozjs-60
-
- Göran Uddeborg:
- Use JS_EncodeStringToUTF8
-
-Many thanks to all contributors!
-
-Jan Rybar et al.,
-April 25, 2019
-
----------------
-polkit 0.115
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.115.
-
-Highlights:
- Fixes CVE-2018-1116, a local information disclosure and denial of service
- caused by trusting client-submitted UIDs when referencing processes.
- Thanks to Matthias Gerstner of the SUSE security team for reporting
- this issue.
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-52
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.114:
-
-Miloslav Trmač (1):
- Fix CVE-2018-1116: Trusting client-supplied UID
-
-Ray Strode (3):
- Post-release version bump to 0.115
- jsauthority: pass "%s" format string to remaining report function
- NEWS: fix date from 2017 to 2018 for 0.114 entry
-
-Thanks to our contributors.
-
-Colin Walters and Miloslav Trmač,
-July 10, 2018
-
---------------
-polkit 0.114
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.114.
-
-Highlights:
- Port to mozjs 52, the latest version of the firefox JavaScript engine.
-
- Add gettext support for policy files
-
- Fixes for various memory leaks
-
-Build requirements
-
- glib, gobject, gio >= 2.32
- mozjs-52
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.113:
-
-Anders Jonsson (2):
- pkcheck: fix man typos
- Add Swedish translation
-
-Antoine Jacoutot (1):
- Add support for OpenBSD
-
-Christian Kirbach (1):
- Add German translation
-
-Colin Walters (3):
- build: Pull in GCC warning infra from ostree
- build: Use AC_USE_SYSTEM_EXTENSIONS
- tests: Correct boundary test for overflow
-
-Dariusz Gadomski (2):
- Fix multi-line pam text info.
- Refactor send_to_helper usage
-
-Gabor Kelemen (1):
- Add initial Hungarian translation, and add hu to LINGUAS
-
-Jeremy Linton (5):
- change mozjs interface module to c++
- Switch to hard requiring mozjs24
- Fix warnings caused by building with C++
- Replace autocompartment
- test: Add a test case to handle actions without explicit rules
-
-Jiří Klimeš (1):
- trivial: fix deprecated indication for polkit_agent_register_listener()
-
-Matthias Clasen (1):
- Add gettext support for .policy files
-
-Miloslav Trmač (21):
- Post-release version bump to 0.114
- Consistently use HAVE_NETGROUP_H instead of HAVE_OPENBSD
- Fix a memory leak of PolkitAgentListener's Server object
- Remove polkitbackendconfigsource.[ch]
- Add Slovak translation by Dusan Kazik <prescott66@gmail.com>
- Add Indonesian translation by Andika Triwidada
- Add Chinese (Taiwan) translation
- Fix a typo in polkit(8)
- Simplify GVariant reference counting
- Fix a memory leak on an error path of lookup_asv (twice)
- Fix a memory leak in server_handle_register_authentication_agent_with_options
- Fix a memory leak in server_handle_unregister_authentication_agent
- Fix a memory leak in server_handle_authentication_agent_response{,2}
- Fix memory leaks in server_handle_*_temporary_authorizations
- Fix error handling in polkit_authority_enumerate_temporary_authorizations_finish
- Fix a memory leak per agent authentication
- Fix a memory leak on agent authentication cancellation
- Audit and fix GVariant reference counting
- Fix help for (pkttyagent -s)
- Fix a race condition when terminating runaway_killer_thread
- Move to current GLib
-
-Mingye Wang (Arthur2e5) (1):
- Add zh_CN translation
-
-Muhammet Kara (1):
- Added Turkish translation
-
-OBATA Akio (1):
- Add support for NetBSD
-
-Peter Hutterer (1):
- gettext: switch to default-translate "no"
-
-Philip Withnall (3):
- polkit: Add g_autoptr() support for GObject-derived polkit types
- data: Set GIO_USE_VFS=local in the environment
- polkitbackend: Fix typos in a couple of initialisation error messages
-
-Piotr Drąg (1):
- Add Polish translation
-
-Rafael Fontenelle (1):
- Add Brazilian Portuguese translation
-
-Ray Strode (34):
- configure: bump mozjs requirement to 52
- jsauthority: fix how classes are defined
- jsauthority: use JS_FN instead of JS_FS
- jsauthority: get rid of JSRuntime
- jsauthority: change how setVersion is called
- jsauthority: call JS_Init
- jsauthority: call JS_InitSelfHostedCode
- jsauthority: change how JIT is disabled
- jsauthority: JS::SetWarningReporter instead of JS_SetErrorReporter
- jsauthority: add UTF8 suffix to renamed functions
- jsauthority: pass "%s" format string to report functions
- jsauthority: s/JSBool/bool/
- jsauthority: s/jsval/JS::Value/
- jsauthority: s/JSVAL_NULL/JS::NullValue()/
- jsauthority: s/JSVAL_VOID/JS::UndefinedValue()/
- jsauthority: s/OBJECT_TO_JSVAL/JS::ObjectValue/
- jsauthority: s/STRING_TO_JSVAL/JS::StringValue/
- jsauthority: s/BOOLEAN_TO_JSVAL/JS::BooleanValue/
- jsauthority: JSVAL_TO_OBJECT (o) to o.toObjectOrNull()
- jsauthority: JSVAL_TO_STRING (s) to s.toString()
- jsauthority: JSVAL_IS_STRING (s) to s.isString()
- jsauthority: JSVAL_IS_NULL (o) to o.isNull()
- jsauthority: Fix up JS_CallFunctionName invocations
- jsauthority: use InterruptCallback api instead of OperationCallback
- jsauthority: redo how global objects are set up
- jsauthority: root some locals to the context
- jsauthority: adapt arguments for new JS::Compile API
- jsauthority: adapt arguments for new JS_ExecuteScript API
- jsauthority: use JS::Evaluate instead of JS_EvaluateScript
- jsauthority: fix up set_property methods
- jsauthority: stop using JS_GetStringCharsZ
- jsauthority: switch from JS_ConvertArguments to JS::CallArgsFromVp
- jsauthority: re-enable JIT
- Port JavaScript authority to mozjs52
-
-Rui Matos (1):
- polkitpermission: Fix a memory leak on authority changes
-
-Sebastien Bacher (1):
- Support polkit session agent running outside user session
-
-Stef Walter (2):
- polkitagent: Fix access after dereference on hashtable
- polkitagent: No double warnings in polkit_agent_listener_register()
-
-Sven Eden (1):
- configure: enable elogind support in PolicyKit
-
-Yuri Chornoivan (1):
- Add Ukrainian translation
-
-enkore (1):
- Fix abnomal formatting of authentication header lines
-
-muzena (1):
- Add hr.po
-
-Thanks to our contributors.
-
-Colin Walters and Miloslav Trmač,
-April 2, 2018
-
---------------
-polkit 0.113
---------------
-
-NOTE: This release is an important security update, see below.
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.113.
-
-Highlights:
- Fixes CVE-2015-4625, a local privilege escalation due to predictable
- authentication session cookie values. Thanks to Tavis Ormandy, Google Project
- Zero for reporting this issue. For the future, authentication agents are
- encouraged to use PolkitAgentSession instead of using the D-Bus agent response
- API directly.
-
- Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the
- JavaScript interpreter, possibly leading to local privilege escalation.
-
- Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate
- action IDs, possibly leading to local privilege escalation. Thanks to
- Laurent Bigonville for reporting this issue.
-
- Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to
- Tavis Ormandy, Google Project Zero, for reporting this issue.
-
- On systemd-213 and later, the “active” state is shared across all sessions of
- an user, instead of being tracked separately.
-
- (pkexec), when not given a program to execute, runs the users’ shell by
- default.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185 or mozjs-17.0
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.112:
-
-Colin Walters (17):
- PolkitSystemBusName: Add public API to retrieve Unix user
- examples/cancel: Fix to securely lookup subject
- sessionmonitor-systemd: Deduplicate code paths
- PolkitSystemBusName: Retrieve both pid and uid
- Port internals non-deprecated PolkitProcess API where possible
- Use G_GNUC_BEGIN_IGNORE_DEPRECATIONS to avoid warning spam
- pkexec: Work around systemd injecting broken XDG_RUNTIME_DIR
- pkexec: Support just plain "pkexec" to run shell
- .dir-locals: Style for Emacs - we don't use tabs
- authority: Avoid cookie wrapping by using u64 counter
- CVE-2015-3218: backend: Handle invalid object paths in RegisterAuthenticationAgent
- build: Start using git.mk
- Revert "authority: Avoid cookie wrapping by using u64 counter"
- authority: Add a helper method for checking whether an identity is root
- CVE-2015-4625: Use unpredictable cookie values, keep them secret
- CVE-2015-4625: Bind use of cookies to specific uids
- README: Note to send security reports via DBus's mechanism
-
-Kay Sievers (1):
- sessionmonitor-systemd: prepare for D-Bus "user bus" model
-
-Lukasz Skalski (1):
- polkitd: Fix problem with removing non-existent source
-
-Max A. Dednev (1):
- authority: Fix memory leak in EnumerateActions call results handler
-
-Miloslav Trmač (24):
- Post-release version bump to 0.113
- Don't discard error data returned by polkit_system_bus_name_get_user_sync
- Fix a memory leak
- Refuse duplicate --user arguments to pkexec
- Fix a possible NULL dereference.
- Remove a redundant assignment.
- Simplify forced error domain registration
- Fix a typo, s/Evaluting/Evaluating/g
- s/INCLUDES/AM_CPPFLAGS/g
- Fix duplicate GError use when "uid" is missing
- Fix a crash when two authentication requests are in flight.
- docs: Update for changes to uid binding/AuthenticationAgentResponse2
- Don't pass an uninitialized JS parameter
- Don't add extra NULL group to subject.groups
- Don't store unrooted jsvals on heap
- Fix a per-authorization memory leak
- Fix a memory leak when registering an authentication agent
- Wrap all JS usage within “requests”
- Register heap-based JSObject pointers to GC
- Prevent builds against SpiderMonkey with exact stack rooting
- Clear the JS operation callback before invoking JS in the callback
- Fix spurious timeout exceptions on GC
- Fix GHashTable usage.
