| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
| |
The new plan is to hard-require JS. See discussion in
https://bugs.freedesktop.org/show_bug.cgi?id=59830
This reverts commit 34cb6353b9affd6c04ea480df5fc39d0ca72319d.
Conflicts:
src/polkitbackend/polkitbackendjsauthority.c
|
|
|
|
|
|
|
|
| |
This is required for WIFEXITED, WEXITSTATUS, WIFSIGNALED,
WTERMSIG. This must have been implicit and nobody noticed, but isn't
with SH4 architecture (Linux, Gentoo, GNU gcc and glibc).
http://bugs.freedesktop.org/show_bug.cgi?id=62220
|
|
|
|
|
|
|
|
|
| |
For esr17, mozilla have removed many of the custom typedefs and
replaced them with standard types. For example jsuint -> guint32,
uintN -> unsigned and int32 -> gint32.
These changes are backwards compatible with js185
https://bugs.freedesktop.org/show_bug.cgi?id=59781
|
|
|
|
| |
It still works, and this lets polkit build on RHEL6.
|
|
|
|
|
|
|
|
| |
Various pam modules provide environment variables that are intended to be set
in the environment of the pam session. pkexec needs to process the output of
pam_getenvlist() to get these.
https://bugs.freedesktop.org/show_bug.cgi?id=62016
|
|
|
|
|
|
| |
This is a good way for distributors to use -fPIE/-pie.
https://bugs.freedesktop.org/attachment.cgi?id=57584
|
|
|
|
|
|
|
|
| |
Check if the system is booting systemd, and fail if the automatic
configuration picks the wrong value. Emit a warning if the user explicitly
chose one way or the other, to account for cross-building.
https://bugs.freedesktop.org/show_bug.cgi?id=61127
|
|
|
|
|
|
|
| |
In Automake 1.13, the long-deprecated macro AM_CONFIG_HEADER (deprecated
since 2002) has been removed in favour of AC_CONFIG_HEADERS.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
Part of https://bugs.freedesktop.org/show_bug.cgi?id=59091
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
| |
This was pointed out in bug 57325.
https://bugs.freedesktop.org/show_bug.cgi?id=57325
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
https://bugs.freedesktop.org/show_bug.cgi?id=35685
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
https://bugs.freedesktop.org/show_bug.cgi?id=58869
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The way it works is that if XAUTHORITY is unset, then its default
value is $HOME/.Xauthority. But since we're changing user identity
this will not work since $HOME will now change. Therefore, if
XAUTHORITY is unset, just set its default value before changing
identity. This bug only affected login managers using X Window
Authorization but not explicitly setting the XAUTHORITY variable.
You can argue that XAUTHORITY is broken since it forces uid-changing
apps like pkexec(1) to do more work - and get involved in intimate
details of how X works and so on - but that doesn't change how things
work.
Based on a patch from Peter Wu <lekensteyn@gmail.com>.
https://bugs.freedesktop.org/show_bug.cgi?id=51623
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
| |
The SO-name rules for SpiderMonkey are a little bit weird and we were
opening wrong file. This problem was reported in
https://bugs.freedesktop.org/show_bug.cgi?id=57146
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
| |
A number of downstream distributors have - one way or the other -
requested this feature.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
| |
As per the intructions in the introspection Makefile, we should have a
line declaring a dependency between the .gir and .la files.
https://bugs.freedesktop.org/show_bug.cgi?id=57077
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
| |
Note that otherwise we return a freed server object. Since later in
polkit_agent_listener_register_with_options we check against NULL to
determine failure, this makes for sad times later when we call
server_free() on it again.
https://bugs.freedesktop.org/show_bug.cgi?id=55776
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
| |
For example, this can happen if the wheel group has no members. This
was reported in Red Hat bug 834494, see
https://bugzilla.redhat.com/show_bug.cgi?id=834494
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This way an authorization rule can do this
return polkit.Result.YES;
which is slightly nicer than
return "yes";
https://bugs.freedesktop.org/show_bug.cgi?id=50983
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
| |
It doesn't do anything. This was pointed out in
https://bugs.freedesktop.org/show_bug.cgi?id=51470
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
This was reported in https://bugs.freedesktop.org/show_bug.cgi?id=51466
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
| |
The code for looking up localized strings for action descriptions
was manually trying to break locale names into pieces, but didn't
get it right for e.g. zh_CN.utf-8. Instead, use the GLib function
g_get_locale_variants(), which handles this (and more). This fixes
the translation problem reported in
https://bugzilla.gnome.org/show_bug.cgi?id=665497
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Now that GDBusProxy does something reasonable for a masked systemd
service, see
https://bugzilla.gnome.org/show_bug.cgi?id=677718
construction of the PolkitAuthority object does not fail anymore. That
doesn't mean the authority is available, though, so mention that users
should check the result of the CheckAuthorization() call as well. Or
in the case of PolkitAuthority, that the error is not a POLKIT_ERROR.
This is actually a nice feature, it means that if you unmask
polkit.service then mechanisms using PolkitAuthority will start using
it without a restart.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
Pointed out by Dan Williams <dcbw@redhat.com> on IRC.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
| |
... although it would be nicer to just rip out the CK bits and simply
hard-require libsystemd-login instead - it should work just fine on
non-systemd systems, same way systemd-udev works fine there.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
|
| |
First, we were using == instead of =, as the author probably intended.
But after changing that, we're now assigning to const memory. Fix
that by writing to a temporary string buffer.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
| |
A pre-built libtool copy may not be installed on all systems; all
we need is libtoolize.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
|
| |
libjs is a Fedora-specific invention; mozjs185.pc lives in the
upstream tarball.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
|
|
| |
... e.g. we reserve the right to switch out the JS engine.
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <zeuthen@gmail.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <davidz@redhat.com>
|
|
|
|
| |
Signed-off-by: David Zeuthen <davidz@redhat.com>
|
|
|
|
|
|
| |
There's really no reason to run all this code as uid 0.
Signed-off-by: David Zeuthen <davidz@redhat.com>
|