summaryrefslogtreecommitdiff
path: root/docs/man
Commit message (Collapse)AuthorAgeFilesLines
* docs, build: replace the mailman url with the gitlab/issues urlVincent Mihalkovic2023-04-116-6/+6
|
* Remove autotools build systemJan Rybar2022-05-091-33/+0
|
* pkexec: Don't chdir(~)Adrian Vovk2022-05-021-0/+9
|
* Added support for duktape as JS engineGustavo Lima Chaves2022-01-251-1/+3
| | | | | Original author: Wu Xiaotian (@yetist) Resurrection author, runaway-killer author: Gustavo Lima Chaves (@limachaves)
* Revert "Merge branch 'pwithnall/polkit-51-usr-local-share-is-my-homeboy' ↵revert-2c8287fbJan Rybar2021-04-131-14/+9
| | | | | into 'master'" This reverts merge request !75
* test: Fix a typo in a commentJan Rybar2021-02-251-9/+14
| | | | Signed-off-by: Philip Withnall <withnall@endlessm.com>
* fix typosRené Genz2021-02-211-22/+22
|
* build: Port to meson build systemJan Rybar2020-10-262-0/+37
| | | | | | meson is a build system focused on speed an ease of use, which helps speeding up the software development. This patch adds meson support along autotools.
* Fix a typo in polkit(8)Miloslav Trmač2017-10-091-1/+1
| | | | | | Reported by Perter Klotz <peter.klotz99@gmail.com>. https://bugs.freedesktop.org/show_bug.cgi?id=103144
* pkcheck: fix man typosAnders Jonsson2015-10-211-5/+5
| | | https://bugs.freedesktop.org/show_bug.cgi?id=92566
* build: Start using git.mkColin Walters2015-06-031-0/+2
| | | | | | | | I was looking at: https://bugs.freedesktop.org/show_bug.cgi?id=85504 But polkit, particularly because of its use of recursive make, is a good fit for git.mk.
* pkexec: Support just plain "pkexec" to run shellColin Walters2014-02-181-5/+6
| | | | | | | | I use "pkexec bash" a lot, and it'd be nice to be able to just type "pkexec" and have it do what I want. Like how "su" will run the shell by default. https://bugs.freedesktop.org/show_bug.cgi?id=74933
* pkcheck: Support --process=pid,start-time,uid syntax tooColin Walters2013-09-181-9/+20
| | | | | | | | | | | | | | The uid is a new addition; this allows callers such as libvirt to close a race condition in reading the uid of the process talking to them. They can read it via getsockopt(SO_PEERCRED) or equivalent, rather than having pkcheck look at /proc later after the fact. Programs which invoke pkcheck but need to know beforehand (i.e. at compile time) whether or not it supports passing the uid can use: pkcheck_supports_uid=$($PKG_CONFIG --variable pkcheck_supports_uid polkit-gobject-1) test x$pkcheck_supports_uid = xyes
* More warnings about using auth_self*Miloslav Trmač2013-05-061-2/+6
| | | | | | Suggested by Colin Walters. https://bugs.freedesktop.org/show_bug.cgi?id=57284
* Use auth_admin* instead of auth_self* in examplesMiloslav Trmač2013-05-061-1/+1
| | | | | | | | From time to time, application developers just copy example configuration without examining it in details. Because polkit is typically used to control access to system-level operations, the policy (and therefore the examples) should limit access to system administrators only.