- Fix use-after-free in polkitagentsession.c
-
-Philip Withnall (1):
- sessionmonitor-systemd: Use sd_uid_get_state() to check session activity
-
-Rui Matos (1):
- PolkitAgentSession: fix race between child and io watches
-
-Simon McVittie (1):
- Use libsystemd instead of older libsystemd-login if possible
-
-Ting-Wei Lan (1):
- build: Fix several issues on FreeBSD
-
-Xabier Rodriguez Calvar (1):
- Fixed compilation problem in the backend
-
-Thanks to our contributors.
-
-Colin Walters and Miloslav Trmač,
-July 2, 2015
-
---------------
-polkit 0.112
---------------
-
-NOTE: This release is an important security update, see below.
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.112.
-
-Highlights:
- This release fixes CVE-2013-4288: Race condition with process subjects that do
- not have securely determined uid.
-
- pkcheck(1) now supports a new format for the --process argument; all
- applications need to use the new format to avoid a race condition (or use
- --system-bus-name to identify the process instead).
-
- Similarly, applications using the API should always use
- polkit_unix_process_new_for_owner(). polkit_unix_process_new() and
- polkit_unix_process_new_full() are unsafe and have been deprecated.
-
- Thanks to Sebastian Krahmer of the SUSE Security Team for reporting this issue.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185 or mozjs-17.0
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.111:
-
-Colin Walters (2):
- polkitunixprocess: Deprecate racy APIs
- pkcheck: Support --process=pid,start-time,uid syntax too
-
-Miloslav Trmač (1):
- Post-release version bump to 0.112
-
-Tomas Bzatek (1):
- Use GOnce for interface type registration
-
-Tomas Chvatal (2):
- Add czech translation po file to distribution.
- Update the czech once more with newest pot file.
-
-Thanks to our contributors.
-
-Colin Walters and Miloslav Trmač,
-September 18, 2013
-
---------------
-polkit 0.111
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.111.
-
-Highlights:
- The JavaScript interpreter is now mandatory.
- Both js185 and mozjs17 versions of SpiderMonkey are supported.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185 or mozjs-17.0
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.110:
-
-Colin Walters (6):
- mocklibc: Only require autoconf 2.63
- configure: Specify GLib min/max version
- jsauthority: We can really only handle a string
- jsauthority: Use JSVAL_NULL rather than {0} struct initialization
- Revert "Dynamically load libmozjs185.so and cope with it not being available"
- jsauthority: Work with mozjs-17.0 too
-
-David Zeuthen (1):
- Post-release version bump to 0.111
-
-Giovanni Campagna (1):
- build: try harder to avoid systemd/consolekit misconfiguration
-
-Michael Biebl (1):
- man: Fix pkaction man page wrt to --action-id option
-
-Miloslav Trmač (28):
- Clean (git status) after autogen.sh
- Fix build with srcdir!=builddir
- Fix DOC_SOURCE_DIR for builddir != srcdir
- Fix various memory leaks.
- Add annotation glossary
- Leave out backend from gtk-doc generation
- Fix most "undocumented symbol" warnings
- Move polkit_temporary_authorization_new to private header file.
- Include documentation of polkit_action_description_get_annotation_keys
- Document deprecated functions.
- Fold enum documentation into relevant classes
- Fix an obvious docstring typo.
- Add annotations for element types of returned lists
- Add a FIXME to polkitprivate.h
- Use auth_admin* instead of auth_self* in examples
- More warnings about using auth_self*
- Fix a TypeError when no admin rules are registered
- Fix handling of null returned from _runRules
- Refuse non-string parameters to Polkit.spawn()
- Drop unused variable
- Fix a memory leak
- Remove an unused va_start
- Don't spawn man for --help
- Fix package version / bug report address mixing
- Add bug reporting address and home page to --help output
- Refuse unrecognized command-line operands
- Exit pkaction with status 0 on success
- Fix inclusion of COPYING into documentation with srcdir != builddir
-
-Nuno Araujo (1):
- Fix the build with automake 1.13
-
-Samuli Suominen (1):
- Add missing #include <sys/wait.h>
-
-Steve Langasek (1):
- pkexec: Set process environment from pam_getenvlist()
-
-Vincent Untz (1):
- polkitagent, pkexec: Respect SUID_CFLAGS and SUID_LDFLAGS
-
-darkxst (1):
- update types for js188
-
-Thanks to our contributors.
-
-Miloslav Trmač,
-May 15, 2013
-
---------------
-polkit 0.110
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.110.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.109:
-
-David Zeuthen (5):
- Post-release version bump to 0.110
- Set XAUTHORITY environment variable if is unset
- Use mutex and condition variables properly
- Remove AM_PROG_CC_STDC
- Update NEWS for release
-
-Emilio Pozuelo Monfort (1):
- Fix build on GNU Hurd
-
-Michael Biebl (1):
- build: Remove generated introspection files on "make clean"
-
-Thanks to our contributors.
-
-David Zeuthen,
-Jan 9, 2013
-
---------------
-polkit 0.109
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.109.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.108:
-
-David Zeuthen (4):
- Post-release version bump to 0.109
- Include gmodule-2.0 to avoid linker errors
- Don't require libmozjs185 devel packages for polkit rules to work
- Update NEWS for release
-
-Thanks to our contributors.
-
-David Zeuthen,
-December 19, 2012
-
---------------
-polkit 0.108
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.108.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.107:
-
-Adam Jackson (1):
- PolkitAgent: Avoid crashing if initializing the server object fails
-
-David Zeuthen (5):
- Post-release version bump to 0.108
- Fall back to authenticating as uid 0 if the list of admin identities is empty
- Dynamically load libmozjs185.so and cope with it not being available
- docs: mention the audience for authorization rules
- Update NEWS for release
-
-Ryan Lortie (1):
- build: Fix .gir generation for parallel make
-
-Thanks to our contributors.
-
-David Zeuthen,
-November 14, 2012
-
---------------
-polkit 0.107
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.107
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.106:
-
-David Zeuthen (7):
- Post-release version bump to 0.107
- Update guidance on situations where there is no polkit authority
- Nuke leftover polkit-backend-1.pc file
- Nuke --enable-verbose flag
- Introduce a polkit.Result enumeration for authorization rules
- pkexec: add support for argv1 annotation and mention shebang-wrappers
- Update NEWS for release
-
-Matthias Clasen (1):
- Try harder to look up the right localization
-
-Thanks to our contributors.
-
-David Zeuthen,
-July 11, 2012
-
---------------
-polkit 0.106
---------------
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-This is polkit 0.106. There's a major change in this release which is
-a switch from .pkla files (keyfile-format) to .rules files
-(JavaScript), see
-
- http://davidz25.blogspot.com/2012/06/authorization-rules-in-polkit.html
-
-for more information.
-
-Build requirements
-
- glib, gobject, gio >= 2.30
- mozjs185
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.105:
-
-Colin Walters (3):
- build: Check for mozjs185, not libjs
- autogen.sh: Fix check for libtool (we only need libtoolize)
- agenthelper-pam: Fix newline-trimming code
-
-David Zeuthen (65):
- Post-release version bump to 0.106
- Add experimental authority backend using JavaScript rule files
- Include seat and session in Subject object
- Pass details to JS functions and simplify how Subject instances are constructed
- Clean up code a bit
- Add a couple of more error checks
- Collect garbage
- Emit ::Changed signal after reloading rules
- Reformat init.js and also avoid quoting non-string properties in toString()
- Make it possible for JS code to change details
- Add polkit.spawn() to spawn external programs
- Make polkit.spawn() take an array of arguments instead of a command-line
- Don't include command-line in spawning error messages
- docs: add AUTHORIZATION RULES section to the polkit(8) man page
- Also add an example of polkit.spawn() to polkit(8) man page
- docs: clarify how rules files work
- Also load rules from /usr/share/polkit/rules.d
- Use addRule() and addAdminRule()
- docs: emphasize that registered functions may actually never be called
- Add test cases for evaluation order
- Test that subject.isInGroup() works
- Add netgroup support
- Minor doc fixes
- Mention unix-netgroup:xyz as a valid return value in addAdminRule() functions
- Add test-cases and 10 second timeout for polkit.spawn()
- Create rules.d directories
- Update docs
- docs: enclose local <citerefentry> in <link> to make links work
- docs: update SEE ALSO to make each man page point to all other man pages
- Clarify docs a bit
- polkitd: add reference to polkit(8) from its man page
- Fix speling
- Fix a couple typos in the docs
- Mention details["polkit.message"] and add an example using details
- Use <variablelist> instead of <informaltable> for Subject attributes
- Make polkit_details_insert() remove the key if passed value is NULL
- Add real-world example featuring udisks2 and the drive.* variables it passes
- Rename --enable-systemd to --enable-libsystemd-login
- Fix distcheck
- Add a systemd .service file
- Nuke polkitbackend library, localauthority backend and extension system
- Mention systemd(1) in the polkitd(8) man page
- Store private binaries in /usr/lib/polkit-1 instead of /usr/libexec
- Add default rules
- Pass expanded identity list to the AuthenticationSession
- Use "rules", not "scripts" to refer to files in rules.d
- Terminate runaway scripts
- Use a condition variable to signal that runaway killer thread is ready
- Combine action and details parameters
- Clarify pkexec(1) variables
- Use g_unix_signal_add() from GLib 2.30
- Move polkitd into src/polkitbackend
- Ensure polkitd is rebuilt if libpolkit-backend-1.la changes
- Remove unused DBUS_GLIB_* and GIO_* variables
- Run polkitd as an unprivileged user
- Log when the name org.fd.PolicyKit1 has been acquired
- Rewrite the "Writing polkit applications" chapter
- Update links to udisks docs
- Update pkexec(1) man page with example
- Small updates to the "Writing polkit applications" chapter
- State that authorization rules must not rely on SpiderMonkey features
- Make it work when using ConsoleKit instead of libsystemd-login
- Mention the implications of returning *_keep in an authorization rule
- docs: add a "make sure your app works when there's no polkitd(8)" note
- Update NEWS for release
-
-Thanks to our contributors.
