- Mar 16, 2024
-
-
Simon McVittie authored
-
Simon McVittie authored
-
Simon McVittie authored
This is unnecessary now that we depend on gir1.2-gio-2.0-dev and a new enough gobject-introspection.
-
Simon McVittie authored
-
Simon McVittie authored
-
Simon McVittie authored
-
Simon McVittie authored
Closes: #1066531 Thanks: Michael Biebl
-
Michael Biebl authored
-
Michael Biebl authored
-
- Feb 23, 2024
-
-
Simon McVittie authored
Having transitional packages depend on package (>= x) instead of package (= x) means that the transitional package can remain installed on user systems even after it has been obsoleted and removed, if it's required by third-party software.
-
- Jan 21, 2024
-
-
Luca Boccassi authored
-
Luca Boccassi authored
As invited by Simon: !12 (comment 456774)
-
- Jan 18, 2024
-
-
Luca Boccassi authored
-
Luca Boccassi authored
polkit-pkla-compat comes from a different upstream repository so it's nice to specifically mention it for the benefit of human readers, even if it doesn't make a difference for machines
-
Luca Boccassi authored
-
Luca Boccassi authored
-
Luca Boccassi authored
Gbp-Dch: ignore
-
Luca Boccassi authored
-
Luca Boccassi authored
-
Luca Boccassi authored
-
Luca Boccassi authored
Update to upstream version '124' with Debian dir 06d89d11a9efc8658d7657301e1595de6d46d69a
-
Luca Boccassi authored
polkit migrated the repository to https://github.com/polkit-org/polkit https://lists.freedesktop.org/archives/polkit-devel/2024-January/000649.html
-
Luca Boccassi authored
-
- Jan 17, 2024
- Dec 21, 2023
-
-
Luca Boccassi authored
When unix-process is used and a uid is not passed, it will be derived from the running process. But this is racy, as the identity can change over time (e.g.: setuid binaries can be exec'ed). If the caller can securely fetch the pidfd of a process (e.g.: via SO_PEERPIDFD), then it can also securely fetch the uid (e.g.: via SO_PEERCRED), so enforce that they are passed together to avoid possible races, in case a polkit rule performs authorization based on the uid. Follow-up for 374a6280
-
- Dec 14, 2023
-
-
Luca Boccassi authored
-
- Nov 29, 2023
-
-
Aleksandr Melman authored
-
Zbigniew Jędrzejewski-Szmek authored
-
- Nov 02, 2023
-
-
Luca Boccassi authored
Same fix is needed as in the duktape case. Follow-up for 89b7a37b
-
Christian K authored
-
It is not useful, as only AF_UNIX sockets are permitted anyway, and a network namespace it is used. It requires loading a BPF program which might not work everywhere.
-
- Oct 30, 2023
-
-
Luca Boccassi authored
The fd_list object is owned by the caller and has to be freed. