summaryrefslogtreecommitdiff
path: root/docs
Commit message (Collapse)AuthorAgeFilesLines
* docs, build: replace the mailman url with the gitlab/issues urlVincent Mihalkovic2023-04-116-6/+6
|
* updated links to latest documentationJan Rybar2022-10-261-1/+1
|
* docs: fix building with meson 0.61.1mikhailnov2022-09-092-7/+7
|
* Remove autotools build systemJan Rybar2022-05-093-152/+0
|
* pkexec: Don't chdir(~)Adrian Vovk2022-05-021-0/+9
|
* Added support for duktape as JS engineGustavo Lima Chaves2022-01-251-1/+3
| | | | | Original author: Wu Xiaotian (@yetist) Resurrection author, runaway-killer author: Gustavo Lima Chaves (@limachaves)
* docs: Distribute documentation source files againSimon McVittie2021-06-031-1/+2
| | | | | | | These were missing from the 0.119 release tarball. Resolves: #143 Signed-off-by: Simon McVittie <smcv@debian.org>
* Revert "Merge branch 'pwithnall/polkit-51-usr-local-share-is-my-homeboy' ↵revert-2c8287fbJan Rybar2021-04-133-75/+56
| | | | | into 'master'" This reverts merge request !75
* test: Fix a typo in a commentJan Rybar2021-02-253-56/+75
| | | | Signed-off-by: Philip Withnall <withnall@endlessm.com>
* fix typosRené Genz2021-02-211-22/+22
|
* build: Port to meson build systemJan Rybar2020-10-266-1/+102
| | | | | | meson is a build system focused on speed an ease of use, which helps speeding up the software development. This patch adds meson support along autotools.
* Fix a typo in polkit(8)Miloslav Trmač2017-10-091-1/+1
| | | | | | Reported by Perter Klotz <peter.klotz99@gmail.com>. https://bugs.freedesktop.org/show_bug.cgi?id=103144
* pkcheck: fix man typosAnders Jonsson2015-10-211-5/+5
| | | https://bugs.freedesktop.org/show_bug.cgi?id=92566
* docs: Update for changes to uid binding/AuthenticationAgentResponse2Miloslav Trmač2015-06-173-10/+17
| | | | | | | | | | | | | | | | - Refer to PolkitAgentSession in general instead of to _response only - Revert to the original description of authentication cancellation, the agent really needs to return an error to the caller (in addition to dealing with the session if any). - Explicitly document the UID assumption; in the process fixing bug #69980. - Keep documenting that we need a sufficiently privileged caller. - Refer to the ...Response2 API in more places. - Also update docbook documentation. - Drop a paragraph suggesting non-PolkitAgentSession implementations are expected and commonplace. Bug: https://bugs.freedesktop.org/show_bug.cgi?id=90837 Reviewed-by: Colin Walters <walters@redhat.com>
* CVE-2015-4625: Bind use of cookies to specific uidsColin Walters2015-06-172-9/+55
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | http://lists.freedesktop.org/archives/polkit-devel/2015-June/000425.html The "cookie" value that Polkit hands out is global to all polkit users. And when `AuthenticationAgentResponse` is invoked, we previously only received the cookie and *target* identity, and attempted to find an agent from that. The problem is that the current cookie is just an integer counter, and if it overflowed, it would be possible for an successful authorization in one session to trigger a response in another session. The overflow and ability to guess the cookie were fixed by the previous patch. This patch is conceptually further hardening on top of that. Polkit currently treats uids as equivalent from a security domain perspective; there is no support for SELinux/AppArmor/etc. differentiation. We can retrieve the uid from `getuid()` in the setuid helper, which allows us to ensure the uid invoking `AuthenticationAgentResponse2` matches that of the agent. Then the authority only looks at authentication sessions matching the cookie that were created by a matching uid, thus removing the ability for different uids to interfere with each other entirely. Several fixes to this patch were contributed by: Miloslav Trmač <mitr@redhat.com> Bug: https://bugs.freedesktop.org/show_bug.cgi?id=90837 CVE: CVE-2015-4625 Reported-by: Tavis Ormandy <taviso@google.com> Reviewed-by: Miloslav Trmač <mitr@redhat.com> Signed-off-by: Colin Walters <walters@redhat.com>
* s/INCLUDES/AM_CPPFLAGS/gMiloslav Trmač2015-06-081-1/+1
| | | | | | | to silence warning: 'INCLUDES' is the old name for 'AM_CPPFLAGS' (or '*_CPPFLAGS') https://bugs.freedesktop.org/show_bug.cgi?id=80767
* build: Start using git.mkColin Walters2015-06-033-0/+6
| | | | | | | | I was looking at: https://bugs.freedesktop.org/show_bug.cgi?id=85504 But polkit, particularly because of its use of recursive make, is a good fit for git.mk.