-
-David Zeuthen,
-June 7, 2012
-
---------------
-polkit 0.105
---------------
-
-This is polkit 0.105
-
-WARNING WARNING WARNING: This is a prerelease on the road to polkit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.28
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since polkit 0.104:
-
-David Zeuthen (11):
- Post-release version bump
- PolkitUnixSession: Set error if we cannot find a session for the given pid
- PolkitUnixSession: Actually return TRUE if a session exists
- PolkitAgentSession: Don't leak file descriptors
- Add pkttyagent(1) helper
- Make it possible to influence agent registration with an a{sv} parameter
- Fix type in docs
- Mention pkttyagent(1) in "Writing PolicyKit applications" chapter
- Update the docs to use 'polkit' (instead of 'PolicyKit') as the name
- Add Makefile rules for signing and publishing releases and docs
- Update NEWS for release
-
-Ryan Lortie (1):
- Various builddir != srcdir fixes
-
-Thanks to our contributors.
-
-David Zeuthen,
-April 24, 2012
-
---------------
-PolicyKit 0.104
---------------
-
-This is PolicyKit 0.104
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.28
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
- ConsoleKit OR systemd
-
-Changes since PolicyKit 0.103:
-
- David Zeuthen (3):
- Post-release version bump to 0.104
- Detect whether systemd is available and default to use if so
- Update NEWS for release
-
- Matthias Clasen (1):
- Add optional systemd support
-
- Nikki VonHollen (2):
- Bug 43608 – Add unit tests
- Bug 43610 - Add netgroup support
-
-Thanks to our contributors.
-
-David Zeuthen,
-January 3, 2012
-
---------------
-PolicyKit 0.103
---------------
-
-This is PolicyKit 0.103
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.28
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-IMPORTANT: As of release 0.103, the default Authority backend now
-defaults to allowing members of the 'wheel' group to authenticate as
-an administator since this is common usage in popular Linux
-distributions. Distributors can change this by patching the
-50-localauthority.conf file in /etc/polkit-1/localauthority.conf.d as
-needed.
-
-Changes since PolicyKit 0.102:
-
- Alan Near (1):
- Mistype in DBus object: PoliycKit1 -> PolicyKit1
-
- David Zeuthen (7):
- Post-release version bump to 0.103
- Add support for the org.freedesktop.policykit.imply annotation
- Add --no-debug option and use this for D-Bus activation
- Bug 41025 – Add org.freedesktop.policykit.owner annotation
- Default to AdminIdentities=unix-group:wheel for local authority
- Update NEWS for release
- Fix typo
-
-Thanks to our contributors.
-
-David Zeuthen,
-December 6, 2011
-
---------------
-PolicyKit 0.102
---------------
-
-This is PolicyKit 0.102
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.28
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.101:
-
- Benjamin Otte (1):
- introspection: Add --c-include to the gir files
-
- David Zeuthen (7):
- Post-release version bump to 0.102
- Don't show diagnostic messages intended for the administrator to the end u
- PolkitUnixProcess: Clarify that the real uid is returned, not the effectiv
- Make PolkitUnixProcess also record the uid of the process
- Use polkit_unix_process_get_uid() to get the owner of a process
- pkexec: Avoid TOCTTOU problems with parent process
- Update NEWS for release
-
- Evan Nemerson (1):
- Specify exported pkg-config files in GIRs
-
- Marc Deslauriers (1):
- Fix multi-line pam prompt handling
-
- Martin Pitt (3):
- Ignore .po/ for intltool
- Fix backend crash if a .policy file does not specify <message>
- Bug 38769 — pkexec: Support running X11 apps
-
-Thanks to our contributors.
-
-David Zeuthen,
-August 1, 2011
-
---------------
-PolicyKit 0.101
---------------
-
-This is PolicyKit 0.101
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.28
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.100:
-
- Adrian Bunk (1):
- Bug 27253 – Use GOBJECT_INTROSPECTION_CHECK from gobject-introspection
-
- David Zeuthen (16):
- Post-release version bump to 0.101
- Bug 30653 – No way to detect cancellation in pkexec
- Bug 27081 – pkexec fails to build on non glibc systems
- Bug 30438 – PolicyKit fails to build on AIX
- Bug 32334 – Always set polkit.retains_authorization_after_challenge
- Fix a memory leak
- Be more specific about what info we want when enumerating files
- Make pkcheck(1) report if the authentication dialog was dismissed
- pkcheck: Make it possible to list and revoke temporary authorizations
- Be a bit more careful parsing the command-line
- Bug 29712 – Use monotonic for temporary authorizations
- Allow overriding message shown in authentication dialog
- Deprecated PolkitBackendActionLookup
- Fix a couple of warnings triggered by gcc 4.6
- Build examples by default and fix compiler warnings
- Update NEWS for release
-
- Michael Biebl (1):
- Bug 29871 – Fix build failures with binutils-gold
-
-Thanks to our contributors.
-
-David Zeuthen,
-March 3, 2011
-
---------------
-PolicyKit 0.100
---------------
-
-This is PolicyKit 0.100
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.25.12
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.99:
-
-David Zeuthen (12):
- Post-release version bump to 0.100
- Add missing GObject Introspection annotations
- Build gir/typelib for PolkitAgent-1.0
- Fix-up PolkitAgentSession to use GObject properties
- Improve error reporting for authentication sessions
- Add some debug info that can be shown with the env var POLKIT_DEBUG
- Fix up debug and timeouts in agent helper
- Always pass non-zero value to g_once_init_leave()
- Add a note about POLKIT_DEBUG
- Pass caller and subject pid to authentication agent
- Update NEWS for release
- Fix 'make distcheck'
-
-Thanks to our contributors.
-
-David Zeuthen,
-February 21, 2011
-
---------------
-PolicyKit 0.99
---------------
-
-This is PolicyKit 0.99
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.25.12
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.98:
-
- Colin Walters (3):
- Remove duplicate definitions of enumeration types
- Fix (correct) GCC warning about possibly-uninitialized variable
- Fix another GCC uninitialized variable warning
-
- David Zeuthen (2):
- Post-release version bump to 0.99
- Update NEWS for release
-
- Vincent Untz (1):
- Bug 29816 – Install polkitagentenumtypes.h
-
-Thanks to our contributors.
-
-David Zeuthen,
-September 15, 2010
-
---------------
-PolicyKit 0.98
---------------
-
-This is PolicyKit 0.98.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.25.12
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.97:
-
-David Zeuthen (11):
- Post-release version bump to 0.98
- Require GLib 2.25.12
- Fix scanning of unix-process subjects
- Add textual authentication agent and use it in pkexec(1)
- Fix ConsoleKit interaction bug
- pkexec: add --disable-internal-agent option
- pkcheck: add --enable-internal-agent option
- Fix wording in pkexec(1) man page
- Various doc cleanups
- Fix dist-check
- Update NEWS for release
-
-Thanks to our contributors.
-
-David Zeuthen,
-August 20, 2010
-
---------------
-PolicyKit 0.97
---------------
-
-This is PolicyKit 0.97.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-The main change since the previous version is a port from eggdbus to
-GLib's new D-Bus implementation. Other changes includes various bug
-fixes and support for shadow authentication. Support for the
-AddLockdown() and RemoveLockdown() methods has been removed. You will
-need an updated version of PolicyKit-gnome to go with this release.
-
-Build requirements
-
- glib, gobject, gio >= 2.25.11
- gobject-introspection >= 0.6.2 (optional)
- pam (optional)
-
-Changes since PolicyKit 0.96:
-
-Andrew Psaltis (1):
- Add shadow support
-
-Dan Rosenberg (1):
- Bug 26982 – pkexec information disclosure vulnerability
-
-David Zeuthen (23):
- Post-release version bump to 0.97
- Port core bits to gdbus
- Port CK class to gdbus
- Port PolkitBackendInteractiveAuthority to gdbus
- Port PolkitAgent to gdbus
- Add generated docbook D-Bus API docs to git
- Nuke eggdbus usage
- Make polkitd accept --replace and gracefully handle SIGINT
- Implement polkit_temporary_authorization_new_for_gvariant()
- Remove Lock Down functionality
- Make NameOwnerChanged a private impl detail of the interactive authority
- Update README
- Merge remote branch 'origin/gdbus'
- Add a GPermission implementation
- PolkitAuthority: Implement failable initialization
- PolkitAuthority: Add g_return_if_fail() checks
- Add g_return_if_fail() to all public API entry points
- Use polkit_authority_get_sync() instead of deprecated polkit_authority_get
- PolkitBackend: Don't export unneeded convenience API
- Update GI annotations
- Don't dist org.freedesktop.ConsoleKit.xml; It's dead, Jim
- Properly reference headers
- Update NEWS for release
-
-Petr Mrázek (1):
- Bug 29051 – Configuration reload on every query
-
-Thanks to our contributors.