* man: Fix pkaction man page wrt to --action-id optionMichael Biebl2013-05-061-1/+1
| | | | Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641527
* docs: mention the audience for authorization rulesDavid Zeuthen2012-11-141-0/+13
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* pkexec: add support for argv1 annotation and mention shebang-wrappersDavid Zeuthen2012-07-111-1/+40
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Introduce a polkit.Result enumeration for authorization rulesDavid Zeuthen2012-07-061-20/+32
| | | | | | | | | | | | | | This way an authorization rule can do this return polkit.Result.YES; which is slightly nicer than return "yes"; https://bugs.freedesktop.org/show_bug.cgi?id=50983 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Mention the implications of returning *_keep in an authorization ruleDavid Zeuthen2012-06-071-2/+18
| | | | | | Pointed out by Dan Williams <dcbw@redhat.com> on IRC. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* State that authorization rules must not rely on SpiderMonkey featureswip/js-rule-filesDavid Zeuthen2012-06-041-5/+13
| | | | | | ... e.g. we reserve the right to switch out the JS engine. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Update pkexec(1) man page with exampleDavid Zeuthen2012-06-041-0/+1
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Update links to udisks docsDavid Zeuthen2012-06-041-4/+2
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Run polkitd as an unprivileged userDavid Zeuthen2012-05-252-3/+20
| | | | | | There's really no reason to run all this code as uid 0. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Clarify pkexec(1) variablesDavid Zeuthen2012-05-242-11/+25
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Combine action and details parametersDavid Zeuthen2012-05-241-175/+204
| | | | | | | | | | This also removes the ability to change detail parameters which is actually a good thing. If we later need a way to change the authentication message, we can always add something like polkit.addAuthenticationMessageRule() so the user can register a function returning a string. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Terminate runaway scriptsDavid Zeuthen2012-05-241-0/+7
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Mention systemd(1) in the polkitd(8) man pageDavid Zeuthen2012-05-231-3/+11
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Add real-world example featuring udisks2 and the drive.* variables it passesDavid Zeuthen2012-05-231-1/+25
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Use <variablelist> instead of <informaltable> for Subject attributesDavid Zeuthen2012-05-231-48/+64
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Mention details["polkit.message"] and add an example using detailsDavid Zeuthen2012-05-231-5/+48
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Fix a couple typos in the docsDavid Zeuthen2012-05-233-5/+5
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Fix spelingDavid Zeuthen2012-05-221-1/+1
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* polkitd: add reference to polkit(8) from its man pageDavid Zeuthen2012-05-221-1/+4
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Clarify docs a bitDavid Zeuthen2012-05-221-8/+6
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* docs: update SEE ALSO to make each man page point to all other man pagesDavid Zeuthen2012-05-225-8/+16
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* docs: enclose local <citerefentry> in <link> to make links workDavid Zeuthen2012-05-226-78/+29
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Update docsDavid Zeuthen2012-05-227-793/+264
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Mention unix-netgroup:xyz as a valid return value in addAdminRule() functionsDavid Zeuthen2012-05-211-1/+2
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Minor doc fixesDavid Zeuthen2012-05-211-7/+4
| | | | | | Nuke the has_prefix() helper, it's just confusing. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Add netgroup supportDavid Zeuthen2012-05-211-0/+15
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* docs: emphasize that registered functions may actually never be calledDavid Zeuthen2012-05-211-2/+11
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* docs: clarify how rules files workDavid Zeuthen2012-05-211-20/+51
| | | | | | After feedback from Matthias Clasen <mclasen@redhat.com>. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Also add an example of polkit.spawn() to polkit(8) man pageDavid Zeuthen2012-05-201-0/+20
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* docs: add AUTHORIZATION RULES section to the polkit(8) man pageDavid Zeuthen2012-05-201-0/+238
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Make it possible to influence agent registration with an a{sv} parameterDavid Zeuthen2012-04-121-0/+11
| | | | | | | | | | | Additionally, add a "fallback" option. Also add support in this in the pkttyagent(1) program. This slightly breaks libpolkit-backend API by adding a GVariant* param to one of the class vfuncs... but that API is already declared unstable so that's fine. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Add pkttyagent(1) helperDavid Zeuthen2012-04-116-0/+180
| | | | | | | | | | | This came up while working on https://bugzilla.redhat.com/show_bug.cgi?id=804088 and is useful for example if it's not suitable or appropriate to link against the polkit libraries. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Bug 43610 - Add netgroup supportNikki VonHollen2011-12-221-3/+6
| | | | | | | | https://bugs.freedesktop.org/show_bug.cgi?id=43610 Added netgroup support and additional unit tests with MockLibc support. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Default to AdminIdentities=unix-group:wheel for local authorityDavid Zeuthen2011-12-061-2/+2
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Bug 41025 – Add org.freedesktop.policykit.owner annotationDavid Zeuthen2011-10-181-0/+13
| | | | | | | | | | This allows daemons running as a designated uid to check authorizations. Based on a patch from Christopher James Halse Rogers <chalserogers@gmail.com>. https://bugs.freedesktop.org/show_bug.cgi?id=41025 Signed-off-by: David Zeuthen <davidz@redhat.com>