* pkexec: Support just plain "pkexec" to run shellColin Walters2014-02-181-5/+6
| | | | | | | | I use "pkexec bash" a lot, and it'd be nice to be able to just type "pkexec" and have it do what I want. Like how "su" will run the shell by default. https://bugs.freedesktop.org/show_bug.cgi?id=74933
* pkcheck: Support --process=pid,start-time,uid syntax tooColin Walters2013-09-181-9/+20
| | | | | | | | | | | | | | The uid is a new addition; this allows callers such as libvirt to close a race condition in reading the uid of the process talking to them. They can read it via getsockopt(SO_PEERCRED) or equivalent, rather than having pkcheck look at /proc later after the fact. Programs which invoke pkcheck but need to know beforehand (i.e. at compile time) whether or not it supports passing the uid can use: pkcheck_supports_uid=$($PKG_CONFIG --variable pkcheck_supports_uid polkit-gobject-1) test x$pkcheck_supports_uid = xyes
* Fix inclusion of COPYING into documentation with srcdir != builddirMiloslav Trmač2013-05-151-0/+1
| | | | https://bugs.freedesktop.org/show_bug.cgi?id=64197
* More warnings about using auth_self*Miloslav Trmač2013-05-062-4/+28
| | | | | | Suggested by Colin Walters. https://bugs.freedesktop.org/show_bug.cgi?id=57284
* Use auth_admin* instead of auth_self* in examplesMiloslav Trmač2013-05-062-3/+3
| | | | | | | | From time to time, application developers just copy example configuration without examining it in details. Because polkit is typically used to control access to system-level operations, the policy (and therefore the examples) should limit access to system administrators only.
* man: Fix pkaction man page wrt to --action-id optionMichael Biebl2013-05-061-1/+1
| | | | Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641527
* Fold enum documentation into relevant classesMiloslav Trmač2013-04-151-17/+3
| | | | | | | | Fold PolkitImplicitAuthorization and PolkitCheckAuthorizationFlags into the relevant classes in the section list; polkit-1-docs.xml is already not including the enum documents. https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Document deprecated functions.Miloslav Trmač2013-04-151-0/+3
| | | | | | | | All of these are a part of public API with some external users. Do the minimum to avoid a warning; ideally we should also add a *_DISABLE_DEPRECATED macro etc. https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Include documentation of polkit_action_description_get_annotation_keysMiloslav Trmač2013-04-151-0/+1
| | | | | | | | This seems a fairly obvious public counterpart of polkit_action_description_get_annotation, and it is used in pkaction.c in what is pretty much an example of public API use. https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Fix most "undocumented symbol" warningsMiloslav Trmač2013-04-152-4/+6
| | | | | | | - Mark private header files as private. - Fix obvious typos in the section file. https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Leave out backend from gtk-doc generationMiloslav Trmač2013-04-151-1/+1
| | | | | | | ... which silences warnings about these classes missing from polkit-1-sections.txt https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Add annotation glossaryMiloslav Trmač2013-04-151-0/+2
| | | | | | | | as described at the end of https://live.gnome.org/GObjectIntrospection/Annotations. Fixes a huge number of warnings. https://bugs.freedesktop.org/show_bug.cgi?id=63573
* Fix DOC_SOURCE_DIR for builddir != srcdirMiloslav Trmač2013-04-121-2/+5
| | | | | | | This snippet comes from gtk-doc 1.18 examples/Makefile.am; we might want to update all of the file but that's not strictly necessary. https://bugs.freedesktop.org/show_bug.cgi?id=63479
* Fix build with srcdir!=builddirMiloslav Trmač2013-04-121-0/+4
| | | | | | | gtk-doc.make is attempting to add --path automatically but there is a bug in the script in gtk-doc 1.18 https://bugs.freedesktop.org/show_bug.cgi?id=63479
* docs: mention the audience for authorization rulesDavid Zeuthen2012-11-142-0/+23