-
-David Zeuthen,
-August 9, 2010
-
---------------
-PolicyKit 0.96
---------------
-
-This is PolicyKit 0.96. This is supposed to be the last release until 1.0.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.21.4
- eggdbus-1 >= 0.6
- gobject-introspection >= 0.6.2 (optional)
- pam
-
-Changes since PolicyKit 0.95:
-
-David Zeuthen (15):
- Bug 25367 — Also read local authority configuration data from /etc
- Fix logic error in pk-example-frobnicate
- Run the open_session part of the PAM stack in pkexec(1)
- Fix up last comment
- Bug 25594 – System logging
- Remove trailing whitespace from log messages
- Properly handle return value from getpwnam_r()
- Fix error message when no authentication agent is available
- Make pkexec(1) validate environment variables
- Make pkexec(1) use the syslogging facilities
- Save original cwd in pkexec(1) since it will change during the life-time
- Complain on stderr, not stdout
- Post-release version bump to 0.96
- Don't log authorization checks
- Update NEWS for release
-
-David Zeuthen,
-January 15, 2010
-
---------------
-PolicyKit 0.95
---------------
-
-This is PolicyKit 0.95. This is supposed to be the last release until 1.0.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.21.4
- eggdbus-1 >= 0.6
- gobject-introspection >= 0.6.2 (optional)
- pam
-
-Changes since PolicyKit 0.94:
-
-Alexander Sack (1):
- Bug 24566 – Properly _ref authority in singleton constructor
-
-Andreas Sandberg (1):
- Bug 24235 – polkit-agent-helper may call pam_end with a stale pam handle
-
-Bastien Nocera (1):
- Fix process start time when using polkit_unix_process_new_full()
-
-David Zeuthen (20):
- Post-release version bump to 0.95
- Use correct program name when complaining about not being setuid root
- Sort by action id in pkaction(1) output
- Bug 23867 – UnixProcess vs. SystemBusName aliasing
- Implement lockdown for the Local Authority implementation
- Remove POLKIT_USER from configuration summary
- Add missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE
- Pass --libtool to g-ir-scanner
- Clarify comment on where to find process start-time on Linux
- Add properties with information about the currently used authority
- Clarify when AllowUserInteraction should and shouldn't be used
- Add methods AddLockdownForAction() and RemoveLockdownForAction()
- Port lockdown from pklalockdown(1) to D-Bus methods
- Drop ununsed policykit actions
- Remove TODO about symbol visibility as this has been fixed for a while
- Clarify pklocalauthority(8) man page
- Properly validate all arguments passed via D-Bus
- Add Python example
- Fix make distcheck
- Update NEWS for release
-
-Matthias Clasen (1):
- Bug 24640 – Typos in pklocalauthority(8)
-
-Michael Biebl (8):
- Trim the list of exported symbols
- Use _polkit_agent_marshal prefix
- Make private symbols accessible to libpolkitagent and libpolkitbackend
- Make examples optional
- Enable silent rules
- Remove POLKIT_USER option
- Don't include Polkit-1.0.gir in the dist tarball
- Bug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS
-
-Samuel Thibault (1):
- Bug 24495 – Fails to build on platforms without PATH_MAX (like hurd)
-
-David Zeuthen,
-November 13, 2009
-
---------------
-PolicyKit 0.94
---------------
-
-This is PolicyKit 0.94.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.21.4
- eggdbus-1 >= 0.5
- gobject-introspection >= 0.6.2 (optional)
- pam
-
-Changes since PolicyKit 0.93:
-
- David Zeuthen (13):
- Post-release version bump to 0.94
- Require correct versions of glib and eggdbus
- Ignore .pkla files starting with dot and don't segfault on error path
- Allow unprivileged callers to check authorizations
- Don't spawn man(1) from a setuid program
- Add polkit.retains_authorization_after_challenge to authz result
- Ensure all fds except stdin/stdout/stderr are closed after exec(2)
- Be more careful when determining process start time
- Pass the right struct offset for the ::changed class signal handler
- Don't set the GError if the process doesn't exist
- Remove temporary authorization when the subject it applies to vanishes
- Generate GI gir and typelibs for libpolkit-gobject-1
- Update NEWS for release
-
- Joe Marcus Clarke (1):
- Bug 23093 – FreeBSD portability fixes
-
-David Zeuthen,
-August 12, 2009
-
---------------
-PolicyKit 0.93
---------------
-
-This is PolicyKit 0.93.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.21.4
- eggdbus-1 >= 0.5
- pam
-
-Changes since PolicyKit 0.92:
-
-David Zeuthen (16):
- Post-release version bump to 0.93
- GIO modules need to be prefix with lib
- Cancel an authentication if the unique name for the subject vanishes
- Plug a couple of memory leaks
- Move local authority management to a separate library
- Rip out polkit-local and refactor local authority to only use tmp authz
- Move authentication agent bits to separate authority subclass
- Also pass the identity of the subject we are checking for
- Actually make the local authority look up authorization files
- In .pkla files, use Result{Any,Inactive,Active} instead of just Result
- Rename some man pages and the daemon binary
- Add docs detailing how the Local Authority works
- Add support for querying and revoking temporary authorizations
- Fix make distcheck
- Update TODO
- Update NEWS for release
-
-Yanko Kaneti (2):
- Use unique ids for sections to prevent them being autogenerated
- More unique ids to get the docs build fully predictable
-
-David Zeuthen,
-July 20th, 2009
-
---------------
-PolicyKit 0.92
---------------
-
-This is PolicyKit 0.92.
-
-WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit
-1.0. Public API might change and certain parts of the code still needs
-some security review. Use at your own risk.
-
-Build requirements
-
- glib, gobject, gio >= 2.14
- eggdbus-1 >= 0.4
- pam
-
-Changes since PolicyKit 0.91:
-
- David Zeuthen (36):
- post-release version bump to 0.92
- install gtkdoc HTML in the proper location
- Fix D-Bus policy to work with non-permissive D-Bus
- Only allow privileged apps to check authz and add ActionLookup interface
- Change the PolkitAuthorizationResult enumeration into an object
- Port examples and command-line tools to new API
- Move docs to proper location
- Add a pkexec(1) command
- Mention /usr/bin/pkexec in the configure blurb
- Fix a bug where details were not shown for normal pkexec usage
- Use an object, not a GHashTable when passing details around
- Forgot to add source for PolkitDetails
- Change the defaults for .run-frobnicate to auth_self_keep
- Require eggdbus-1 >= 0.4
- Only free hash table if it's not NULL
- Avoid returning an error if no authentication agent is available
- Clarify docs for is_challenge member of the AuthorizationResult struct
- Add pkcheck(1) command to check for authorizations
- nullbackend: Catch up with latest API changes
- Return the icon name instead of a GIcon in PolkitActionDescription
- Add pkaction(1) and nuke polkit-1(1) commands
- Update SEE ALSO sections in man pages
- Add a man page for polkit-1(8)
- First cut at some high-level docs
- Improve pkexec(1) man page by adding screenshots of authentication dialogs
- Add some more API docs
- Add a "PolicyKit Overview" section to the docs
- Consolidate all gtk-doc stuff in docs/polkit
- Expand on the D-Bus docs
- Use .../extensions instead of ../backends for loading extensions
- Minor doc fixes
- Move the doc chapters around a bit
- Change GNOME to freedesktop.org in the docs
- Fix make distcheck
- Update NEWS
- Also dist polkitd-1.xml
-
- Richard Hughes (2):
- fix up gtk-doc API markup for a couple of functions
- add a draft version of the porting guide -- WIP
-
-David Zeuthen,
-June 8, 2009
diff --git a/NEWS.md b/NEWS.md
new file mode 100644
index 0000000..63932fa
--- /dev/null
+++ b/NEWS.md
@@ -0,0 +1,1596 @@
+## polkit 0.120
+
+**WARNING**: This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### NOTICE:
+This is the LAST version to support AUTOTOOLS build system, as it has been obsoleted
+by meson build system.
+The next release of polkit will REQUIRE meson build system.
+
+### Highlights:
+- tarball fix-ups
+- re-enabled documentation
+- Intltool to gettext migration
+- new translations
+
+### Build requirements
+- glib, gobject, gio >= 2.32
+- mozjs-78
+- gobject-introspection >= 0.6.2 (optional)
+- pam (optional)
+- ConsoleKit OR systemd
+- gettext
+- meson (optional)
+- autotools (DEPRECATED)
+
+### Changes since polkit 0.119:
+- Inigo Martinez:
+ transition from Intltool to gettext
+
+- Simon McVittie:
+ several tarball, meson and pipeline fixups
+
+- Hugo Carvalho:
+ Portuguese translation
+
+- Sergiu Bivol:
+ Romanian translation
+
+
+Many thanks to all contributors!
+
+Jan Rybar et al.,
+September 30, 2021
+
+
+## polkit 0.119
+**WARNING**: This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.119**.
+
+### Highlights:
+- meson build system added
+- CVE-2021-3560 mitigation
+
+### Build requirements
+- glib, gobject, gio >= 2.32
+- mozjs-78
+- gobject-introspection >= 0.6.2 (optional)
+- pam (optional)
+- ConsoleKit OR systemd
+
+### Changes since polkit 0.118:
+- Inigo Martinez:
+ meson build system added alongside autotools (many thanks!!)
+
+- Matthias Classen:
+ properties in text listener
+
+- René Genz:
+ typos fixups
+
+- Balázs Úr:
+ Update Hungarian translation
+
+- Hendrik Werner:
+ meson post-install script mod to avoid calling external processes
+
+- Kevin Backhouse, Jan Rybar:
+ CVE-2021-3560 mitigation
+
+Many thanks to all contributors!
+
+Jan Rybar et al.,
+June 3, 2021
+
+## polkit 0.118
+
+**WARNING**: This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.118**.
+
+### Highlights:
+- move to mozjs78
+- tarball CI fix
+
+### Build requirements
+- glib, gobject, gio >= 2.32
+- mozjs-78
+- gobject-introspection >= 0.6.2 (optional)
+- pam (optional)
+- ConsoleKit OR systemd
+
+### Changes since polkit 0.117:
+- Xi Ruoyao:
+ tarball fixup for distcheck
+
+- Valentin David:
+ updated dependency to mozjs78
+
+Many thanks to all contributors!
+
+Jan Rybar et al.,
+September 8, 2020
+
+## polkit 0.117
+
+**WARNING**: This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.117**.
+
+### Highlights:
+ Gitlab CI activation - all merge requests are tested before merged
+ New Norwegian translation, several other language updates
+
+### Build requirements
+- glib, gobject, gio >= 2.32
+- mozjs-68
+- gobject-introspection >= 0.6.2 (optional)
+- pam (optional)
+- ConsoleKit OR systemd
+
+### Changes since polkit 0.116:
+ - Bastien Nocera:
+ Activated Gitlab CI
+
+ - Xi Ruoyao:
+ Updated dependency to mozjs68
+
+ - Kalev Lember, Jan Rybar
+ Memory management fixes
+
+ - Anders Jonsson, Karl Ove Hufthammer, Andika Triwidada, Yuri Chornoivan:
+ Language updates
+
+Many thanks to all contributors!
+
+Jan Rybar et al.,
+July 24, 2020
+
+polkit 0.116
+------------
+
+**WARNING**:
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.116**.
+
+### Highlights:
+ - Fix of CVE-2018-19788, high UIDs caused overflow in polkit;
+ - Fix of CVE-2019-6133, kernel vulnerability (Slowfork) allowed local privilege escalation.
+
+### Build requirements:
+ - glib, gobject, gio >= 2.32
+ - mozjs-60
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.115:
+ - Kyle Walker:
+ Leaking zombie child processes
+
+ - Jan Rybar:
+ Possible resource leak found by static analyzer
+ Output messages tuneup
+ Sanity fixes
+ pkttyagent tty echo disabled on SIGINT
+
+ - Ray Strode:
+ HACKING: add link to Code of Conduct
+
+ - Philip Withnall:
+ polkitbackend: comment typos fix
+
+ - Zbigniew Jędrzejewski-Szmek:
+ `configure.ac`: fix detection of systemd with cgroups v2
+ CVE-2018-19788 High UIDs overflow fix
+
+ - Colin Walters:
+ CVE-2019-6133 Slowfork vulnerability fix
+
+ - Matthew Leeds:
+ Allow unset process-uid
+
+ - Emmanuele Bassi
+ Port the JS authority to mozjs-60
+
+ - Göran Uddeborg:
+ Use JS_EncodeStringToUTF8
+
+Many thanks to all contributors!
