diff options
author | Vincent Mihalkovic <vmihalko@redhat.com> | 2022-03-17 13:12:27 +0100 |
---|---|---|
committer | Vincent Mihalkovic <vmihalko@redhat.com> | 2022-03-21 15:27:11 +0100 |
commit | 074b2d548daa240032ec7267bdedc2afb740c696 (patch) | |
tree | 04b16d345710e142ff89213fa743bc8a00f4c448 | |
parent | b10a1bdb697045db40774f2a9a8c58ae5c7189c3 (diff) | |
download | polkit-074b2d548daa240032ec7267bdedc2afb740c696.tar.gz |
docs: transform repo doc files to Markdown
-rw-r--r-- | HACKING.md (renamed from HACKING) | 37 | ||||
-rw-r--r-- | Makefile.am | 2 | ||||
-rw-r--r-- | NEWS | 1593 | ||||
-rw-r--r-- | NEWS.md | 1596 | ||||
-rw-r--r-- | README.md (renamed from README) | 23 | ||||
-rw-r--r-- | configure.ac | 2 |
6 files changed, 1630 insertions, 1623 deletions
@@ -3,45 +3,47 @@ SCM - anonymous checkouts - $ git clone git://git.freedesktop.org/git/PolicyKit.git + `$ git clone git://git.freedesktop.org/git/PolicyKit.git` - checkouts if you got an ssh account on fd.o (username@ is optional) - $ git clone ssh://[username@]git.freedesktop.org/git/PolicyKit.git + `$ git clone ssh://[username@]git.freedesktop.org/git/PolicyKit.git` - commit to local repository - $ git commit -a + `$ git commit -a` - push local repository to master repository at fd.o (remember most patches requires review at the mailing list) - $ git push + `$ git push` - pull changes from master repository at fd.o - $ git pull + `$ git pull` - diff of working tree versus local repository - $ git diff + `$ git diff` - diff of local repository vs. master repository at fd.o synchronize with upstream repo: - $ git pull + `$ git pull` (possibly merge changes) generate the diff: - $ git diff origin HEAD + `$ git diff origin HEAD` - influential environment variables (set these in e.g. .bash_profile) +```bash export GIT_AUTHOR_NAME='Your Full Name' export GIT_COMMITTER_NAME='Your Full Name' export GIT_COMMITTER_EMAIL=youremail@domain.net export GIT_AUTHOR_EMAIL=youremail@domain.net +``` - see also @@ -54,13 +56,15 @@ Committing code - Commit messages should be of the form (the five lines between the lines starting with ===) -=== begin example commit === -short explanation of the commit - -Longer explanation explaining exactly what's changed, whether any -external or private interfaces changed, what bugs were fixed (with bug -tracker reference if applicable) and so forth. Be concise but not too brief. -=== end example commit === +> === **begin example commit** === +> short explanation of the commit +> +> +> +> Longer explanation explaining exactly what's changed, whether any +> external or private interfaces changed, what bugs were fixed (with bug +> tracker reference if applicable) and so forth. Be concise but not too brief. +> === **end example commit** === - Always add a brief description of the commit to the _first_ line of the commit and terminate by two newlines (it will work without the @@ -75,6 +79,7 @@ tracker reference if applicable) and so forth. Be concise but not too brief. sent to a mailing list it's copied from there. - When committing code on behalf of others use the --author option, e.g. + ```bash git commit -a --author "Joe Coder <joe@coder.org>" Coding Style @@ -99,5 +104,5 @@ Code of Conduct, based on the Contributor Covenant. Please conduct yourself in a respectful and civilized manner when using the above mailing lists, bug trackers, etc: - https://www.freedesktop.org/wiki/CodeOfConduct + `https://www.freedesktop.org/wiki/CodeOfConduct` diff --git a/Makefile.am b/Makefile.am index bfdfa8c..1ac687a 100644 --- a/Makefile.am +++ b/Makefile.am @@ -9,7 +9,7 @@ endif NULL = EXTRA_DIST = \ - HACKING \ + HACKING.md \ meson.build \ meson_options.txt \ meson_post_install.py \ @@ -1,1593 +0,0 @@ --------------- -polkit 0.120 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - - -NOTICE: -This is the LAST version to support AUTOTOOLS build system, as it has been obsoleted -by meson build system. -The next release of polkit will REQUIRE meson build system. - - -Highlights: - tarball fix-ups - re-enabled documentation - Intltool to gettext migration - new translations - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-78 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - gettext - meson (optional) - autotools (DEPRECATED) - -Changes since polkit 0.119: - - Inigo Martinez: - transition from Intltool to gettext - - Simon McVittie: - several tarball, meson and pipeline fixups - - Hugo Carvalho: - Portuguese translation - - Sergiu Bivol: - Romanian translation - - -Many thanks to all contributors! - -Jan Rybar et al., -September 30, 2021 - - --------------- -polkit 0.119 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.119. - -Highlights: - meson build system added - CVE-2021-3560 mitigation - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-78 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.118: - - Inigo Martinez: - meson build system added alongside autotools (many thanks!!) - - Matthias Classen: - properties in text listener - - René Genz: - typos fixups - - Balázs Úr: - Update Hungarian translation - - Hendrik Werner: - meson post-install script mod to avoid calling external processes - - Kevin Backhouse, Jan Rybar: - CVE-2021-3560 mitigation - -Many thanks to all contributors! - -Jan Rybar et al., -June 3, 2021 - --------------- -polkit 0.118 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.118. - -Highlights: - move to mozjs78 - tarball CI fix - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-78 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.117: - - Xi Ruoyao: - tarball fixup for distcheck - - Valentin David: - updated dependency to mozjs78 - -Many thanks to all contributors! - -Jan Rybar et al., -September 8, 2020 - --------------- -polkit 0.117 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.117. - -Highlights: - Gitlab CI activation - all merge requests are tested before merged - New Norwegian translation, several other language updates - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-68 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.116: - - Bastien Nocera: - Activated Gitlab CI - - Xi Ruoyao: - Updated dependency to mozjs68 - - Kalev Lember, Jan Rybar - Memory management fixes - - Anders Jonsson, Karl Ove Hufthammer, Andika Triwidada, Yuri Chornoivan: - Language updates - -Many thanks to all contributors! - -Jan Rybar et al., -July 24, 2020 - --------------- -polkit 0.116 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.116. - -Highlights: - Fix of CVE-2018-19788, high UIDs caused overflow in polkit; - Fix of CVE-2019-6133, kernel vulnerability (Slowfork) allowed local privilege escalation. - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-60 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.115: - - Kyle Walker: - Leaking zombie child processes - - Jan Rybar: - Possible resource leak found by static analyzer - Output messages tuneup - Sanity fixes - pkttyagent tty echo disabled on SIGINT - - Ray Strode: - HACKING: add link to Code of Conduct - - Philip Withnall: - polkitbackend: comment typos fix - - Zbigniew Jędrzejewski-Szmek: - configure.ac: fix detection of systemd with cgroups v2 - CVE-2018-19788 High UIDs overflow fix - - Colin Walters: - CVE-2019-6133 Slowfork vulnerability fix - - Matthew Leeds: - Allow unset process-uid - - Emmanuele Bassi - Port the JS authority to mozjs-60 - - Göran Uddeborg: - Use JS_EncodeStringToUTF8 - -Many thanks to all contributors! - -Jan Rybar et al., -April 25, 2019 - ---------------- -polkit 0.115 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.115. - -Highlights: - Fixes CVE-2018-1116, a local information disclosure and denial of service - caused by trusting client-submitted UIDs when referencing processes. - Thanks to Matthias Gerstner of the SUSE security team for reporting - this issue. - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-52 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.114: - -Miloslav Trmač (1): - Fix CVE-2018-1116: Trusting client-supplied UID - -Ray Strode (3): - Post-release version bump to 0.115 - jsauthority: pass "%s" format string to remaining report function - NEWS: fix date from 2017 to 2018 for 0.114 entry - -Thanks to our contributors. - -Colin Walters and Miloslav Trmač, -July 10, 2018 - --------------- -polkit 0.114 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.114. - -Highlights: - Port to mozjs 52, the latest version of the firefox JavaScript engine. - - Add gettext support for policy files - - Fixes for various memory leaks - -Build requirements - - glib, gobject, gio >= 2.32 - mozjs-52 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.113: - -Anders Jonsson (2): - pkcheck: fix man typos - Add Swedish translation - -Antoine Jacoutot (1): - Add support for OpenBSD - -Christian Kirbach (1): - Add German translation - -Colin Walters (3): - build: Pull in GCC warning infra from ostree - build: Use AC_USE_SYSTEM_EXTENSIONS - tests: Correct boundary test for overflow - -Dariusz Gadomski (2): - Fix multi-line pam text info. - Refactor send_to_helper usage - -Gabor Kelemen (1): - Add initial Hungarian translation, and add hu to LINGUAS - -Jeremy Linton (5): - change mozjs interface module to c++ - Switch to hard requiring mozjs24 - Fix warnings caused by building with C++ - Replace autocompartment - test: Add a test case to handle actions without explicit rules - -Jiří Klimeš (1): - trivial: fix deprecated indication for polkit_agent_register_listener() - -Matthias Clasen (1): - Add gettext support for .policy files - -Miloslav Trmač (21): - Post-release version bump to 0.114 - Consistently use HAVE_NETGROUP_H instead of HAVE_OPENBSD - Fix a memory leak of PolkitAgentListener's Server object - Remove polkitbackendconfigsource.[ch] - Add Slovak translation by Dusan Kazik <prescott66@gmail.com> - Add Indonesian translation by Andika Triwidada - Add Chinese (Taiwan) translation - Fix a typo in polkit(8) - Simplify GVariant reference counting - Fix a memory leak on an error path of lookup_asv (twice) - Fix a memory leak in server_handle_register_authentication_agent_with_options - Fix a memory leak in server_handle_unregister_authentication_agent - Fix a memory leak in server_handle_authentication_agent_response{,2} - Fix memory leaks in server_handle_*_temporary_authorizations - Fix error handling in polkit_authority_enumerate_temporary_authorizations_finish - Fix a memory leak per agent authentication - Fix a memory leak on agent authentication cancellation - Audit and fix GVariant reference counting - Fix help for (pkttyagent -s) - Fix a race condition when terminating runaway_killer_thread - Move to current GLib - -Mingye Wang (Arthur2e5) (1): - Add zh_CN translation - -Muhammet Kara (1): - Added Turkish translation - -OBATA Akio (1): - Add support for NetBSD - -Peter Hutterer (1): - gettext: switch to default-translate "no" - -Philip Withnall (3): - polkit: Add g_autoptr() support for GObject-derived polkit types - data: Set GIO_USE_VFS=local in the environment - polkitbackend: Fix typos in a couple of initialisation error messages - -Piotr Drąg (1): - Add Polish translation - -Rafael Fontenelle (1): - Add Brazilian Portuguese translation - -Ray Strode (34): - configure: bump mozjs requirement to 52 - jsauthority: fix how classes are defined - jsauthority: use JS_FN instead of JS_FS - jsauthority: get rid of JSRuntime - jsauthority: change how setVersion is called - jsauthority: call JS_Init - jsauthority: call JS_InitSelfHostedCode - jsauthority: change how JIT is disabled - jsauthority: JS::SetWarningReporter instead of JS_SetErrorReporter - jsauthority: add UTF8 suffix to renamed functions - jsauthority: pass "%s" format string to report functions - jsauthority: s/JSBool/bool/ - jsauthority: s/jsval/JS::Value/ - jsauthority: s/JSVAL_NULL/JS::NullValue()/ - jsauthority: s/JSVAL_VOID/JS::UndefinedValue()/ - jsauthority: s/OBJECT_TO_JSVAL/JS::ObjectValue/ - jsauthority: s/STRING_TO_JSVAL/JS::StringValue/ - jsauthority: s/BOOLEAN_TO_JSVAL/JS::BooleanValue/ - jsauthority: JSVAL_TO_OBJECT (o) to o.toObjectOrNull() - jsauthority: JSVAL_TO_STRING (s) to s.toString() - jsauthority: JSVAL_IS_STRING (s) to s.isString() - jsauthority: JSVAL_IS_NULL (o) to o.isNull() - jsauthority: Fix up JS_CallFunctionName invocations - jsauthority: use InterruptCallback api instead of OperationCallback - jsauthority: redo how global objects are set up - jsauthority: root some locals to the context - jsauthority: adapt arguments for new JS::Compile API - jsauthority: adapt arguments for new JS_ExecuteScript API - jsauthority: use JS::Evaluate instead of JS_EvaluateScript - jsauthority: fix up set_property methods - jsauthority: stop using JS_GetStringCharsZ - jsauthority: switch from JS_ConvertArguments to JS::CallArgsFromVp - jsauthority: re-enable JIT - Port JavaScript authority to mozjs52 - -Rui Matos (1): - polkitpermission: Fix a memory leak on authority changes - -Sebastien Bacher (1): - Support polkit session agent running outside user session - -Stef Walter (2): - polkitagent: Fix access after dereference on hashtable - polkitagent: No double warnings in polkit_agent_listener_register() - -Sven Eden (1): - configure: enable elogind support in PolicyKit - -Yuri Chornoivan (1): - Add Ukrainian translation - -enkore (1): - Fix abnomal formatting of authentication header lines - -muzena (1): - Add hr.po - -Thanks to our contributors. - -Colin Walters and Miloslav Trmač, -April 2, 2018 - --------------- -polkit 0.113 --------------- - -NOTE: This release is an important security update, see below. - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.113. - -Highlights: - Fixes CVE-2015-4625, a local privilege escalation due to predictable - authentication session cookie values. Thanks to Tavis Ormandy, Google Project - Zero for reporting this issue. For the future, authentication agents are - encouraged to use PolkitAgentSession instead of using the D-Bus agent response - API directly. - - Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the - JavaScript interpreter, possibly leading to local privilege escalation. - - Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate - action IDs, possibly leading to local privilege escalation. Thanks to - Laurent Bigonville for reporting this issue. - - Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to - Tavis Ormandy, Google Project Zero, for reporting this issue. - - On systemd-213 and later, the “active” state is shared across all sessions of - an user, instead of being tracked separately. - - (pkexec), when not given a program to execute, runs the users’ shell by - default. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 or mozjs-17.0 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.112: - -Colin Walters (17): - PolkitSystemBusName: Add public API to retrieve Unix user - examples/cancel: Fix to securely lookup subject - sessionmonitor-systemd: Deduplicate code paths - PolkitSystemBusName: Retrieve both pid and uid - Port internals non-deprecated PolkitProcess API where possible - Use G_GNUC_BEGIN_IGNORE_DEPRECATIONS to avoid warning spam - pkexec: Work around systemd injecting broken XDG_RUNTIME_DIR - pkexec: Support just plain "pkexec" to run shell - .dir-locals: Style for Emacs - we don't use tabs - authority: Avoid cookie wrapping by using u64 counter - CVE-2015-3218: backend: Handle invalid object paths in RegisterAuthenticationAgent - build: Start using git.mk - Revert "authority: Avoid cookie wrapping by using u64 counter" - authority: Add a helper method for checking whether an identity is root - CVE-2015-4625: Use unpredictable cookie values, keep them secret - CVE-2015-4625: Bind use of cookies to specific uids - README: Note to send security reports via DBus's mechanism - -Kay Sievers (1): - sessionmonitor-systemd: prepare for D-Bus "user bus" model - -Lukasz Skalski (1): - polkitd: Fix problem with removing non-existent source - -Max A. Dednev (1): - authority: Fix memory leak in EnumerateActions call results handler - -Miloslav Trmač (24): - Post-release version bump to 0.113 - Don't discard error data returned by polkit_system_bus_name_get_user_sync - Fix a memory leak - Refuse duplicate --user arguments to pkexec - Fix a possible NULL dereference. - Remove a redundant assignment. - Simplify forced error domain registration - Fix a typo, s/Evaluting/Evaluating/g - s/INCLUDES/AM_CPPFLAGS/g - Fix duplicate GError use when "uid" is missing - Fix a crash when two authentication requests are in flight. - docs: Update for changes to uid binding/AuthenticationAgentResponse2 - Don't pass an uninitialized JS parameter - Don't add extra NULL group to subject.groups - Don't store unrooted jsvals on heap - Fix a per-authorization memory leak - Fix a memory leak when registering an authentication agent - Wrap all JS usage within “requests” - Register heap-based JSObject pointers to GC - Prevent builds against SpiderMonkey with exact stack rooting - Clear the JS operation callback before invoking JS in the callback - Fix spurious timeout exceptions on GC - Fix GHashTable usage. - Fix use-after-free in polkitagentsession.c - -Philip Withnall (1): - sessionmonitor-systemd: Use sd_uid_get_state() to check session activity - -Rui Matos (1): - PolkitAgentSession: fix race between child and io watches - -Simon McVittie (1): - Use libsystemd instead of older libsystemd-login if possible - -Ting-Wei Lan (1): - build: Fix several issues on FreeBSD - -Xabier Rodriguez Calvar (1): - Fixed compilation problem in the backend - -Thanks to our contributors. - -Colin Walters and Miloslav Trmač, -July 2, 2015 - --------------- -polkit 0.112 --------------- - -NOTE: This release is an important security update, see below. - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.112. - -Highlights: - This release fixes CVE-2013-4288: Race condition with process subjects that do - not have securely determined uid. - - pkcheck(1) now supports a new format for the --process argument; all - applications need to use the new format to avoid a race condition (or use - --system-bus-name to identify the process instead). - - Similarly, applications using the API should always use - polkit_unix_process_new_for_owner(). polkit_unix_process_new() and - polkit_unix_process_new_full() are unsafe and have been deprecated. - - Thanks to Sebastian Krahmer of the SUSE Security Team for reporting this issue. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 or mozjs-17.0 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.111: - -Colin Walters (2): - polkitunixprocess: Deprecate racy APIs - pkcheck: Support --process=pid,start-time,uid syntax too - -Miloslav Trmač (1): - Post-release version bump to 0.112 - -Tomas Bzatek (1): - Use GOnce for interface type registration - -Tomas Chvatal (2): - Add czech translation po file to distribution. - Update the czech once more with newest pot file. - -Thanks to our contributors. - -Colin Walters and Miloslav Trmač, -September 18, 2013 - --------------- -polkit 0.111 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.111. - -Highlights: - The JavaScript interpreter is now mandatory. - Both js185 and mozjs17 versions of SpiderMonkey are supported. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 or mozjs-17.0 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.110: - -Colin Walters (6): - mocklibc: Only require autoconf 2.63 - configure: Specify GLib min/max version - jsauthority: We can really only handle a string - jsauthority: Use JSVAL_NULL rather than {0} struct initialization - Revert "Dynamically load libmozjs185.so and cope with it not being available" - jsauthority: Work with mozjs-17.0 too - -David Zeuthen (1): - Post-release version bump to 0.111 - -Giovanni Campagna (1): - build: try harder to avoid systemd/consolekit misconfiguration - -Michael Biebl (1): - man: Fix pkaction man page wrt to --action-id option - -Miloslav Trmač (28): - Clean (git status) after autogen.sh - Fix build with srcdir!=builddir - Fix DOC_SOURCE_DIR for builddir != srcdir - Fix various memory leaks. - Add annotation glossary - Leave out backend from gtk-doc generation - Fix most "undocumented symbol" warnings - Move polkit_temporary_authorization_new to private header file. - Include documentation of polkit_action_description_get_annotation_keys - Document deprecated functions. - Fold enum documentation into relevant classes - Fix an obvious docstring typo. - Add annotations for element types of returned lists - Add a FIXME to polkitprivate.h - Use auth_admin* instead of auth_self* in examples - More warnings about using auth_self* - Fix a TypeError when no admin rules are registered - Fix handling of null returned from _runRules - Refuse non-string parameters to Polkit.spawn() - Drop unused variable - Fix a memory leak - Remove an unused va_start - Don't spawn man for --help - Fix package version / bug report address mixing - Add bug reporting address and home page to --help output - Refuse unrecognized command-line operands - Exit pkaction with status 0 on success - Fix inclusion of COPYING into documentation with srcdir != builddir - -Nuno Araujo (1): - Fix the build with automake 1.13 - -Samuli Suominen (1): - Add missing #include <sys/wait.h> - -Steve Langasek (1): - pkexec: Set process environment from pam_getenvlist() - -Vincent Untz (1): - polkitagent, pkexec: Respect SUID_CFLAGS and SUID_LDFLAGS - -darkxst (1): - update types for js188 - -Thanks to our contributors. - -Miloslav Trmač, -May 15, 2013 - --------------- -polkit 0.110 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.110. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.109: - -David Zeuthen (5): - Post-release version bump to 0.110 - Set XAUTHORITY environment variable if is unset - Use mutex and condition variables properly - Remove AM_PROG_CC_STDC - Update NEWS for release - -Emilio Pozuelo Monfort (1): - Fix build on GNU Hurd - -Michael Biebl (1): - build: Remove generated introspection files on "make clean" - -Thanks to our contributors. - -David Zeuthen, -Jan 9, 2013 - --------------- -polkit 0.109 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.109. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.108: - -David Zeuthen (4): - Post-release version bump to 0.109 - Include gmodule-2.0 to avoid linker errors - Don't require libmozjs185 devel packages for polkit rules to work - Update NEWS for release - -Thanks to our contributors. - -David Zeuthen, -December 19, 2012 - --------------- -polkit 0.108 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.108. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.107: - -Adam Jackson (1): - PolkitAgent: Avoid crashing if initializing the server object fails - -David Zeuthen (5): - Post-release version bump to 0.108 - Fall back to authenticating as uid 0 if the list of admin identities is empty - Dynamically load libmozjs185.so and cope with it not being available - docs: mention the audience for authorization rules - Update NEWS for release - -Ryan Lortie (1): - build: Fix .gir generation for parallel make - -Thanks to our contributors. - -David Zeuthen, -November 14, 2012 - --------------- -polkit 0.107 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.107 - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.106: - -David Zeuthen (7): - Post-release version bump to 0.107 - Update guidance on situations where there is no polkit authority - Nuke leftover polkit-backend-1.pc file - Nuke --enable-verbose flag - Introduce a polkit.Result enumeration for authorization rules - pkexec: add support for argv1 annotation and mention shebang-wrappers - Update NEWS for release - -Matthias Clasen (1): - Try harder to look up the right localization - -Thanks to our contributors. - -David Zeuthen, -July 11, 2012 - --------------- -polkit 0.106 --------------- - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -This is polkit 0.106. There's a major change in this release which is -a switch from .pkla files (keyfile-format) to .rules files -(JavaScript), see - - http://davidz25.blogspot.com/2012/06/authorization-rules-in-polkit.html - -for more information. - -Build requirements - - glib, gobject, gio >= 2.30 - mozjs185 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.105: - -Colin Walters (3): - build: Check for mozjs185, not libjs - autogen.sh: Fix check for libtool (we only need libtoolize) - agenthelper-pam: Fix newline-trimming code - -David Zeuthen (65): - Post-release version bump to 0.106 - Add experimental authority backend using JavaScript rule files - Include seat and session in Subject object - Pass details to JS functions and simplify how Subject instances are constructed - Clean up code a bit - Add a couple of more error checks - Collect garbage - Emit ::Changed signal after reloading rules - Reformat init.js and also avoid quoting non-string properties in toString() - Make it possible for JS code to change details - Add polkit.spawn() to spawn external programs - Make polkit.spawn() take an array of arguments instead of a command-line - Don't include command-line in spawning error messages - docs: add AUTHORIZATION RULES section to the polkit(8) man page - Also add an example of polkit.spawn() to polkit(8) man page - docs: clarify how rules files work - Also load rules from /usr/share/polkit/rules.d - Use addRule() and addAdminRule() - docs: emphasize that registered functions may actually never be called - Add test cases for evaluation order - Test that subject.isInGroup() works - Add netgroup support - Minor doc fixes - Mention unix-netgroup:xyz as a valid return value in addAdminRule() functions - Add test-cases and 10 second timeout for polkit.spawn() - Create rules.d directories - Update docs - docs: enclose local <citerefentry> in <link> to make links work - docs: update SEE ALSO to make each man page point to all other man pages - Clarify docs a bit - polkitd: add reference to polkit(8) from its man page - Fix speling - Fix a couple typos in the docs - Mention details["polkit.message"] and add an example using details - Use <variablelist> instead of <informaltable> for Subject attributes - Make polkit_details_insert() remove the key if passed value is NULL - Add real-world example featuring udisks2 and the drive.* variables it passes - Rename --enable-systemd to --enable-libsystemd-login - Fix distcheck - Add a systemd .service file - Nuke polkitbackend library, localauthority backend and extension system - Mention systemd(1) in the polkitd(8) man page - Store private binaries in /usr/lib/polkit-1 instead of /usr/libexec - Add default rules - Pass expanded identity list to the AuthenticationSession - Use "rules", not "scripts" to refer to files in rules.d - Terminate runaway scripts - Use a condition variable to signal that runaway killer thread is ready - Combine action and details parameters - Clarify pkexec(1) variables - Use g_unix_signal_add() from GLib 2.30 - Move polkitd into src/polkitbackend - Ensure polkitd is rebuilt if libpolkit-backend-1.la changes - Remove unused DBUS_GLIB_* and GIO_* variables - Run polkitd as an unprivileged user - Log when the name org.fd.PolicyKit1 has been acquired - Rewrite the "Writing polkit applications" chapter - Update links to udisks docs - Update pkexec(1) man page with example - Small updates to the "Writing polkit applications" chapter - State that authorization rules must not rely on SpiderMonkey features - Make it work when using ConsoleKit instead of libsystemd-login - Mention the implications of returning *_keep in an authorization rule - docs: add a "make sure your app works when there's no polkitd(8)" note - Update NEWS for release - -Thanks to our contributors. - -David Zeuthen, -June 7, 2012 - --------------- -polkit 0.105 --------------- - -This is polkit 0.105 - -WARNING WARNING WARNING: This is a prerelease on the road to polkit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.28 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since polkit 0.104: - -David Zeuthen (11): - Post-release version bump - PolkitUnixSession: Set error if we cannot find a session for the given pid - PolkitUnixSession: Actually return TRUE if a session exists - PolkitAgentSession: Don't leak file descriptors - Add pkttyagent(1) helper - Make it possible to influence agent registration with an a{sv} parameter - Fix type in docs - Mention pkttyagent(1) in "Writing PolicyKit applications" chapter - Update the docs to use 'polkit' (instead of 'PolicyKit') as the name - Add Makefile rules for signing and publishing releases and docs - Update NEWS for release - -Ryan Lortie (1): - Various builddir != srcdir fixes - -Thanks to our contributors. - -David Zeuthen, -April 24, 2012 - --------------- -PolicyKit 0.104 --------------- - -This is PolicyKit 0.104 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.28 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - ConsoleKit OR systemd - -Changes since PolicyKit 0.103: - - David Zeuthen (3): - Post-release version bump to 0.104 - Detect whether systemd is available and default to use if so - Update NEWS for release - - Matthias Clasen (1): - Add optional systemd support - - Nikki VonHollen (2): - Bug 43608 – Add unit tests - Bug 43610 - Add netgroup support - -Thanks to our contributors. - -David Zeuthen, -January 3, 2012 - --------------- -PolicyKit 0.103 --------------- - -This is PolicyKit 0.103 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.28 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -IMPORTANT: As of release 0.103, the default Authority backend now -defaults to allowing members of the 'wheel' group to authenticate as -an administator since this is common usage in popular Linux -distributions. Distributors can change this by patching the -50-localauthority.conf file in /etc/polkit-1/localauthority.conf.d as -needed. - -Changes since PolicyKit 0.102: - - Alan Near (1): - Mistype in DBus object: PoliycKit1 -> PolicyKit1 - - David Zeuthen (7): - Post-release version bump to 0.103 - Add support for the org.freedesktop.policykit.imply annotation - Add --no-debug option and use this for D-Bus activation - Bug 41025 – Add org.freedesktop.policykit.owner annotation - Default to AdminIdentities=unix-group:wheel for local authority - Update NEWS for release - Fix typo - -Thanks to our contributors. - -David Zeuthen, -December 6, 2011 - --------------- -PolicyKit 0.102 --------------- - -This is PolicyKit 0.102 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.28 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.101: - - Benjamin Otte (1): - introspection: Add --c-include to the gir files - - David Zeuthen (7): - Post-release version bump to 0.102 - Don't show diagnostic messages intended for the administrator to the end u - PolkitUnixProcess: Clarify that the real uid is returned, not the effectiv - Make PolkitUnixProcess also record the uid of the process - Use polkit_unix_process_get_uid() to get the owner of a process - pkexec: Avoid TOCTTOU problems with parent process - Update NEWS for release - - Evan Nemerson (1): - Specify exported pkg-config files in GIRs - - Marc Deslauriers (1): - Fix multi-line pam prompt handling - - Martin Pitt (3): - Ignore .po/ for intltool - Fix backend crash if a .policy file does not specify <message> - Bug 38769 — pkexec: Support running X11 apps - -Thanks to our contributors. - -David Zeuthen, -August 1, 2011 - --------------- -PolicyKit 0.101 --------------- - -This is PolicyKit 0.101 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.28 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.100: - - Adrian Bunk (1): - Bug 27253 – Use GOBJECT_INTROSPECTION_CHECK from gobject-introspection - - David Zeuthen (16): - Post-release version bump to 0.101 - Bug 30653 – No way to detect cancellation in pkexec - Bug 27081 – pkexec fails to build on non glibc systems - Bug 30438 – PolicyKit fails to build on AIX - Bug 32334 – Always set polkit.retains_authorization_after_challenge - Fix a memory leak - Be more specific about what info we want when enumerating files - Make pkcheck(1) report if the authentication dialog was dismissed - pkcheck: Make it possible to list and revoke temporary authorizations - Be a bit more careful parsing the command-line - Bug 29712 – Use monotonic for temporary authorizations - Allow overriding message shown in authentication dialog - Deprecated PolkitBackendActionLookup - Fix a couple of warnings triggered by gcc 4.6 - Build examples by default and fix compiler warnings - Update NEWS for release - - Michael Biebl (1): - Bug 29871 – Fix build failures with binutils-gold - -Thanks to our contributors. - -David Zeuthen, -March 3, 2011 - --------------- -PolicyKit 0.100 --------------- - -This is PolicyKit 0.100 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.25.12 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.99: - -David Zeuthen (12): - Post-release version bump to 0.100 - Add missing GObject Introspection annotations - Build gir/typelib for PolkitAgent-1.0 - Fix-up PolkitAgentSession to use GObject properties - Improve error reporting for authentication sessions - Add some debug info that can be shown with the env var POLKIT_DEBUG - Fix up debug and timeouts in agent helper - Always pass non-zero value to g_once_init_leave() - Add a note about POLKIT_DEBUG - Pass caller and subject pid to authentication agent - Update NEWS for release - Fix 'make distcheck' - -Thanks to our contributors. - -David Zeuthen, -February 21, 2011 - --------------- -PolicyKit 0.99 --------------- - -This is PolicyKit 0.99 - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.25.12 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.98: - - Colin Walters (3): - Remove duplicate definitions of enumeration types - Fix (correct) GCC warning about possibly-uninitialized variable - Fix another GCC uninitialized variable warning - - David Zeuthen (2): - Post-release version bump to 0.99 - Update NEWS for release - - Vincent Untz (1): - Bug 29816 – Install polkitagentenumtypes.h - -Thanks to our contributors. - -David Zeuthen, -September 15, 2010 - --------------- -PolicyKit 0.98 --------------- - -This is PolicyKit 0.98. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.25.12 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.97: - -David Zeuthen (11): - Post-release version bump to 0.98 - Require GLib 2.25.12 - Fix scanning of unix-process subjects - Add textual authentication agent and use it in pkexec(1) - Fix ConsoleKit interaction bug - pkexec: add --disable-internal-agent option - pkcheck: add --enable-internal-agent option - Fix wording in pkexec(1) man page - Various doc cleanups - Fix dist-check - Update NEWS for release - -Thanks to our contributors. - -David Zeuthen, -August 20, 2010 - --------------- -PolicyKit 0.97 --------------- - -This is PolicyKit 0.97. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -The main change since the previous version is a port from eggdbus to -GLib's new D-Bus implementation. Other changes includes various bug -fixes and support for shadow authentication. Support for the -AddLockdown() and RemoveLockdown() methods has been removed. You will -need an updated version of PolicyKit-gnome to go with this release. - -Build requirements - - glib, gobject, gio >= 2.25.11 - gobject-introspection >= 0.6.2 (optional) - pam (optional) - -Changes since PolicyKit 0.96: - -Andrew Psaltis (1): - Add shadow support - -Dan Rosenberg (1): - Bug 26982 – pkexec information disclosure vulnerability - -David Zeuthen (23): - Post-release version bump to 0.97 - Port core bits to gdbus - Port CK class to gdbus - Port PolkitBackendInteractiveAuthority to gdbus - Port PolkitAgent to gdbus - Add generated docbook D-Bus API docs to git - Nuke eggdbus usage - Make polkitd accept --replace and gracefully handle SIGINT - Implement polkit_temporary_authorization_new_for_gvariant() - Remove Lock Down functionality - Make NameOwnerChanged a private impl detail of the interactive authority - Update README - Merge remote branch 'origin/gdbus' - Add a GPermission implementation - PolkitAuthority: Implement failable initialization - PolkitAuthority: Add g_return_if_fail() checks - Add g_return_if_fail() to all public API entry points - Use polkit_authority_get_sync() instead of deprecated polkit_authority_get - PolkitBackend: Don't export unneeded convenience API - Update GI annotations - Don't dist org.freedesktop.ConsoleKit.xml; It's dead, Jim - Properly reference headers - Update NEWS for release - -Petr Mrázek (1): - Bug 29051 – Configuration reload on every query - -Thanks to our contributors. - -David Zeuthen, -August 9, 2010 - --------------- -PolicyKit 0.96 --------------- - -This is PolicyKit 0.96. This is supposed to be the last release until 1.0. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.21.4 - eggdbus-1 >= 0.6 - gobject-introspection >= 0.6.2 (optional) - pam - -Changes since PolicyKit 0.95: - -David Zeuthen (15): - Bug 25367 — Also read local authority configuration data from /etc - Fix logic error in pk-example-frobnicate - Run the open_session part of the PAM stack in pkexec(1) - Fix up last comment - Bug 25594 – System logging - Remove trailing whitespace from log messages - Properly handle return value from getpwnam_r() - Fix error message when no authentication agent is available - Make pkexec(1) validate environment variables - Make pkexec(1) use the syslogging facilities - Save original cwd in pkexec(1) since it will change during the life-time - Complain on stderr, not stdout - Post-release version bump to 0.96 - Don't log authorization checks - Update NEWS for release - -David Zeuthen, -January 15, 2010 - --------------- -PolicyKit 0.95 --------------- - -This is PolicyKit 0.95. This is supposed to be the last release until 1.0. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.21.4 - eggdbus-1 >= 0.6 - gobject-introspection >= 0.6.2 (optional) - pam - -Changes since PolicyKit 0.94: - -Alexander Sack (1): - Bug 24566 – Properly _ref authority in singleton constructor - -Andreas Sandberg (1): - Bug 24235 – polkit-agent-helper may call pam_end with a stale pam handle - -Bastien Nocera (1): - Fix process start time when using polkit_unix_process_new_full() - -David Zeuthen (20): - Post-release version bump to 0.95 - Use correct program name when complaining about not being setuid root - Sort by action id in pkaction(1) output - Bug 23867 – UnixProcess vs. SystemBusName aliasing - Implement lockdown for the Local Authority implementation - Remove POLKIT_USER from configuration summary - Add missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE - Pass --libtool to g-ir-scanner - Clarify comment on where to find process start-time on Linux - Add properties with information about the currently used authority - Clarify when AllowUserInteraction should and shouldn't be used - Add methods AddLockdownForAction() and RemoveLockdownForAction() - Port lockdown from pklalockdown(1) to D-Bus methods - Drop ununsed policykit actions - Remove TODO about symbol visibility as this has been fixed for a while - Clarify pklocalauthority(8) man page - Properly validate all arguments passed via D-Bus - Add Python example - Fix make distcheck - Update NEWS for release - -Matthias Clasen (1): - Bug 24640 – Typos in pklocalauthority(8) - -Michael Biebl (8): - Trim the list of exported symbols - Use _polkit_agent_marshal prefix - Make private symbols accessible to libpolkitagent and libpolkitbackend - Make examples optional - Enable silent rules - Remove POLKIT_USER option - Don't include Polkit-1.0.gir in the dist tarball - Bug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS - -Samuel Thibault (1): - Bug 24495 – Fails to build on platforms without PATH_MAX (like hurd) - -David Zeuthen, -November 13, 2009 - --------------- -PolicyKit 0.94 --------------- - -This is PolicyKit 0.94. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.21.4 - eggdbus-1 >= 0.5 - gobject-introspection >= 0.6.2 (optional) - pam - -Changes since PolicyKit 0.93: - - David Zeuthen (13): - Post-release version bump to 0.94 - Require correct versions of glib and eggdbus - Ignore .pkla files starting with dot and don't segfault on error path - Allow unprivileged callers to check authorizations - Don't spawn man(1) from a setuid program - Add polkit.retains_authorization_after_challenge to authz result - Ensure all fds except stdin/stdout/stderr are closed after exec(2) - Be more careful when determining process start time - Pass the right struct offset for the ::changed class signal handler - Don't set the GError if the process doesn't exist - Remove temporary authorization when the subject it applies to vanishes - Generate GI gir and typelibs for libpolkit-gobject-1 - Update NEWS for release - - Joe Marcus Clarke (1): - Bug 23093 – FreeBSD portability fixes - -David Zeuthen, -August 12, 2009 - --------------- -PolicyKit 0.93 --------------- - -This is PolicyKit 0.93. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.21.4 - eggdbus-1 >= 0.5 - pam - -Changes since PolicyKit 0.92: - -David Zeuthen (16): - Post-release version bump to 0.93 - GIO modules need to be prefix with lib - Cancel an authentication if the unique name for the subject vanishes - Plug a couple of memory leaks - Move local authority management to a separate library - Rip out polkit-local and refactor local authority to only use tmp authz - Move authentication agent bits to separate authority subclass - Also pass the identity of the subject we are checking for - Actually make the local authority look up authorization files - In .pkla files, use Result{Any,Inactive,Active} instead of just Result - Rename some man pages and the daemon binary - Add docs detailing how the Local Authority works - Add support for querying and revoking temporary authorizations - Fix make distcheck - Update TODO - Update NEWS for release - -Yanko Kaneti (2): - Use unique ids for sections to prevent them being autogenerated - More unique ids to get the docs build fully predictable - -David Zeuthen, -July 20th, 2009 - --------------- -PolicyKit 0.92 --------------- - -This is PolicyKit 0.92. - -WARNING WARNING WARNING: This is a prerelease on the road to PolicyKit -1.0. Public API might change and certain parts of the code still needs -some security review. Use at your own risk. - -Build requirements - - glib, gobject, gio >= 2.14 - eggdbus-1 >= 0.4 - pam - -Changes since PolicyKit 0.91: - - David Zeuthen (36): - post-release version bump to 0.92 - install gtkdoc HTML in the proper location - Fix D-Bus policy to work with non-permissive D-Bus - Only allow privileged apps to check authz and add ActionLookup interface - Change the PolkitAuthorizationResult enumeration into an object - Port examples and command-line tools to new API - Move docs to proper location - Add a pkexec(1) command - Mention /usr/bin/pkexec in the configure blurb - Fix a bug where details were not shown for normal pkexec usage - Use an object, not a GHashTable when passing details around - Forgot to add source for PolkitDetails - Change the defaults for .run-frobnicate to auth_self_keep - Require eggdbus-1 >= 0.4 - Only free hash table if it's not NULL - Avoid returning an error if no authentication agent is available - Clarify docs for is_challenge member of the AuthorizationResult struct - Add pkcheck(1) command to check for authorizations - nullbackend: Catch up with latest API changes - Return the icon name instead of a GIcon in PolkitActionDescription - Add pkaction(1) and nuke polkit-1(1) commands - Update SEE ALSO sections in man pages - Add a man page for polkit-1(8) - First cut at some high-level docs - Improve pkexec(1) man page by adding screenshots of authentication dialogs - Add some more API docs - Add a "PolicyKit Overview" section to the docs - Consolidate all gtk-doc stuff in docs/polkit - Expand on the D-Bus docs - Use .../extensions instead of ../backends for loading extensions - Minor doc fixes - Move the doc chapters around a bit - Change GNOME to freedesktop.org in the docs - Fix make distcheck - Update NEWS - Also dist polkitd-1.xml - - Richard Hughes (2): - fix up gtk-doc API markup for a couple of functions - add a draft version of the porting guide -- WIP - -David Zeuthen, -June 8, 2009 @@ -0,0 +1,1596 @@ +## polkit 0.120 + +**WARNING**: This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### NOTICE: +This is the LAST version to support AUTOTOOLS build system, as it has been obsoleted +by meson build system. +The next release of polkit will REQUIRE meson build system. + +### Highlights: +- tarball fix-ups +- re-enabled documentation +- Intltool to gettext migration +- new translations + +### Build requirements +- glib, gobject, gio >= 2.32 +- mozjs-78 +- gobject-introspection >= 0.6.2 (optional) +- pam (optional) +- ConsoleKit OR systemd +- gettext +- meson (optional) +- autotools (DEPRECATED) + +### Changes since polkit 0.119: +- Inigo Martinez: + transition from Intltool to gettext + +- Simon McVittie: + several tarball, meson and pipeline fixups + +- Hugo Carvalho: + Portuguese translation + +- Sergiu Bivol: + Romanian translation + + +Many thanks to all contributors! + +Jan Rybar et al., +September 30, 2021 + + +## polkit 0.119 +**WARNING**: This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.119**. + +### Highlights: +- meson build system added +- CVE-2021-3560 mitigation + +### Build requirements +- glib, gobject, gio >= 2.32 +- mozjs-78 +- gobject-introspection >= 0.6.2 (optional) +- pam (optional) +- ConsoleKit OR systemd + +### Changes since polkit 0.118: +- Inigo Martinez: + meson build system added alongside autotools (many thanks!!) + +- Matthias Classen: + properties in text listener + +- René Genz: + typos fixups + +- Balázs Úr: + Update Hungarian translation + +- Hendrik Werner: + meson post-install script mod to avoid calling external processes + +- Kevin Backhouse, Jan Rybar: + CVE-2021-3560 mitigation + +Many thanks to all contributors! + +Jan Rybar et al., +June 3, 2021 + +## polkit 0.118 + +**WARNING**: This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.118**. + +### Highlights: +- move to mozjs78 +- tarball CI fix + +### Build requirements +- glib, gobject, gio >= 2.32 +- mozjs-78 +- gobject-introspection >= 0.6.2 (optional) +- pam (optional) +- ConsoleKit OR systemd + +### Changes since polkit 0.117: +- Xi Ruoyao: + tarball fixup for distcheck + +- Valentin David: + updated dependency to mozjs78 + +Many thanks to all contributors! + +Jan Rybar et al., +September 8, 2020 + +## polkit 0.117 + +**WARNING**: This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.117**. + +### Highlights: + Gitlab CI activation - all merge requests are tested before merged + New Norwegian translation, several other language updates + +### Build requirements +- glib, gobject, gio >= 2.32 +- mozjs-68 +- gobject-introspection >= 0.6.2 (optional) +- pam (optional) +- ConsoleKit OR systemd + +### Changes since polkit 0.116: + - Bastien Nocera: + Activated Gitlab CI + + - Xi Ruoyao: + Updated dependency to mozjs68 + + - Kalev Lember, Jan Rybar + Memory management fixes + + - Anders Jonsson, Karl Ove Hufthammer, Andika Triwidada, Yuri Chornoivan: + Language updates + +Many thanks to all contributors! + +Jan Rybar et al., +July 24, 2020 + +polkit 0.116 +------------ + +**WARNING**: +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.116**. + +### Highlights: + - Fix of CVE-2018-19788, high UIDs caused overflow in polkit; + - Fix of CVE-2019-6133, kernel vulnerability (Slowfork) allowed local privilege escalation. + +### Build requirements: + - glib, gobject, gio >= 2.32 + - mozjs-60 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.115: + - Kyle Walker: + Leaking zombie child processes + + - Jan Rybar: + Possible resource leak found by static analyzer + Output messages tuneup + Sanity fixes + pkttyagent tty echo disabled on SIGINT + + - Ray Strode: + HACKING: add link to Code of Conduct + + - Philip Withnall: + polkitbackend: comment typos fix + + - Zbigniew Jędrzejewski-Szmek: + `configure.ac`: fix detection of systemd with cgroups v2 + CVE-2018-19788 High UIDs overflow fix + + - Colin Walters: + CVE-2019-6133 Slowfork vulnerability fix + + - Matthew Leeds: + Allow unset process-uid + + - Emmanuele Bassi + Port the JS authority to mozjs-60 + + - Göran Uddeborg: + Use JS_EncodeStringToUTF8 + +Many thanks to all contributors! + +Jan Rybar et al., +April 25, 2019 + +--------------- +polkit 0.115 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.115**. + +### Highlights: + - Fixes CVE-2018-1116, a local information disclosure and denial of service + caused by trusting client-submitted UIDs when referencing processes. + Thanks to Matthias Gerstner of the SUSE security team for reporting + this issue. + +### Build requirements: + + - glib, gobject, gio >= 2.32 + - mozjs-52 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.114: + + - Miloslav Trmač (1): + Fix CVE-2018-1116: Trusting client-supplied UID + + - Ray Strode (3): + Post-release version bump to 0.115 + jsauthority: pass "%s" format string to remaining report function + NEWS: fix date from 2017 to 2018 for 0.114 entry + +Thanks to our contributors. + +Colin Walters and Miloslav Trmač, +July 10, 2018 + +-------------- +polkit 0.114 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.114**. + +### Highlights: + Port to mozjs 52, the latest version of the firefox JavaScript engine. + + Add gettext support for policy files + + Fixes for various memory leaks + +### Build requirements: + + - glib, gobject, gio >= 2.32 + - mozjs-52 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.113: + + - Anders Jonsson (2): + pkcheck: fix man typos + Add Swedish translation + + - Antoine Jacoutot (1): + Add support for OpenBSD + + - Christian Kirbach (1): + Add German translation + + - Colin Walters (3): + build: Pull in GCC warning infra from ostree + build: Use AC_USE_SYSTEM_EXTENSIONS + tests: Correct boundary test for overflow + + - Dariusz Gadomski (2): + Fix multi-line pam text info. + Refactor send_to_helper usage + + - Gabor Kelemen (1): + Add initial Hungarian translation, and add hu to LINGUAS + + - Jeremy Linton (5): + change mozjs interface module to c++ + Switch to hard requiring mozjs24 + Fix warnings caused by building with C++ + Replace autocompartment + test: Add a test case to handle actions without explicit rules + + - Jiří Klimeš (1): + trivial: fix deprecated indication for polkit_agent_register_listener() + + - Matthias Clasen (1): + Add gettext support for .policy files + + - Miloslav Trmač (21): + Post-release version bump to 0.114 + Consistently use HAVE_NETGROUP_H instead of HAVE_OPENBSD + Fix a memory leak of PolkitAgentListener's Server object + Remove polkitbackendconfigsource.[ch] + Add Slovak translation by Dusan Kazik <prescott66@gmail.com> + Add Indonesian translation by Andika Triwidada + Add Chinese (Taiwan) translation + Fix a typo in polkit(8) + Simplify GVariant reference counting + Fix a memory leak on an error path of lookup_asv (twice) + Fix a memory leak in server_handle_register_authentication_agent_with_options + Fix a memory leak in server_handle_unregister_authentication_agent + Fix a memory leak in server_handle_authentication_agent_response{,2} + Fix memory leaks in server_handle_*_temporary_authorizations + Fix error handling in polkit_authority_enumerate_temporary_authorizations_finish + Fix a memory leak per agent authentication + Fix a memory leak on agent authentication cancellation + Audit and fix GVariant reference counting + Fix help for (pkttyagent -s) + Fix a race condition when terminating runaway_killer_thread + Move to current GLib + + - Mingye Wang (Arthur2e5) (1): + Add zh_CN translation + + - Muhammet Kara (1): + Added Turkish translation + + - OBATA Akio (1): + Add support for NetBSD + + - Peter Hutterer (1): + gettext: switch to default-translate "no" + + - Philip Withnall (3): + polkit: Add g_autoptr() support for GObject-derived polkit types + data: Set GIO_USE_VFS=local in the environment + polkitbackend: Fix typos in a couple of initialisation error messages + + - Piotr Drąg (1): + Add Polish translation + + - Rafael Fontenelle (1): + Add Brazilian Portuguese translation + + - Ray Strode (34): + configure: bump mozjs requirement to 52 + jsauthority: fix how classes are defined + jsauthority: use JS_FN instead of JS_FS + jsauthority: get rid of JSRuntime + jsauthority: change how setVersion is called + jsauthority: call JS_Init + jsauthority: call JS_InitSelfHostedCode + jsauthority: change how JIT is disabled + jsauthority: JS::SetWarningReporter instead of JS_SetErrorReporter + jsauthority: add UTF8 suffix to renamed functions + jsauthority: pass "%s" format string to report functions + jsauthority: s/JSBool/bool/ + jsauthority: s/jsval/JS::Value/ + jsauthority: s/JSVAL_NULL/JS::NullValue()/ + jsauthority: s/JSVAL_VOID/JS::UndefinedValue()/ + jsauthority: s/OBJECT_TO_JSVAL/JS::ObjectValue/ + jsauthority: s/STRING_TO_JSVAL/JS::StringValue/ + jsauthority: s/BOOLEAN_TO_JSVAL/JS::BooleanValue/ + jsauthority: JSVAL_TO_OBJECT (o) to o.toObjectOrNull() + jsauthority: JSVAL_TO_STRING (s) to s.toString() + jsauthority: JSVAL_IS_STRING (s) to s.isString() + jsauthority: JSVAL_IS_NULL (o) to o.isNull() + jsauthority: Fix up JS_CallFunctionName invocations + jsauthority: use InterruptCallback api instead of OperationCallback + jsauthority: redo how global objects are set up + jsauthority: root some locals to the context + jsauthority: adapt arguments for new JS::Compile API + jsauthority: adapt arguments for new JS_ExecuteScript API + jsauthority: use JS::Evaluate instead of JS_EvaluateScript + jsauthority: fix up set_property methods + jsauthority: stop using JS_GetStringCharsZ + jsauthority: switch from JS_ConvertArguments to JS::CallArgsFromVp + jsauthority: re-enable JIT + Port JavaScript authority to mozjs52 + + - Rui Matos (1): + polkitpermission: Fix a memory leak on authority changes + + - Sebastien Bacher (1): + Support polkit session agent running outside user session + + - Stef Walter (2): + polkitagent: Fix access after dereference on hashtable + polkitagent: No double warnings in polkit_agent_listener_register() + + - Sven Eden (1): + configure: enable elogind support in PolicyKit + + - Yuri Chornoivan (1): + Add Ukrainian translation + + - enkore (1): + Fix abnomal formatting of authentication header lines + + - muzena (1): + Add hr.po + +Thanks to our contributors. + +Colin Walters and Miloslav Trmač, +April 2, 2018 + +-------------- +polkit 0.113 +-------------- + +NOTE: This release is an important security update, see below. + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.113**. + +### Highlights: + Fixes CVE-2015-4625, a local privilege escalation due to predictable + authentication session cookie values. Thanks to Tavis Ormandy, Google Project + Zero for reporting this issue. For the future, authentication agents are + encouraged to use PolkitAgentSession instead of using the D-Bus agent response + API directly. + + Fixes CVE-2015-3256, various memory corruption vulnerabilities in use of the + JavaScript interpreter, possibly leading to local privilege escalation. + + Fixes CVE-2015-3255, a memory corruption vulnerability in handling duplicate + action IDs, possibly leading to local privilege escalation. Thanks to + Laurent Bigonville for reporting this issue. + + Fixes CVE-2015-3218, which allowed any local user to crash polkitd. Thanks to + Tavis Ormandy, Google Project Zero, for reporting this issue. + + On systemd-213 and later, the “active” state is shared across all sessions of + an user, instead of being tracked separately. + + (pkexec), when not given a program to execute, runs the users’ shell by + default. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 or mozjs-17.0 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.112: + + - Colin Walters (17): + PolkitSystemBusName: Add public API to retrieve Unix user + examples/cancel: Fix to securely lookup subject + sessionmonitor-systemd: Deduplicate code paths + PolkitSystemBusName: Retrieve both pid and uid + Port internals non-deprecated PolkitProcess API where possible + Use G_GNUC_BEGIN_IGNORE_DEPRECATIONS to avoid warning spam + pkexec: Work around systemd injecting broken XDG_RUNTIME_DIR + pkexec: Support just plain "pkexec" to run shell + .dir-locals: Style for Emacs - we don't use tabs + authority: Avoid cookie wrapping by using u64 counter + CVE-2015-3218: backend: Handle invalid object paths in RegisterAuthenticationAgent + build: Start using git.mk + Revert "authority: Avoid cookie wrapping by using u64 counter" + authority: Add a helper method for checking whether an identity is root + CVE-2015-4625: Use unpredictable cookie values, keep them secret + CVE-2015-4625: Bind use of cookies to specific uids + README: Note to send security reports via DBus's mechanism + + - Kay Sievers (1): + sessionmonitor-systemd: prepare for D-Bus "user bus" model + + - Lukasz Skalski (1): + polkitd: Fix problem with removing non-existent source + + - Max A. Dednev (1): + authority: Fix memory leak in EnumerateActions call results handler + + - Miloslav Trmač (24): + Post-release version bump to 0.113 + Don't discard error data returned by polkit_system_bus_name_get_user_sync + Fix a memory leak + Refuse duplicate --user arguments to pkexec + Fix a possible NULL dereference. + Remove a redundant assignment. + Simplify forced error domain registration + Fix a typo, s/Evaluting/Evaluating/g + s/INCLUDES/AM_CPPFLAGS/g + Fix duplicate GError use when "uid" is missing + Fix a crash when two authentication requests are in flight. + docs: Update for changes to uid binding/AuthenticationAgentResponse2 + Don't pass an uninitialized JS parameter + Don't add extra NULL group to subject.groups + Don't store unrooted jsvals on heap + Fix a per-authorization memory leak + Fix a memory leak when registering an authentication agent + Wrap all JS usage within “requests” + Register heap-based JSObject pointers to GC + Prevent builds against SpiderMonkey with exact stack rooting + Clear the JS operation callback before invoking JS in the callback + Fix spurious timeout exceptions on GC + Fix GHashTable usage. + Fix use-after-free in polkitagentsession.c + + - Philip Withnall (1): + sessionmonitor-systemd: Use sd_uid_get_state() to check session activity + + - Rui Matos (1): + PolkitAgentSession: fix race between child and io watches + + - Simon McVittie (1): + Use libsystemd instead of older libsystemd-login if possible + + - Ting-Wei Lan (1): + build: Fix several issues on FreeBSD + + - Xabier Rodriguez Calvar (1): + Fixed compilation problem in the backend + +Thanks to our contributors. + +Colin Walters and Miloslav Trmač, +July 2, 2015 + +-------------- +polkit 0.112 +-------------- + +NOTE: This release is an important security update, see below. + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.112**. + +### Highlights: + This release fixes CVE-2013-4288: Race condition with process subjects that do + not have securely determined uid. + + pkcheck(1) now supports a new format for the --process argument; all + applications need to use the new format to avoid a race condition (or use + --system-bus-name to identify the process instead). + + Similarly, applications using the API should always use + polkit_unix_process_new_for_owner(). polkit_unix_process_new() and + polkit_unix_process_new_full() are unsafe and have been deprecated. + + Thanks to Sebastian Krahmer of the SUSE Security Team for reporting this issue. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 or mozjs-17.0 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.111: + + - Colin Walters (2): + polkitunixprocess: Deprecate racy APIs + pkcheck: Support --process=pid,start-time,uid syntax too + + - Miloslav Trmač (1): + Post-release version bump to 0.112 + + - Tomas Bzatek (1): + Use GOnce for interface type registration + + - Tomas Chvatal (2): + Add czech translation po file to distribution. + Update the czech once more with newest pot file. + +Thanks to our contributors. + +Colin Walters and Miloslav Trmač, +September 18, 2013 + +-------------- +polkit 0.111 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.111**. + +### Highlights: + The JavaScript interpreter is now mandatory. + Both js185 and mozjs17 versions of SpiderMonkey are supported. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 or mozjs-17.0 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.110: + + - Colin Walters (6): + mocklibc: Only require autoconf 2.63 + configure: Specify GLib min/max version + jsauthority: We can really only handle a string + jsauthority: Use JSVAL_NULL rather than {0} struct initialization + Revert "Dynamically load libmozjs185.so and cope with it not being available" + jsauthority: Work with mozjs-17.0 too + + - David Zeuthen (1): + Post-release version bump to 0.111 + + - Giovanni Campagna (1): + build: try harder to avoid systemd/consolekit misconfiguration + + - Michael Biebl (1): + man: Fix pkaction man page wrt to --action-id option + + - Miloslav Trmač (28): + Clean (git status) after autogen.sh + Fix build with srcdir!=builddir + Fix DOC_SOURCE_DIR for builddir != srcdir + Fix various memory leaks. + Add annotation glossary + Leave out backend from gtk-doc generation + Fix most "undocumented symbol" warnings + Move polkit_temporary_authorization_new to private header file. + Include documentation of polkit_action_description_get_annotation_keys + Document deprecated functions. + Fold enum documentation into relevant classes + Fix an obvious docstring typo. + Add annotations for element types of returned lists + Add a FIXME to polkitprivate.h + Use auth_admin* instead of auth_self* in examples + More warnings about using auth_self* + Fix a TypeError when no admin rules are registered + Fix handling of null returned from _runRules + Refuse non-string parameters to Polkit.spawn() + Drop unused variable + Fix a memory leak + Remove an unused va_start + Don't spawn man for --help + Fix package version / bug report address mixing + Add bug reporting address and home page to --help output + Refuse unrecognized command-line operands + Exit pkaction with status 0 on success + Fix inclusion of COPYING into documentation with srcdir != builddir + + - Nuno Araujo (1): + Fix the build with automake 1.13 + + - Samuli Suominen (1): + Add missing #include <sys/wait.h> + + - Steve Langasek (1): + pkexec: Set process environment from pam_getenvlist() + + - Vincent Untz (1): + polkitagent, pkexec: Respect SUID_CFLAGS and SUID_LDFLAGS + + - darkxst (1): + update types for js188 + +Thanks to our contributors. + +Miloslav Trmač, +May 15, 2013 + +-------------- +polkit 0.110 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.110**. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.109: + + - David Zeuthen (5): + Post-release version bump to 0.110 + Set XAUTHORITY environment variable if is unset + Use mutex and condition variables properly + Remove AM_PROG_CC_STDC + Update NEWS for release + + - Emilio Pozuelo Monfort (1): + Fix build on GNU Hurd + + - Michael Biebl (1): + build: Remove generated introspection files on "make clean" + +Thanks to our contributors. + +David Zeuthen, +Jan 9, 2013 + +-------------- +polkit 0.109 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.109**. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.108: + + - David Zeuthen (4): + Post-release version bump to 0.109 + Include gmodule-2.0 to avoid linker errors + Don't require libmozjs185 devel packages for polkit rules to work + Update NEWS for release + +Thanks to our contributors. + +David Zeuthen, +December 19, 2012 + +-------------- +polkit 0.108 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.108**. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.107: + + - Adam Jackson (1): + PolkitAgent: Avoid crashing if initializing the server object fails + + - David Zeuthen (5): + Post-release version bump to 0.108 + Fall back to authenticating as uid 0 if the list of admin identities is empty + Dynamically load libmozjs185.so and cope with it not being available + docs: mention the audience for authorization rules + Update NEWS for release + + - Ryan Lortie (1): + build: Fix .gir generation for parallel make + +Thanks to our contributors. + +David Zeuthen, +November 14, 2012 + +-------------- +polkit 0.107 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.10**. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.106: + + - David Zeuthen (7): + Post-release version bump to 0.107 + Update guidance on situations where there is no polkit authority + Nuke leftover polkit-backend-1.pc file + Nuke --enable-verbose flag + Introduce a polkit.Result enumeration for authorization rules + pkexec: add support for argv1 annotation and mention shebang-wrappers + Update NEWS for release + + - Matthias Clasen (1): + Try harder to look up the right localization + +Thanks to our contributors. + +David Zeuthen, +July 11, 2012 + +-------------- +polkit 0.106 +-------------- + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +This is polkit **0.106. There's a major change in this release which i**. +a switch from .pkla files (keyfile-format) to .rules files +(JavaScript), see + + http://davidz25.blogspot.com/2012/06/authorization-rules-in-polkit.html + +for more information. + +### Build requirements: + + - glib, gobject, gio >= 2.30 + - mozjs185 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.105: + + - Colin Walters (3): + build: Check for mozjs185, not libjs + autogen.sh: Fix check for libtool (we only need libtoolize) + agenthelper-pam: Fix newline-trimming code + + - David Zeuthen (65): + Post-release version bump to 0.106 + Add experimental authority backend using JavaScript rule files + Include seat and session in Subject object + Pass details to JS functions and simplify how Subject instances are constructed + Clean up code a bit + Add a couple of more error checks + Collect garbage + Emit ::Changed signal after reloading rules + Reformat init.js and also avoid quoting non-string properties in toString() + Make it possible for JS code to change details + Add polkit.spawn() to spawn external programs + Make polkit.spawn() take an array of arguments instead of a command-line + Don't include command-line in spawning error messages + docs: add AUTHORIZATION RULES section to the polkit(8) man page + Also add an example of polkit.spawn() to polkit(8) man page + docs: clarify how rules files work + Also load rules from /usr/share/polkit/rules.d + Use addRule() and addAdminRule() + docs: emphasize that registered functions may actually never be called + Add test cases for evaluation order + Test that subject.isInGroup() works + Add netgroup support + Minor doc fixes + Mention unix-netgroup:xyz as a valid return value in addAdminRule() functions + Add test-cases and 10 second timeout for polkit.spawn() + Create rules.d directories + Update docs + docs: enclose local <citerefentry> in <link> to make links work + docs: update SEE ALSO to make each man page point to all other man pages + Clarify docs a bit + polkitd: add reference to polkit(8) from its man page + Fix speling + Fix a couple typos in the docs + Mention details["polkit.message"] and add an example using details + Use <variablelist> instead of <informaltable> for Subject attributes + Make polkit_details_insert() remove the key if passed value is NULL + Add real-world example featuring udisks2 and the drive.* variables it passes + Rename --enable-systemd to --enable-libsystemd-login + Fix distcheck + Add a systemd .service file + Nuke polkitbackend library, localauthority backend and extension system + Mention systemd(1) in the polkitd(8) man page + Store private binaries in /usr/lib/polkit-1 instead of /usr/libexec + Add default rules + Pass expanded identity list to the AuthenticationSession + Use "rules", not "scripts" to refer to files in rules.d + Terminate runaway scripts + Use a condition variable to signal that runaway killer thread is ready + Combine action and details parameters + Clarify pkexec(1) variables + Use g_unix_signal_add() from GLib 2.30 + Move polkitd into src/polkitbackend + Ensure polkitd is rebuilt if libpolkit-backend-1.la changes + Remove unused DBUS_GLIB_* and GIO_* variables + Run polkitd as an unprivileged user + Log when the name org.fd.PolicyKit1 has been acquired + Rewrite the "Writing polkit applications" chapter + Update links to udisks docs + Update pkexec(1) man page with example + Small updates to the "Writing polkit applications" chapter + State that authorization rules must not rely on SpiderMonkey features + Make it work when using ConsoleKit instead of libsystemd-login + Mention the implications of returning *_keep in an authorization rule + docs: add a "make sure your app works when there's no polkitd(8)" note + Update NEWS for release + +Thanks to our contributors. + +David Zeuthen, +June 7, 2012 + +-------------- +polkit 0.105 +-------------- + +This is polkit **0.10**. + +**WARNING:** +This is a prerelease on the road to polkit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.28 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since polkit 0.104: + + - David Zeuthen (11): + Post-release version bump + PolkitUnixSession: Set error if we cannot find a session for the given pid + PolkitUnixSession: Actually return TRUE if a session exists + PolkitAgentSession: Don't leak file descriptors + Add pkttyagent(1) helper + Make it possible to influence agent registration with an a{sv} parameter + Fix type in docs + Mention pkttyagent(1) in "Writing PolicyKit applications" chapter + Update the docs to use 'polkit' (instead of 'PolicyKit') as the name + Add Makefile rules for signing and publishing releases and docs + Update NEWS for release + + - Ryan Lortie (1): + Various builddir != srcdir fixes + +Thanks to our contributors. + +David Zeuthen, +April 24, 2012 + +-------------- +PolicyKit 0.104 +-------------- + +This is polkit **0.104** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.28 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + - ConsoleKit OR systemd + +### Changes since PolicyKit 0.103: + + - David Zeuthen (3): + Post-release version bump to 0.104 + Detect whether systemd is available and default to use if so + Update NEWS for release + + - Matthias Clasen (1): + Add optional systemd support + + - Nikki VonHollen (2): + Bug 43608 – Add unit tests + Bug 43610 - Add netgroup support + +Thanks to our contributors. + +David Zeuthen, +January 3, 2012 + +-------------- +PolicyKit 0.103 +-------------- + +This is polkit **0.103** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.28 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + + - IMPORTANT: As of release 0.103, the default Authority backend now + - defaults to allowing members of the 'wheel' group to authenticate as + - an administator since this is common usage in popular Linux + - distributions. Distributors can change this by patching the + - 50-localauthority.conf file in /etc/polkit-1/localauthority.conf.d as + - needed. + +### Changes since PolicyKit 0.102: + + - Alan Near (1): + Mistype in DBus object: PoliycKit1 -> PolicyKit1 + + - David Zeuthen (7): + Post-release version bump to 0.103 + Add support for the org.freedesktop.policykit.imply annotation + Add --no-debug option and use this for D-Bus activation + Bug 41025 – Add org.freedesktop.policykit.owner annotation + Default to AdminIdentities=unix-group:wheel for local authority + Update NEWS for release + Fix typo + +Thanks to our contributors. + +David Zeuthen, +December 6, 2011 + +-------------- +PolicyKit 0.102 +-------------- + +This is polkit **0.102** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.28 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.101: + + - Benjamin Otte (1): + introspection: Add --c-include to the gir files + + - David Zeuthen (7): + Post-release version bump to 0.102 + Don't show diagnostic messages intended for the administrator to the end u + PolkitUnixProcess: Clarify that the real uid is returned, not the effectiv + Make PolkitUnixProcess also record the uid of the process + Use polkit_unix_process_get_uid() to get the owner of a process + pkexec: Avoid TOCTTOU problems with parent process + Update NEWS for release + + - Evan Nemerson (1): + Specify exported pkg-config files in GIRs + + - Marc Deslauriers (1): + Fix multi-line pam prompt handling + + - Martin Pitt (3): + Ignore .po/ for intltool + Fix backend crash if a .policy file does not specify <message> + Bug 38769 — pkexec: Support running X11 apps + +Thanks to our contributors. + +David Zeuthen, +August 1, 2011 + +-------------- +PolicyKit 0.101 +-------------- + +This is polkit **0.101** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.28 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.100: + + - Adrian Bunk (1): + Bug 27253 – Use GOBJECT_INTROSPECTION_CHECK from gobject-introspection + + - David Zeuthen (16): + Post-release version bump to 0.101 + Bug 30653 – No way to detect cancellation in pkexec + Bug 27081 – pkexec fails to build on non glibc systems + Bug 30438 – PolicyKit fails to build on AIX + Bug 32334 – Always set polkit.retains_authorization_after_challenge + Fix a memory leak + Be more specific about what info we want when enumerating files + Make pkcheck(1) report if the authentication dialog was dismissed + pkcheck: Make it possible to list and revoke temporary authorizations + Be a bit more careful parsing the command-line + Bug 29712 – Use monotonic for temporary authorizations + Allow overriding message shown in authentication dialog + Deprecated PolkitBackendActionLookup + Fix a couple of warnings triggered by gcc 4.6 + Build examples by default and fix compiler warnings + Update NEWS for release + + - Michael Biebl (1): + Bug 29871 – Fix build failures with binutils-gold + +Thanks to our contributors. + +David Zeuthen, +March 3, 2011 + +-------------- +PolicyKit 0.100 +-------------- + +This is polkit **0.100** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.25.12 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.99: + + - David Zeuthen (12): + Post-release version bump to 0.100 + Add missing GObject Introspection annotations + Build gir/typelib for PolkitAgent-1.0 + Fix-up PolkitAgentSession to use GObject properties + Improve error reporting for authentication sessions + Add some debug info that can be shown with the env var POLKIT_DEBUG + Fix up debug and timeouts in agent helper + Always pass non-zero value to g_once_init_leave() + Add a note about POLKIT_DEBUG + Pass caller and subject pid to authentication agent + Update NEWS for release + Fix 'make distcheck' + +Thanks to our contributors. + +David Zeuthen, +February 21, 2011 + +-------------- +PolicyKit 0.99 +-------------- + +This is polkit **0.99** + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.25.12 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.98: + + - Colin Walters (3): + Remove duplicate definitions of enumeration types + Fix (correct) GCC warning about possibly-uninitialized variable + Fix another GCC uninitialized variable warning + + - David Zeuthen (2): + Post-release version bump to 0.99 + Update NEWS for release + + - Vincent Untz (1): + Bug 29816 – Install polkitagentenumtypes.h + +Thanks to our contributors. + +David Zeuthen, +September 15, 2010 + +-------------- +PolicyKit 0.98 +-------------- + +This is polkit **0.98**. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.25.12 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.97: + + - David Zeuthen (11): + Post-release version bump to 0.98 + Require GLib 2.25.12 + Fix scanning of unix-process subjects + Add textual authentication agent and use it in pkexec(1) + Fix ConsoleKit interaction bug + pkexec: add --disable-internal-agent option + pkcheck: add --enable-internal-agent option + Fix wording in pkexec(1) man page + Various doc cleanups + Fix dist-check + Update NEWS for release + +Thanks to our contributors. + +David Zeuthen, +August 20, 2010 + +-------------- +PolicyKit 0.97 +-------------- + +This is polkit **0.97**. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +The main change since the previous version is a port from eggdbus to +GLib's new D-Bus implementation. Other changes includes various bug +fixes and support for shadow authentication. Support for the +AddLockdown() and RemoveLockdown() methods has been removed. You will +need an updated version of PolicyKit-gnome to go with this release. + +### Build requirements: + + - glib, gobject, gio >= 2.25.11 + - gobject-introspection >= 0.6.2 (optional) + - pam (optional) + +### Changes since PolicyKit 0.96: + + - Andrew Psaltis (1): + Add shadow support + + - Dan Rosenberg (1): + Bug 26982 – pkexec information disclosure vulnerability + + - David Zeuthen (23): + Post-release version bump to 0.97 + Port core bits to gdbus + Port CK class to gdbus + Port PolkitBackendInteractiveAuthority to gdbus + Port PolkitAgent to gdbus + Add generated docbook D-Bus API docs to git + Nuke eggdbus usage + Make polkitd accept --replace and gracefully handle SIGINT + Implement polkit_temporary_authorization_new_for_gvariant() + Remove Lock Down functionality + Make NameOwnerChanged a private impl detail of the interactive authority + Update README + Merge remote branch 'origin/gdbus' + Add a GPermission implementation + PolkitAuthority: Implement failable initialization + PolkitAuthority: Add g_return_if_fail() checks + Add g_return_if_fail() to all public API entry points + Use polkit_authority_get_sync() instead of deprecated polkit_authority_get + PolkitBackend: Don't export unneeded convenience API + Update GI annotations + Don't dist org.freedesktop.ConsoleKit.xml; It's dead, Jim + Properly reference headers + Update NEWS for release + + - Petr Mrázek (1): + Bug 29051 – Configuration reload on every query + +Thanks to our contributors. + +David Zeuthen, +August 9, 2010 + +-------------- +PolicyKit 0.96 +-------------- + +This is polkit **0.96**. This is supposed to be the last release until 1.0. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.21.4 + - eggdbus-1 >= 0.6 + - gobject-introspection >= 0.6.2 (optional) + - pam + +### Changes since PolicyKit 0.95: + + - David Zeuthen (15): + Bug 25367 — Also read local authority configuration data from /etc + Fix logic error in pk-example-frobnicate + Run the open_session part of the PAM stack in pkexec(1) + Fix up last comment + Bug 25594 – System logging + Remove trailing whitespace from log messages + Properly handle return value from getpwnam_r() + Fix error message when no authentication agent is available + Make pkexec(1) validate environment variables + Make pkexec(1) use the syslogging facilities + Save original cwd in pkexec(1) since it will change during the life-time + Complain on stderr, not stdout + Post-release version bump to 0.96 + Don't log authorization checks + Update NEWS for release + +David Zeuthen, +January 15, 2010 + +-------------- +PolicyKit 0.95 +-------------- + +This is polkit **0.95**. This is supposed to be the last release until 1.0. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.21.4 + - eggdbus-1 >= 0.6 + - gobject-introspection >= 0.6.2 (optional) + - pam + +### Changes since PolicyKit 0.94: + + - Alexander Sack (1): + Bug 24566 – Properly _ref authority in singleton constructor + + - Andreas Sandberg (1): + Bug 24235 – polkit-agent-helper may call pam_end with a stale pam handle + + - Bastien Nocera (1): + Fix process start time when using polkit_unix_process_new_full() + + - David Zeuthen (20): + Post-release version bump to 0.95 + Use correct program name when complaining about not being setuid root + Sort by action id in pkaction(1) output + Bug 23867 – UnixProcess vs. SystemBusName aliasing + Implement lockdown for the Local Authority implementation + Remove POLKIT_USER from configuration summary + Add missing comma so we're save both LANG and LANGUAGE, not only LANGLANGUAGE + Pass --libtool to g-ir-scanner + Clarify comment on where to find process start-time on Linux + Add properties with information about the currently used authority + Clarify when AllowUserInteraction should and shouldn't be used + Add methods AddLockdownForAction() and RemoveLockdownForAction() + Port lockdown from pklalockdown(1) to D-Bus methods + Drop ununsed policykit actions + Remove TODO about symbol visibility as this has been fixed for a while + Clarify pklocalauthority(8) man page + Properly validate all arguments passed via D-Bus + Add Python example + Fix make distcheck + Update NEWS for release + + - Matthias Clasen (1): + Bug 24640 – Typos in pklocalauthority(8) + + - Michael Biebl (8): + Trim the list of exported symbols + Use _polkit_agent_marshal prefix + Make private symbols accessible to libpolkitagent and libpolkitbackend + Make examples optional + Enable silent rules + Remove POLKIT_USER option + Don't include Polkit-1.0.gir in the dist tarball + Bug 24176 – Current git master fails to build, GLIB_LDADD -> GLIB_LIBS + + - Samuel Thibault (1): + Bug 24495 – Fails to build on platforms without PATH_MAX (like hurd) + +David Zeuthen, +November 13, 2009 + +-------------- +PolicyKit 0.94 +-------------- + +This is polkit **0.94**. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.21.4 + - eggdbus-1 >= 0.5 + - gobject-introspection >= 0.6.2 (optional) + - pam + +### Changes since PolicyKit 0.93: + + - David Zeuthen (13): + Post-release version bump to 0.94 + Require correct versions of glib and eggdbus + Ignore .pkla files starting with dot and don't segfault on error path + Allow unprivileged callers to check authorizations + Don't spawn man(1) from a setuid program + Add polkit.retains_authorization_after_challenge to authz result + Ensure all fds except stdin/stdout/stderr are closed after exec(2) + Be more careful when determining process start time + Pass the right struct offset for the ::changed class signal handler + Don't set the GError if the process doesn't exist + Remove temporary authorization when the subject it applies to vanishes + Generate GI gir and typelibs for libpolkit-gobject-1 + Update NEWS for release + + - Joe Marcus Clarke (1): + Bug 23093 – FreeBSD portability fixes + +David Zeuthen, +August 12, 2009 + +-------------- +PolicyKit 0.93 +-------------- + +This is polkit **0.93**. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.21.4 + - eggdbus-1 >= 0.5 + - pam + +### Changes since PolicyKit 0.92: + + - David Zeuthen (16): + Post-release version bump to 0.93 + GIO modules need to be prefix with lib + Cancel an authentication if the unique name for the subject vanishes + Plug a couple of memory leaks + Move local authority management to a separate library + Rip out polkit-local and refactor local authority to only use tmp authz + Move authentication agent bits to separate authority subclass + Also pass the identity of the subject we are checking for + Actually make the local authority look up authorization files + In .pkla files, use Result{Any,Inactive,Active} instead of just Result + Rename some man pages and the daemon binary + Add docs detailing how the Local Authority works + Add support for querying and revoking temporary authorizations + Fix make distcheck + Update TODO + Update NEWS for release + + - Yanko Kaneti (2): + Use unique ids for sections to prevent them being autogenerated + More unique ids to get the docs build fully predictable + +David Zeuthen, +July 20th, 2009 + +-------------- +PolicyKit 0.92 +-------------- + +This is polkit **0.92**. + +**WARNING:** +This is a prerelease on the road to PolicyKit +1.0. Public API might change and certain parts of the code still needs +some security review. Use at your own risk. + +### Build requirements: + + - glib, gobject, gio >= 2.14 + - eggdbus-1 >= 0.4 + - pam + +### Changes since PolicyKit 0.91: + + - David Zeuthen (36): + post-release version bump to 0.92 + install gtkdoc HTML in the proper location + Fix D-Bus policy to work with non-permissive D-Bus + Only allow privileged apps to check authz and add ActionLookup interface + Change the PolkitAuthorizationResult enumeration into an object + Port examples and command-line tools to new API + Move docs to proper location + Add a pkexec(1) command + Mention /usr/bin/pkexec in the configure blurb + Fix a bug where details were not shown for normal pkexec usage + Use an object, not a GHashTable when passing details around + Forgot to add source for PolkitDetails + Change the defaults for .run-frobnicate to auth_self_keep + Require eggdbus-1 >= 0.4 + Only free hash table if it's not NULL + Avoid returning an error if no authentication agent is available + Clarify docs for is_challenge member of the AuthorizationResult struct + Add pkcheck(1) command to check for authorizations + nullbackend: Catch up with latest API changes + Return the icon name instead of a GIcon in PolkitActionDescription + Add pkaction(1) and nuke polkit-1(1) commands + Update SEE ALSO sections in man pages + Add a man page for polkit-1(8) + First cut at some high-level docs + Improve pkexec(1) man page by adding screenshots of authentication dialogs + Add some more API docs + Add a "PolicyKit Overview" section to the docs + Consolidate all gtk-doc stuff in docs/polkit + Expand on the D-Bus docs + Use .../extensions instead of ../backends for loading extensions + Minor doc fixes + Move the doc chapters around a bit + Change GNOME to freedesktop.org in the docs + Fix make distcheck + Update NEWS + Also dist polkitd-1.xml + + - Richard Hughes (2): + fix up gtk-doc API markup for a couple of functions + add a draft version of the porting guide -- WIP + +David Zeuthen, +June 8, 2009 @@ -17,29 +17,28 @@ Latest documentation, reference manual and API description of polkit can be foun RELEASES ======== -Older releases of polkit (until 0.120) are available in compressed tarballs from - - http://www.freedesktop.org/software/polkit/releases/ - Latest releases are available in compressed tarballs from - https://gitlab.freedesktop.org/polkit/polkit/releases + https://www.freedesktop.org/software/polkit/releases/ To verify the authenticity of the compressed tarball, use this command - $ gpg --verify polkit-$(VERSION).tar.gz.sign polkit-$(VERSION).tar.gz - gpg: Signature made Tue 23 Apr 2019 04:19:29 PM CEST using RSA key ID FFDCE258 - gpg: Good signature from "Jan Rybar (Red Hat) <jrybar@redhat.com>" +``` bash +$ gpg --verify polkit-$(VERSION).tar.gz.sign polkit-$(VERSION).tar.gz +$ gpg: Signature made Tue 23 Apr 2019 04:19:29 PM CEST using RSA key ID FFDCE258 +$ gpg: Good signature from "Jan Rybar (Red Hat) <jrybar@redhat.com>" +``` + +Public key available at -Public key available here - http://keys.gnupg.net/pks/lookup?op=get&search=0x8CEB3030FFDCE258 + https://keys.openpgp.org/vks/v1/by-fingerprint/7FFB7D6BD83147D74284E3178CEB3030FFDCE258 BUGS and DEVELOPMENT ==================== -Please report non-security bugs via the freedesktop.org GitLab at +Please report non-security bugs via the polkit's freedesktop.org GitLab at https://gitlab.freedesktop.org/polkit/polkit/issues @@ -48,7 +47,7 @@ SECURITY ISSUES =============== Please report any security issues not yet known to public -by creating new issue and checking the "This issue is confidential" checkbox. +by creating new issue and checking the ***This issue is confidential*** checkbox. https://gitlab.freedesktop.org/polkit/polkit/issues diff --git a/configure.ac b/configure.ac index 0280dde..3303a75 100644 --- a/configure.ac +++ b/configure.ac @@ -2,7 +2,7 @@ dnl Process this file with autoconf to produce a configure script. AC_PREREQ(2.59c) AC_INIT([polkit], [0.120], [http://lists.freedesktop.org/mailman/listinfo/polkit-devel], , [http://www.freedesktop.org/wiki/Software/polkit]) -AM_INIT_AUTOMAKE([]) +AM_INIT_AUTOMAKE([foreign]) AC_CONFIG_HEADERS(config.h) AC_CONFIG_MACRO_DIR([buildutil]) m4_include([buildutil/ax_cxx_compile_stdcxx.m4]) |