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* pkexec: add support for argv1 annotation and mention shebang-wrappersDavid Zeuthen2012-07-111-1/+40
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Introduce a polkit.Result enumeration for authorization rulesDavid Zeuthen2012-07-061-20/+32
| | | | | | | | | | | | | | This way an authorization rule can do this return polkit.Result.YES; which is slightly nicer than return "yes"; https://bugs.freedesktop.org/show_bug.cgi?id=50983 Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Update guidance on situations where there is no polkit authorityDavid Zeuthen2012-06-081-1/+6
| | | | | | | | | | | | | | | | | | Now that GDBusProxy does something reasonable for a masked systemd service, see https://bugzilla.gnome.org/show_bug.cgi?id=677718 construction of the PolkitAuthority object does not fail anymore. That doesn't mean the authority is available, though, so mention that users should check the result of the CheckAuthorization() call as well. Or in the case of PolkitAuthority, that the error is not a POLKIT_ERROR. This is actually a nice feature, it means that if you unmask polkit.service then mechanisms using PolkitAuthority will start using it without a restart. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* docs: add a "make sure your app works when there's no polkitd(8)" noteDavid Zeuthen2012-06-071-0/+22
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Mention the implications of returning *_keep in an authorization ruleDavid Zeuthen2012-06-071-2/+18
| | | | | | Pointed out by Dan Williams <dcbw@redhat.com> on IRC. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* State that authorization rules must not rely on SpiderMonkey featureswip/js-rule-filesDavid Zeuthen2012-06-041-5/+13
| | | | | | ... e.g. we reserve the right to switch out the JS engine. Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Small updates to the "Writing polkit applications" chapterDavid Zeuthen2012-06-041-74/+161
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Update pkexec(1) man page with exampleDavid Zeuthen2012-06-041-0/+1
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Update links to udisks docsDavid Zeuthen2012-06-041-4/+2
| | | | Signed-off-by: David Zeuthen <zeuthen@gmail.com>
* Rewrite the "Writing polkit applications" chapterDavid Zeuthen2012-05-251-38/+142
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Run polkitd as an unprivileged userDavid Zeuthen2012-05-252-3/+20
| | | | | | There's really no reason to run all this code as uid 0. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Remove unused DBUS_GLIB_* and GIO_* variablesDavid Zeuthen2012-05-251-4/+0
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Clarify pkexec(1) variablesDavid Zeuthen2012-05-242-11/+25
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Combine action and details parametersDavid Zeuthen2012-05-241-175/+204
| | | | | | | | | | This also removes the ability to change detail parameters which is actually a good thing. If we later need a way to change the authentication message, we can always add something like polkit.addAuthenticationMessageRule() so the user can register a function returning a string. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Terminate runaway scriptsDavid Zeuthen2012-05-241-0/+7
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Mention systemd(1) in the polkitd(8) man pageDavid Zeuthen2012-05-231-3/+11
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>
* Nuke polkitbackend library, localauthority backend and extension systemDavid Zeuthen2012-05-235-133/+1
| | | | | | | | | | | Any backend can now be implemented in JavaScript (if so desired) so we don't need any of this any more. Note that the libpolkitbackend library was never declared stable (the preprocessor symbol POLKIT_BACKEND_I_KNOW_API_IS_SUBJECT_TO_CHANGE had to be defined) so removing it is not an API/ABI break. Signed-off-by: David Zeuthen <davidz@redhat.com>
* Add real-world example featuring udisks2 and the drive.* variables it passesDavid Zeuthen2012-05-231-1/+25
| | | | Signed-off-by: David Zeuthen <davidz@redhat.com>