+
+Jan Rybar et al.,
+April 25, 2019
+
+---------------
+polkit 0.115
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.115**.
+
+### Highlights:
+ - Fixes CVE-2018-1116, a local information disclosure and denial of service
+ caused by trusting client-submitted UIDs when referencing processes.
+ Thanks to Matthias Gerstner of the SUSE security team for reporting
+ this issue.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.32
+ - mozjs-52
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.114:
+
+ - Miloslav Trmač (1):
+ Fix CVE-2018-1116: Trusting client-supplied UID
+
+ - Ray Strode (3):
+ Post-release version bump to 0.115
+ jsauthority: pass "%s" format string to remaining report function
+ NEWS: fix date from 2017 to 2018 for 0.114 entry
+
+Thanks to our contributors.
+
+Colin Walters and Miloslav Trmač,
+July 10, 2018
+
+--------------
+polkit 0.114
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.114**.
+
+### Highlights:
+ Port to mozjs 52, the latest version of the firefox JavaScript engine.
+
+ Add gettext support for policy files
+
+ Fixes for various memory leaks
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.32
+ - mozjs-52
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.113:
+
+ - Anders Jonsson (2):
+ pkcheck: fix man typos
+ Add Swedish translation
+
+ - Antoine Jacoutot (1):
+ Add support for OpenBSD
+
+ - Christian Kirbach (1):
+ Add German translation
+
+ - Colin Walters (3):
+ build: Pull in GCC warning infra from ostree
+ build: Use AC_USE_SYSTEM_EXTENSIONS
+ tests: Correct boundary test for overflow
+
+ - Dariusz Gadomski (2):
+ Fix multi-line pam text info.
+ Refactor send_to_helper usage
+
+ - Gabor Kelemen (1):
+ Add initial Hungarian translation, and add hu to LINGUAS
+
+ - Jeremy Linton (5):
+ change mozjs interface module to c++
+ Switch to hard requiring mozjs24
+ Fix warnings caused by building with C++
+ Replace autocompartment
+ test: Add a test case to handle actions without explicit rules
+
+ - Jiří Klimeš (1):
+ trivial: fix deprecated indication for polkit_agent_register_listener()
+
+ - Matthias Clasen (1):
+ Add gettext support for .policy files
+
+ - Miloslav Trmač (21):
+ Post-release version bump to 0.114
+ Consistently use HAVE_NETGROUP_H instead of HAVE_OPENBSD
+ Fix a memory leak of PolkitAgentListener's Server object
+ Remove polkitbackendconfigsource.[ch]
+ Add Slovak translation by Dusan Kazik <prescott66@gmail.com>
+ Add Indonesian translation by Andika Triwidada
+ Add Chinese (Taiwan) translation
+ Fix a typo in polkit(8)
+ Simplify GVariant reference counting
+ Fix a memory leak on an error path of lookup_asv (twice)
+ Fix a memory leak in server_handle_register_authentication_agent_with_options
+ Fix a memory leak in server_handle_unregister_authentication_agent
+ Fix a memory leak in server_handle_authentication_agent_response{,2}
+ Fix memory leaks in server_handle_*_temporary_authorizations
+ Fix error handling in polkit_authority_enumerate_temporary_authorizations_finish
+ Fix a memory leak per agent authentication
+ Fix a memory leak on agent authentication cancellation
+ Audit and fix GVariant reference counting
+ Fix help for (pkttyagent -s)
+ Fix a race condition when terminating runaway_killer_thread
+ Move to current GLib
+
+ - Mingye Wang (Arthur2e5) (1):
+ Add zh_CN translation
+
+ - Muhammet Kara (1):
+ Added Turkish translation
+
+ - OBATA Akio (1):
+ Add support for NetBSD
+
+ - Peter Hutterer (1):
+ gettext: switch to default-translate "no"
+
+ - Philip Withnall (3):
+ polkit: Add g_autoptr() support for GObject-derived polkit types
+ data: Set GIO_USE_VFS=local in the environment
+ polkitbackend: Fix typos in a couple of initialisation error messages
+
+ - Piotr Drąg (1):
+ Add Polish translation
+
+ - Rafael Fontenelle (1):
+ Add Brazilian Portuguese translation
+
+ - Ray Strode (34):
+ configure: bump mozjs requirement to 52
+ jsauthority: fix how classes are defined
+ jsauthority: use JS_FN instead of JS_FS
+ jsauthority: get rid of JSRuntime
+ jsauthority: change how setVersion is called
+ jsauthority: call JS_Init
+ jsauthority: call JS_InitSelfHostedCode
+ jsauthority: change how JIT is disabled
+ jsauthority: JS::SetWarningReporter instead of JS_SetErrorReporter
+ jsauthority: add UTF8 suffix to renamed functions
+ jsauthority: pass "%s" format string to report functions
+ jsauthority: s/JSBool/bool/
+ jsauthority: s/jsval/JS::Value/
+ jsauthority: s/JSVAL_NULL/JS::NullValue()/
+ jsauthority: s/JSVAL_VOID/JS::UndefinedValue()/
+ jsauthority: s/OBJECT_TO_JSVAL/JS::ObjectValue/
+ jsauthority: s/STRING_TO_JSVAL/JS::StringValue/
+ jsauthority: s/BOOLEAN_TO_JSVAL/JS::BooleanValue/
+ jsauthority: JSVAL_TO_OBJECT (o) to o.toObjectOrNull()
+ jsauthority: JSVAL_TO_STRING (s) to s.toString()
+ jsauthority: JSVAL_IS_STRING (s) to s.isString()
+ jsauthority: JSVAL_IS_NULL (o) to o.isNull()
+ jsauthority: Fix up JS_CallFunctionName invocations
+ jsauthority: use InterruptCallback api instead of OperationCallback
+ jsauthority: redo how global objects are set up
+ jsauthority: root some locals to the context
+ jsauthority: adapt arguments for new JS::Compile API
+ jsauthority: adapt arguments for new JS_ExecuteScript API
+ jsauthority: use JS::Evaluate instead of JS_EvaluateScript
+ jsauthority: fix up set_property methods
+ jsauthority: stop using JS_GetStringCharsZ
+ jsauthority: switch from JS_ConvertArguments to JS::CallArgsFromVp
+ jsauthority: re-enable JIT
+ Port JavaScript authority to mozjs52
+
+ - Rui Matos (1):
+ polkitpermission: Fix a memory leak on authority changes
+
+ - Sebastien Bacher (1):
+ Support polkit session agent running outside user session
+
+ - Stef Walter (2):
+ polkitagent: Fix access after dereference on hashtable
+ polkitagent: No double warnings in polkit_agent_listener_register()
+
+ - Sven Eden (1):
+ configure: enable elogind support in PolicyKit
+
+ - Yuri Chornoivan (1):
+ Add Ukrainian translation
+
+ - enkore (1):
+ Fix abnomal formatting of authentication header lines
+
+ - muzena (1):
+ Add hr.po
+
+Thanks to our contributors.
+
+Colin Walters and Miloslav Trmač,
+April 2, 2018
+
+--------------
+polkit 0.113
+--------------
+
+NOTE: This release is an important security update, see below.
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.113**.
+
+### Highlights:
+ Fixes CVE-2015-4625, a local privilege escalation due to predictable
+ authentication session cookie values. Thanks to Tavis Ormandy, Google Project
+ Zero for reporting this issue. For the future, authentication agents are
+ encouraged to use PolkitAgentSession instead of using the D-Bus agent response
+ API directly.
+
+ Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the
+ JavaScript interpreter, possibly leading to local privilege escalation.
+
+ Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate
+ action IDs, possibly leading to local privilege escalation. Thanks to
+ Laurent Bigonville for reporting this issue.
+
+ Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to
+ Tavis Ormandy, Google Project Zero, for reporting this issue.
+
+ On systemd-213 and later, the “active” state is shared across all sessions of
+ an user, instead of being tracked separately.
+
+ (pkexec), when not given a program to execute, runs the users’ shell by
+ default.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185 or mozjs-17.0
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.112:
+
+ - Colin Walters (17):
+ PolkitSystemBusName: Add public API to retrieve Unix user
+ examples/cancel: Fix to securely lookup subject
+ sessionmonitor-systemd: Deduplicate code paths
+ PolkitSystemBusName: Retrieve both pid and uid
+ Port internals non-deprecated PolkitProcess API where possible
+ Use G_GNUC_BEGIN_IGNORE_DEPRECATIONS to avoid warning spam
+ pkexec: Work around systemd injecting broken XDG_RUNTIME_DIR
+ pkexec: Support just plain "pkexec" to run shell
+ .dir-locals: Style for Emacs - we don't use tabs
+ authority: Avoid cookie wrapping by using u64 counter
+ CVE-2015-3218: backend: Handle invalid object paths in RegisterAuthenticationAgent
+ build: Start using git.mk
+ Revert "authority: Avoid cookie wrapping by using u64 counter"
+ authority: Add a helper method for checking whether an identity is root
+ CVE-2015-4625: Use unpredictable cookie values, keep them secret
+ CVE-2015-4625: Bind use of cookies to specific uids
+ README: Note to send security reports via DBus's mechanism
+
+ - Kay Sievers (1):
+ sessionmonitor-systemd: prepare for D-Bus "user bus" model
+
+ - Lukasz Skalski (1):
+ polkitd: Fix problem with removing non-existent source
+
+ - Max A. Dednev (1):
+ authority: Fix memory leak in EnumerateActions call results handler
+
+ - Miloslav Trmač (24):
+ Post-release version bump to 0.113
+ Don't discard error data returned by polkit_system_bus_name_get_user_sync
+ Fix a memory leak
+ Refuse duplicate --user arguments to pkexec
+ Fix a possible NULL dereference.
+ Remove a redundant assignment.
+ Simplify forced error domain registration
+ Fix a typo, s/Evaluting/Evaluating/g
+ s/INCLUDES/AM_CPPFLAGS/g
+ Fix duplicate GError use when "uid" is missing
+ Fix a crash when two authentication requests are in flight.
