PolicyKit: Branch 'master'

David Zeuthen david at kemper.freedesktop.org
Wed Nov 21 20:23:44 PST 2007


 doc/TODO |   40 +++++++++-------------------------------
 1 file changed, 9 insertions(+), 31 deletions(-)

New commits:
commit b555fb7594cc4d627c7aa7e33906bbcd3a34faf3
Author: David Zeuthen <davidz at redhat.com>
Date:   Wed Nov 21 23:23:09 2007 -0500

    update TODO

diff --git a/doc/TODO b/doc/TODO
index b403451..c5651d1 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -1,7 +1,4 @@
 
- - Add support for overriding defaults. Will require 
-   org.freedesktop.policykit.grant
-
  - On every polkit_context_is_[caller|session]_authorized we load
    all .policy XML files. This is bad. Dave Jones will kill us. 
    We should
@@ -33,37 +30,18 @@
    external API). This is mainly to be able to handle OOM for
    mechanisms that will need this (such as dbus-daemon)
 
- - add support for additional <match> attributes
-   in /etc/PolicyKit/PolicyKit.conf
-
-   - <match timeofday="0900-1700">
-     Matches 9am through 5pm local time
-
-   - <match weekday="Mon-Fri">
-     Matches only on Monday->Friday both inclusive
-
-   - <match selinux_context="regexp">
-     Match on caller's SELinux context
-
-   - <match caller_exe="regexp">
-     Matches the path of the executable the caller stems from
-
-   - <match group="regexp">
-     Match on group
-
-   - <match session_active="true|false">
-     Only if the caller is in an active session (or not)
+ - Kill the config file
 
-   - <match seat_local="true|false">
-     Only if the caller is on a local seat (or not)
+ - Add support for granting authorizations to a) UNIX Groups; and 
+   b) SELinux security contexts
 
-   ... And of course the we need the ULTIMATE copout
+ - Add API and support in polkit-auth/polkit-action for maintaining
+   a list of entities for whom implicit authorizations do not apply.
+   (Typical example is that in a desktop OS one wants a UNIX group
+    for "Restricted Users". Another example is a guest account.)
 
-   - <match run_program="">
-     Run a program to make the decision; details are exported in the
-     environment. Program cannot assume to run as root or in a specific
-     security context; it will need to use a helper a'la
-     pam_unix_password.so
+ - Add API and support in polkit-auth/polkit-action to define what
+   administrator auth means.
 
  - Reconsider adding k/v dictionaries to Actions; e.g. the Mechanism for
    dial-up networking can attach the key/value pair


More information about the hal-commit mailing list