polkit 0.106

David Zeuthen zeuthen at gmail.com
Thu Jun 7 11:21:46 PDT 2012


Hey,

Here's a new polkit release

 http://www.freedesktop.org/software/polkit/releases/polkit-0.106.tar.gz
 http://www.freedesktop.org/software/polkit/releases/polkit-0.106.tar.gz.sign
 http://www.freedesktop.org/software/polkit/docs/0.106/

The big thing here is the switch from .pkla to .rules files. I hope you like it.

--------------
polkit 0.106
--------------

WARNING WARNING WARNING: This is a prerelease on the road to polkit
1.0. Public API might change and certain parts of the code still needs
some security review. Use at your own risk.

This is polkit 0.106. There's a major change in this release which is
a switch from .pkla files (keyfile-format) to .rules files
(JavaScript), see

 http://davidz25.blogspot.com/2012/06/authorization-rules-in-polkit.html

for more information.

Build requirements

 glib, gobject, gio    >= 2.30
 mozjs185
 gobject-introspection >= 0.6.2 (optional)
 pam (optional)
 ConsoleKit OR systemd

Changes since polkit 0.105:

Colin Walters (3):
      build: Check for mozjs185, not libjs
      autogen.sh: Fix check for libtool (we only need libtoolize)
      agenthelper-pam: Fix newline-trimming code

David Zeuthen (65):
      Post-release version bump to 0.106
      Add experimental authority backend using JavaScript rule files
      Include seat and session in Subject object
      Pass details to JS functions and simplify how Subject instances
are constructed
      Clean up code a bit
      Add a couple of more error checks
      Collect garbage
      Emit ::Changed signal after reloading rules
      Reformat init.js and also avoid quoting non-string properties in
toString()
      Make it possible for JS code to change details
      Add polkit.spawn() to spawn external programs
      Make polkit.spawn() take an array of arguments instead of a command-line
      Don't include command-line in spawning error messages
      docs: add AUTHORIZATION RULES section to the polkit(8) man page
      Also add an example of polkit.spawn() to polkit(8) man page
      docs: clarify how rules files work
      Also load rules from /usr/share/polkit/rules.d
      Use addRule() and addAdminRule()
      docs: emphasize that registered functions may actually never be called
      Add test cases for evaluation order
      Test that subject.isInGroup() works
      Add netgroup support
      Minor doc fixes
      Mention unix-netgroup:xyz as a valid return value in
addAdminRule() functions
      Add test-cases and 10 second timeout for polkit.spawn()
      Create rules.d directories
      Update docs
      docs: enclose local <citerefentry> in <link> to make links work

      docs: update SEE ALSO to make each man page point to all other man pages
      Clarify docs a bit
      polkitd: add reference to polkit(8) from its man page
      Fix speling
      Fix a couple typos in the docs
      Mention details["polkit.message"] and add an example using details
      Use <variablelist> instead of <informaltable> for Subject attributes
      Make polkit_details_insert() remove the key if passed value is NULL
      Add real-world example featuring udisks2 and the drive.*
variables it passes
      Rename --enable-systemd to --enable-libsystemd-login
      Fix distcheck
      Add a systemd .service file
      Nuke polkitbackend library, localauthority backend and extension system
      Mention systemd(1) in the polkitd(8) man page
      Store private binaries in /usr/lib/polkit-1 instead of /usr/libexec
      Add default rules
      Pass expanded identity list to the AuthenticationSession
      Use "rules", not "scripts" to refer to files in rules.d
      Terminate runaway scripts
      Use a condition variable to signal that runaway killer thread is ready
      Combine action and details parameters
      Clarify pkexec(1) variables
      Use g_unix_signal_add() from GLib 2.30
      Move polkitd into src/polkitbackend
      Ensure polkitd is rebuilt if libpolkit-backend-1.la changes
      Remove unused DBUS_GLIB_* and GIO_* variables
      Run polkitd as an unprivileged user
      Log when the name org.fd.PolicyKit1 has been acquired
      Rewrite the "Writing polkit applications" chapter
      Update links to udisks docs
      Update pkexec(1) man page with example
      Small updates to the "Writing polkit applications" chapter
      State that authorization rules must not rely on SpiderMonkey features
      Make it work when using ConsoleKit instead of libsystemd-login
      Mention the implications of returning *_keep in an authorization rule
      docs: add a "make sure your app works when there's no polkitd(8)" note
      Update NEWS for release

Thanks to our contributors.

David Zeuthen,
June 7, 2012


More information about the polkit-devel mailing list