+ docs: Update for changes to uid binding/AuthenticationAgentResponse2
+ Don't pass an uninitialized JS parameter
+ Don't add extra NULL group to subject.groups
+ Don't store unrooted jsvals on heap
+ Fix a per-authorization memory leak
+ Fix a memory leak when registering an authentication agent
+ Wrap all JS usage within “requests”
+ Register heap-based JSObject pointers to GC
+ Prevent builds against SpiderMonkey with exact stack rooting
+ Clear the JS operation callback before invoking JS in the callback
+ Fix spurious timeout exceptions on GC
+ Fix GHashTable usage.
+ Fix use-after-free in polkitagentsession.c
+
+ - Philip Withnall (1):
+ sessionmonitor-systemd: Use sd_uid_get_state() to check session activity
+
+ - Rui Matos (1):
+ PolkitAgentSession: fix race between child and io watches
+
+ - Simon McVittie (1):
+ Use libsystemd instead of older libsystemd-login if possible
+
+ - Ting-Wei Lan (1):
+ build: Fix several issues on FreeBSD
+
+ - Xabier Rodriguez Calvar (1):
+ Fixed compilation problem in the backend
+
+Thanks to our contributors.
+
+Colin Walters and Miloslav Trmač,
+July 2, 2015
+
+--------------
+polkit 0.112
+--------------
+
+NOTE: This release is an important security update, see below.
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.112**.
+
+### Highlights:
+ This release fixes CVE-2013-4288: Race condition with process subjects that do
+ not have securely determined uid.
+
+ pkcheck(1) now supports a new format for the --process argument; all
+ applications need to use the new format to avoid a race condition (or use
+ --system-bus-name to identify the process instead).
+
+ Similarly, applications using the API should always use
+ polkit_unix_process_new_for_owner(). polkit_unix_process_new() and
+ polkit_unix_process_new_full() are unsafe and have been deprecated.
+
+ Thanks to Sebastian Krahmer of the SUSE Security Team for reporting this issue.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185 or mozjs-17.0
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.111:
+
+ - Colin Walters (2):
+ polkitunixprocess: Deprecate racy APIs
+ pkcheck: Support --process=pid,start-time,uid syntax too
+
+ - Miloslav Trmač (1):
+ Post-release version bump to 0.112
+
+ - Tomas Bzatek (1):
+ Use GOnce for interface type registration
+
+ - Tomas Chvatal (2):
+ Add czech translation po file to distribution.
+ Update the czech once more with newest pot file.
+
+Thanks to our contributors.
+
+Colin Walters and Miloslav Trmač,
+September 18, 2013
+
+--------------
+polkit 0.111
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.111**.
+
+### Highlights:
+ The JavaScript interpreter is now mandatory.
+ Both js185 and mozjs17 versions of SpiderMonkey are supported.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185 or mozjs-17.0
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.110:
+
+ - Colin Walters (6):
+ mocklibc: Only require autoconf 2.63
+ configure: Specify GLib min/max version
+ jsauthority: We can really only handle a string
+ jsauthority: Use JSVAL_NULL rather than {0} struct initialization
+ Revert "Dynamically load libmozjs185.so and cope with it not being available"
+ jsauthority: Work with mozjs-17.0 too
+
+ - David Zeuthen (1):
+ Post-release version bump to 0.111
+
+ - Giovanni Campagna (1):
+ build: try harder to avoid systemd/consolekit misconfiguration
+
+ - Michael Biebl (1):
+ man: Fix pkaction man page wrt to --action-id option
+
+ - Miloslav Trmač (28):
+ Clean (git status) after autogen.sh
+ Fix build with srcdir!=builddir
+ Fix DOC_SOURCE_DIR for builddir != srcdir
+ Fix various memory leaks.
+ Add annotation glossary
+ Leave out backend from gtk-doc generation
+ Fix most "undocumented symbol" warnings
+ Move polkit_temporary_authorization_new to private header file.
+ Include documentation of polkit_action_description_get_annotation_keys
+ Document deprecated functions.
+ Fold enum documentation into relevant classes
+ Fix an obvious docstring typo.
+ Add annotations for element types of returned lists
+ Add a FIXME to polkitprivate.h
+ Use auth_admin* instead of auth_self* in examples
+ More warnings about using auth_self*
+ Fix a TypeError when no admin rules are registered
+ Fix handling of null returned from _runRules
+ Refuse non-string parameters to Polkit.spawn()
+ Drop unused variable
+ Fix a memory leak
+ Remove an unused va_start
+ Don't spawn man for --help
+ Fix package version / bug report address mixing
+ Add bug reporting address and home page to --help output
+ Refuse unrecognized command-line operands
+ Exit pkaction with status 0 on success
+ Fix inclusion of COPYING into documentation with srcdir != builddir
+
+ - Nuno Araujo (1):
+ Fix the build with automake 1.13
+
+ - Samuli Suominen (1):
+ Add missing #include <sys/wait.h>
+
+ - Steve Langasek (1):
+ pkexec: Set process environment from pam_getenvlist()
+
+ - Vincent Untz (1):
+ polkitagent, pkexec: Respect SUID_CFLAGS and SUID_LDFLAGS
+
+ - darkxst (1):
+ update types for js188
+
+Thanks to our contributors.
+
+Miloslav Trmač,
+May 15, 2013
+
+--------------
+polkit 0.110
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.110**.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.109:
+
+ - David Zeuthen (5):
+ Post-release version bump to 0.110
+ Set XAUTHORITY environment variable if is unset
+ Use mutex and condition variables properly
+ Remove AM_PROG_CC_STDC
+ Update NEWS for release
+
+ - Emilio Pozuelo Monfort (1):
+ Fix build on GNU Hurd
+
+ - Michael Biebl (1):
+ build: Remove generated introspection files on "make clean"
+
+Thanks to our contributors.
+
+David Zeuthen,
+Jan 9, 2013
+
+--------------
+polkit 0.109
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.109**.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.108:
+
+ - David Zeuthen (4):
+ Post-release version bump to 0.109
+ Include gmodule-2.0 to avoid linker errors
+ Don't require libmozjs185 devel packages for polkit rules to work
+ Update NEWS for release
+
+Thanks to our contributors.
+
+David Zeuthen,
+December 19, 2012
+
+--------------
+polkit 0.108
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.108**.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.107:
+
+ - Adam Jackson (1):
+ PolkitAgent: Avoid crashing if initializing the server object fails
+
+ - David Zeuthen (5):
+ Post-release version bump to 0.108
+ Fall back to authenticating as uid 0 if the list of admin identities is empty
+ Dynamically load libmozjs185.so and cope with it not being available
+ docs: mention the audience for authorization rules
+ Update NEWS for release
+
+ - Ryan Lortie (1):
+ build: Fix .gir generation for parallel make
+
+Thanks to our contributors.
+
+David Zeuthen,
+November 14, 2012
+
+--------------
+polkit 0.107
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.10**.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.106:
+
+ - David Zeuthen (7):
+ Post-release version bump to 0.107
+ Update guidance on situations where there is no polkit authority
+ Nuke leftover polkit-backend-1.pc file
+ Nuke --enable-verbose flag
+ Introduce a polkit.Result enumeration for authorization rules
+ pkexec: add support for argv1 annotation and mention shebang-wrappers
+ Update NEWS for release
+
+ - Matthias Clasen (1):
+ Try harder to look up the right localization
+
+Thanks to our contributors.
+
+David Zeuthen,
+July 11, 2012
+
+--------------
+polkit 0.106
+--------------
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+This is polkit **0.106. There's a major change in this release which i**.
+a switch from .pkla files (keyfile-format) to .rules files
+(JavaScript), see
+
+ http://davidz25.blogspot.com/2012/06/authorization-rules-in-polkit.html
+
+for more information.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.30
+ - mozjs185
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.105:
+
+ - Colin Walters (3):
+ build: Check for mozjs185, not libjs
+ autogen.sh: Fix check for libtool (we only need libtoolize)
+ agenthelper-pam: Fix newline-trimming code
+
+ - David Zeuthen (65):
+ Post-release version bump to 0.106
+ Add experimental authority backend using JavaScript rule files
+ Include seat and session in Subject object
+ Pass details to JS functions and simplify how Subject instances are constructed
+ Clean up code a bit
+ Add a couple of more error checks
+ Collect garbage
+ Emit ::Changed signal after reloading rules
+ Reformat init.js and also avoid quoting non-string properties in toString()
+ Make it possible for JS code to change details
+ Add polkit.spawn() to spawn external programs
+ Make polkit.spawn() take an array of arguments instead of a command-line
+ Don't include command-line in spawning error messages
+ docs: add AUTHORIZATION RULES section to the polkit(8) man page
+ Also add an example of polkit.spawn() to polkit(8) man page
+ docs: clarify how rules files work
+ Also load rules from /usr/share/polkit/rules.d
+ Use addRule() and addAdminRule()
+ docs: emphasize that registered functions may actually never be called
+ Add test cases for evaluation order
+ Test that subject.isInGroup() works
+ Add netgroup support
+ Minor doc fixes
+ Mention unix-netgroup:xyz as a valid return value in addAdminRule() functions
+ Add test-cases and 10 second timeout for polkit.spawn()
+ Create rules.d directories
+ Update docs
+ docs: enclose local <citerefentry> in <link> to make links work
+ docs: update SEE ALSO to make each man page point to all other man pages
+ Clarify docs a bit
+ polkitd: add reference to polkit(8) from its man page
+ Fix speling
+ Fix a couple typos in the docs
+ Mention details["polkit.message"] and add an example using details
+ Use <variablelist> instead of <informaltable> for Subject attributes
+ Make polkit_details_insert() remove the key if passed value is NULL
+ Add real-world example featuring udisks2 and the drive.* variables it passes
+ Rename --enable-systemd to --enable-libsystemd-login
+ Fix distcheck
+ Add a systemd .service file
+ Nuke polkitbackend library, localauthority backend and extension system
+ Mention systemd(1) in the polkitd(8) man page
+ Store private binaries in /usr/lib/polkit-1 instead of /usr/libexec
+ Add default rules
+ Pass expanded identity list to the AuthenticationSession
+ Use "rules", not "scripts" to refer to files in rules.d
+ Terminate runaway scripts
+ Use a condition variable to signal that runaway killer thread is ready
+ Combine action and details parameters
+ Clarify pkexec(1) variables
+ Use g_unix_signal_add() from GLib 2.30
+ Move polkitd into src/polkitbackend
+ Ensure polkitd is rebuilt if libpolkit-backend-1.la changes
+ Remove unused DBUS_GLIB_* and GIO_* variables
+ Run polkitd as an unprivileged user
+ Log when the name org.fd.PolicyKit1 has been acquired
+ Rewrite the "Writing polkit applications" chapter
+ Update links to udisks docs
+ Update pkexec(1) man page with example
+ Small updates to the "Writing polkit applications" chapter
+ State that authorization rules must not rely on SpiderMonkey features
+ Make it work when using ConsoleKit instead of libsystemd-login
+ Mention the implications of returning *_keep in an authorization rule
+ docs: add a "make sure your app works when there's no polkitd(8)" note
+ Update NEWS for release
+
+Thanks to our contributors.
+
+David Zeuthen,
+June 7, 2012
+
+--------------
+polkit 0.105
+--------------
+
+This is polkit **0.10**.
+
+**WARNING:**
+This is a prerelease on the road to polkit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.28
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since polkit 0.104:
+
+ - David Zeuthen (11):
+ Post-release version bump
+ PolkitUnixSession: Set error if we cannot find a session for the given pid
+ PolkitUnixSession: Actually return TRUE if a session exists
+ PolkitAgentSession: Don't leak file descriptors
+ Add pkttyagent(1) helper
+ Make it possible to influence agent registration with an a{sv} parameter
+ Fix type in docs
+ Mention pkttyagent(1) in "Writing PolicyKit applications" chapter
+ Update the docs to use 'polkit' (instead of 'PolicyKit') as the name
+ Add Makefile rules for signing and publishing releases and docs
+ Update NEWS for release
+
+ - Ryan Lortie (1):
+ Various builddir != srcdir fixes
+
+Thanks to our contributors.
+
+David Zeuthen,
+April 24, 2012
+
+--------------
+PolicyKit 0.104
+--------------
+
+This is polkit **0.104**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.28
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+ - ConsoleKit OR systemd
+
+### Changes since PolicyKit 0.103:
+
+ - David Zeuthen (3):
+ Post-release version bump to 0.104
+ Detect whether systemd is available and default to use if so
+ Update NEWS for release
+
+ - Matthias Clasen (1):
+ Add optional systemd support
+
+ - Nikki VonHollen (2):
+ Bug 43608 – Add unit tests
+ Bug 43610 - Add netgroup support
+
+Thanks to our contributors.
+
+David Zeuthen,
+January 3, 2012
+
+--------------
+PolicyKit 0.103
+--------------
+
+This is polkit **0.103**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.28
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+ - IMPORTANT: As of release 0.103, the default Authority backend now
+ - defaults to allowing members of the 'wheel' group to authenticate as
+ - an administator since this is common usage in popular Linux
+ - distributions. Distributors can change this by patching the
+ - 50-localauthority.conf file in /etc/polkit-1/localauthority.conf.d as
+ - needed.
+
+### Changes since PolicyKit 0.102:
+
+ - Alan Near (1):
+ Mistype in DBus object: PoliycKit1 -> PolicyKit1
+
+ - David Zeuthen (7):
+ Post-release version bump to 0.103
+ Add support for the org.freedesktop.policykit.imply annotation
+ Add --no-debug option and use this for D-Bus activation
+ Bug 41025 – Add org.freedesktop.policykit.owner annotation
+ Default to AdminIdentities=unix-group:wheel for local authority
+ Update NEWS for release
+ Fix typo
+
+Thanks to our contributors.
+
+David Zeuthen,
+December 6, 2011
+
+--------------
+PolicyKit 0.102
+--------------
+
+This is polkit **0.102**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.28
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.101:
+
+ - Benjamin Otte (1):
+ introspection: Add --c-include to the gir files
+
+ - David Zeuthen (7):
+ Post-release version bump to 0.102
+ Don't show diagnostic messages intended for the administrator to the end u
+ PolkitUnixProcess: Clarify that the real uid is returned, not the effectiv
+ Make PolkitUnixProcess also record the uid of the process
+ Use polkit_unix_process_get_uid() to get the owner of a process
+ pkexec: Avoid TOCTTOU problems with parent process
+ Update NEWS for release
+
+ - Evan Nemerson (1):
+ Specify exported pkg-config files in GIRs
+
+ - Marc Deslauriers (1):
+ Fix multi-line pam prompt handling
+
+ - Martin Pitt (3):
+ Ignore .po/ for intltool
+ Fix backend crash if a .policy file does not specify <message>
+ Bug 38769 — pkexec: Support running X11 apps
+
+Thanks to our contributors.
+
+David Zeuthen,
+August 1, 2011
+
+--------------
+PolicyKit 0.101
+--------------
+
+This is polkit **0.101**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.28
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.100:
+
+ - Adrian Bunk (1):
+ Bug 27253 – Use GOBJECT_INTROSPECTION_CHECK from gobject-introspection
+
+ - David Zeuthen (16):
+ Post-release version bump to 0.101
+ Bug 30653 – No way to detect cancellation in pkexec
+ Bug 27081 – pkexec fails to build on non glibc systems
+ Bug 30438 – PolicyKit fails to build on AIX
+ Bug 32334 – Always set polkit.retains_authorization_after_challenge
+ Fix a memory leak
+ Be more specific about what info we want when enumerating files
+ Make pkcheck(1) report if the authentication dialog was dismissed
+ pkcheck: Make it possible to list and revoke temporary authorizations
+ Be a bit more careful parsing the command-line
+ Bug 29712 – Use monotonic for temporary authorizations
+ Allow overriding message shown in authentication dialog
+ Deprecated PolkitBackendActionLookup
+ Fix a couple of warnings triggered by gcc 4.6
+ Build examples by default and fix compiler warnings
+ Update NEWS for release
+
+ - Michael Biebl (1):
+ Bug 29871 – Fix build failures with binutils-gold
+
+Thanks to our contributors.
+
+David Zeuthen,
+March 3, 2011
+
+--------------
+PolicyKit 0.100
+--------------
+
+This is polkit **0.100**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.25.12
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.99:
+
+ - David Zeuthen (12):
+ Post-release version bump to 0.100
+ Add missing GObject Introspection annotations
+ Build gir/typelib for PolkitAgent-1.0
+ Fix-up PolkitAgentSession to use GObject properties
+ Improve error reporting for authentication sessions
+ Add some debug info that can be shown with the env var POLKIT_DEBUG
+ Fix up debug and timeouts in agent helper
+ Always pass non-zero value to g_once_init_leave()
+ Add a note about POLKIT_DEBUG
+ Pass caller and subject pid to authentication agent
+ Update NEWS for release
+ Fix 'make distcheck'
+
+Thanks to our contributors.
+
+David Zeuthen,
+February 21, 2011
+
+--------------
+PolicyKit 0.99
+--------------
+
+This is polkit **0.99**
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.25.12
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.98:
+
+ - Colin Walters (3):
+ Remove duplicate definitions of enumeration types
+ Fix (correct) GCC warning about possibly-uninitialized variable
+ Fix another GCC uninitialized variable warning
+
+ - David Zeuthen (2):
+ Post-release version bump to 0.99
+ Update NEWS for release
+
+ - Vincent Untz (1):
+ Bug 29816 – Install polkitagentenumtypes.h
+
+Thanks to our contributors.
+
+David Zeuthen,
+September 15, 2010
+
+--------------
+PolicyKit 0.98
+--------------
+
+This is polkit **0.98**.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.25.12
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.97:
+
+ - David Zeuthen (11):
+ Post-release version bump to 0.98
+ Require GLib 2.25.12
+ Fix scanning of unix-process subjects
+ Add textual authentication agent and use it in pkexec(1)
+ Fix ConsoleKit interaction bug
+ pkexec: add --disable-internal-agent option
+ pkcheck: add --enable-internal-agent option
+ Fix wording in pkexec(1) man page
+ Various doc cleanups
+ Fix dist-check
+ Update NEWS for release
+
+Thanks to our contributors.
+
+David Zeuthen,
+August 20, 2010
+
+--------------
+PolicyKit 0.97
+--------------
+
+This is polkit **0.97**.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+The main change since the previous version is a port from eggdbus to
+GLib's new D-Bus implementation. Other changes includes various bug
+fixes and support for shadow authentication. Support for the
+AddLockdown() and RemoveLockdown() methods has been removed. You will
+need an updated version of PolicyKit-gnome to go with this release.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.25.11
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam (optional)
+
+### Changes since PolicyKit 0.96:
+
+ - Andrew Psaltis (1):
+ Add shadow support
+
+ - Dan Rosenberg (1):
+ Bug 26982 – pkexec information disclosure vulnerability
+
+ - David Zeuthen (23):
+ Post-release version bump to 0.97
+ Port core bits to gdbus
+ Port CK class to gdbus
+ Port PolkitBackendInteractiveAuthority to gdbus
+ Port PolkitAgent to gdbus
+ Add generated docbook D-Bus API docs to git
+ Nuke eggdbus usage
+ Make polkitd accept --replace and gracefully handle SIGINT
+ Implement polkit_temporary_authorization_new_for_gvariant()
+ Remove Lock Down functionality
+ Make NameOwnerChanged a private impl detail of the interactive authority
+ Update README
+ Merge remote branch 'origin/gdbus'
+ Add a GPermission implementation
+ PolkitAuthority: Implement failable initialization
+ PolkitAuthority: Add g_return_if_fail() checks
+ Add g_return_if_fail() to all public API entry points
+ Use polkit_authority_get_sync() instead of deprecated polkit_authority_get
+ PolkitBackend: Don't export unneeded convenience API
+ Update GI annotations
+ Don't dist org.freedesktop.ConsoleKit.xml; It's dead, Jim
+ Properly reference headers
+ Update NEWS for release
+
+ - Petr Mrázek (1):
+ Bug 29051 – Configuration reload on every query
+
+Thanks to our contributors.
+
+David Zeuthen,
+August 9, 2010
+
+--------------
+PolicyKit 0.96
+--------------
+
+This is polkit **0.96**. This is supposed to be the last release until 1.0.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.21.4
+ - eggdbus-1 >= 0.6
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam
+
+### Changes since PolicyKit 0.95:
+
+ - David Zeuthen (15):
+ Bug 25367 — Also read local authority configuration data from /etc
+ Fix logic error in pk-example-frobnicate
+ Run the open_session part of the PAM stack in pkexec(1)
+ Fix up last comment
+ Bug 25594 – System logging
+ Remove trailing whitespace from log messages
+ Properly handle return value from getpwnam_r()
+ Fix error message when no authentication agent is available
+ Make pkexec(1) validate environment variables
+ Make pkexec(1) use the syslogging facilities
+ Save original cwd in pkexec(1) since it will change during the life-time
+ Complain on stderr, not stdout
+ Post-release version bump to 0.96
+ Don't log authorization checks
+ Update NEWS for release
+
+David Zeuthen,
+January 15, 2010
+
+--------------
+PolicyKit 0.95
+--------------
+
+This is polkit **0.95**. This is supposed to be the last release until 1.0.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.21.4
+ - eggdbus-1 >= 0.6
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam
+
+### Changes since PolicyKit 0.94:
+
+ - Alexander Sack (1):
+ Bug 24566 – Properly _ref authority in singleton constructor
+
+ - Andreas Sandberg (1):
+ Bug 24235 – polkit-agent-helper may call pam_end with a stale pam handle
+
+ - Bastien Nocera (1):
+ Fix process start time when using polkit_unix_process_new_full()
+
+ - David Zeuthen (20):
+ Post-release version bump to 0.95
+ Use correct program name when complaining about not being setuid root
+ Sort by action id in pkaction(1) output
+ Bug 23867 – UnixProcess vs. SystemBusName aliasing
+ Implement lockdown for the Local Authority implementation
+ Remove POLKIT_USER from configuration summary
+ Add missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE
+ Pass --libtool to g-ir-scanner
+ Clarify comment on where to find process start-time on Linux
+ Add properties with information about the currently used authority
+ Clarify when AllowUserInteraction should and shouldn't be used
+ Add methods AddLockdownForAction() and RemoveLockdownForAction()
+ Port lockdown from pklalockdown(1) to D-Bus methods
+ Drop ununsed policykit actions
+ Remove TODO about symbol visibility as this has been fixed for a while
+ Clarify pklocalauthority(8) man page
+ Properly validate all arguments passed via D-Bus
+ Add Python example
+ Fix make distcheck
+ Update NEWS for release
+
+ - Matthias Clasen (1):
+ Bug 24640 – Typos in pklocalauthority(8)
+
+ - Michael Biebl (8):
+ Trim the list of exported symbols
+ Use _polkit_agent_marshal prefix
+ Make private symbols accessible to libpolkitagent and libpolkitbackend
+ Make examples optional
+ Enable silent rules
+ Remove POLKIT_USER option
+ Don't include Polkit-1.0.gir in the dist tarball
+ Bug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS
+
+ - Samuel Thibault (1):
+ Bug 24495 – Fails to build on platforms without PATH_MAX (like hurd)
+
+David Zeuthen,
+November 13, 2009
+
+--------------
+PolicyKit 0.94
+--------------
+
+This is polkit **0.94**.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.21.4
+ - eggdbus-1 >= 0.5
+ - gobject-introspection >= 0.6.2 (optional)
+ - pam
+
+### Changes since PolicyKit 0.93:
+
+ - David Zeuthen (13):
+ Post-release version bump to 0.94
+ Require correct versions of glib and eggdbus
+ Ignore .pkla files starting with dot and don't segfault on error path
+ Allow unprivileged callers to check authorizations
+ Don't spawn man(1) from a setuid program
+ Add polkit.retains_authorization_after_challenge to authz result
+ Ensure all fds except stdin/stdout/stderr are closed after exec(2)
+ Be more careful when determining process start time
+ Pass the right struct offset for the ::changed class signal handler
+ Don't set the GError if the process doesn't exist
+ Remove temporary authorization when the subject it applies to vanishes
+ Generate GI gir and typelibs for libpolkit-gobject-1
+ Update NEWS for release
+
+ - Joe Marcus Clarke (1):
+ Bug 23093 – FreeBSD portability fixes
+
+David Zeuthen,
+August 12, 2009
+
+--------------
+PolicyKit 0.93
+--------------
+
+This is polkit **0.93**.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.21.4
+ - eggdbus-1 >= 0.5
+ - pam
+
+### Changes since PolicyKit 0.92:
+
+ - David Zeuthen (16):
+ Post-release version bump to 0.93
+ GIO modules need to be prefix with lib
+ Cancel an authentication if the unique name for the subject vanishes
+ Plug a couple of memory leaks
+ Move local authority management to a separate library
+ Rip out polkit-local and refactor local authority to only use tmp authz
+ Move authentication agent bits to separate authority subclass
+ Also pass the identity of the subject we are checking for
+ Actually make the local authority look up authorization files
+ In .pkla files, use Result{Any,Inactive,Active} instead of just Result
+ Rename some man pages and the daemon binary
+ Add docs detailing how the Local Authority works
+ Add support for querying and revoking temporary authorizations
+ Fix make distcheck
+ Update TODO
+ Update NEWS for release
+
+ - Yanko Kaneti (2):
+ Use unique ids for sections to prevent them being autogenerated
+ More unique ids to get the docs build fully predictable
+
+David Zeuthen,
+July 20th, 2009
+
+--------------
+PolicyKit 0.92
+--------------
+
+This is polkit **0.92**.
+
+**WARNING:**
+This is a prerelease on the road to PolicyKit
+1.0. Public API might change and certain parts of the code still needs
+some security review. Use at your own risk.
+
+### Build requirements:
+
+ - glib, gobject, gio >= 2.14
+ - eggdbus-1 >= 0.4
+ - pam
+
+### Changes since PolicyKit 0.91:
+
+ - David Zeuthen (36):
+ post-release version bump to 0.92
+ install gtkdoc HTML in the proper location
+ Fix D-Bus policy to work with non-permissive D-Bus
+ Only allow privileged apps to check authz and add ActionLookup interface
+ Change the PolkitAuthorizationResult enumeration into an object
+ Port examples and command-line tools to new API
+ Move docs to proper location
+ Add a pkexec(1) command
+ Mention /usr/bin/pkexec in the configure blurb
+ Fix a bug where details were not shown for normal pkexec usage
+ Use an object, not a GHashTable when passing details around
+ Forgot to add source for PolkitDetails
+ Change the defaults for .run-frobnicate to auth_self_keep
+ Require eggdbus-1 >= 0.4
+ Only free hash table if it's not NULL
+ Avoid returning an error if no authentication agent is available
+ Clarify docs for is_challenge member of the AuthorizationResult struct
+ Add pkcheck(1) command to check for authorizations
+ nullbackend: Catch up with latest API changes
+ Return the icon name instead of a GIcon in PolkitActionDescription
+ Add pkaction(1) and nuke polkit-1(1) commands
+ Update SEE ALSO sections in man pages
+ Add a man page for polkit-1(8)
+ First cut at some high-level docs
+ Improve pkexec(1) man page by adding screenshots of authentication dialogs
+ Add some more API docs
+ Add a "PolicyKit Overview" section to the docs
+ Consolidate all gtk-doc stuff in docs/polkit
+ Expand on the D-Bus docs
+ Use .../extensions instead of ../backends for loading extensions
+ Minor doc fixes
+ Move the doc chapters around a bit
+ Change GNOME to freedesktop.org in the docs
+ Fix make distcheck
+ Update NEWS
+ Also dist polkitd-1.xml
+
+ - Richard Hughes (2):
+ fix up gtk-doc API markup for a couple of functions
+ add a draft version of the porting guide -- WIP
+
+David Zeuthen,
+June 8, 2009
diff --git a/README b/README.md
index 3eaa811..f1dec0a 100644
--- a/README
+++ b/README.md
@@ -17,29 +17,28 @@ Latest documentation, reference manual and API description of polkit can be foun
RELEASES
========
-Older releases of polkit (until 0.120) are available in compressed tarballs from
-
- http://www.freedesktop.org/software/polkit/releases/
-
Latest releases are available in compressed tarballs from
- https://gitlab.freedesktop.org/polkit/polkit/releases
+ https://www.freedesktop.org/software/polkit/releases/
To verify the authenticity of the compressed tarball, use this command
- $ gpg --verify polkit-$(VERSION).tar.gz.sign polkit-$(VERSION).tar.gz
- gpg: Signature made Tue 23 Apr 2019 04:19:29 PM CEST using RSA key ID FFDCE258
- gpg: Good signature from "Jan Rybar (Red Hat) <jrybar@redhat.com>"
+``` bash
+$ gpg --verify polkit-$(VERSION).tar.gz.sign polkit-$(VERSION).tar.gz
+$ gpg: Signature made Tue 23 Apr 2019 04:19:29 PM CEST using RSA key ID FFDCE258
+$ gpg: Good signature from "Jan Rybar (Red Hat) <jrybar@redhat.com>"
+```
+
+Public key available at
-Public key available here
- http://keys.gnupg.net/pks/lookup?op=get&search=0x8CEB3030FFDCE258
+ https://keys.openpgp.org/vks/v1/by-fingerprint/7FFB7D6BD83147D74284E3178CEB3030FFDCE258
BUGS and DEVELOPMENT
====================
-Please report non-security bugs via the freedesktop.org GitLab at
+Please report non-security bugs via the polkit's freedesktop.org GitLab at
https://gitlab.freedesktop.org/polkit/polkit/issues
@@ -48,7 +47,7 @@ SECURITY ISSUES
===============
Please report any security issues not yet known to public
-by creating new issue and checking the "This issue is confidential" checkbox.
+by creating new issue and checking the ***This issue is confidential*** checkbox.
https://gitlab.freedesktop.org/polkit/polkit/issues
diff --git a/configure.ac b/configure.ac
index 0280dde..3303a75 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2,7 +2,7 @@ dnl Process this file with autoconf to produce a configure script.
AC_PREREQ(2.59c)
AC_INIT([polkit], [0.120], [http://lists.freedesktop.org/mailman/listinfo/polkit-devel], , [http://www.freedesktop.org/wiki/Software/polkit])
-AM_INIT_AUTOMAKE([])
+AM_INIT_AUTOMAKE([foreign])
AC_CONFIG_HEADERS(config.h)
AC_CONFIG_MACRO_DIR([buildutil])
m4_include([buildutil/ax_cxx_compile_stdcxx.m4])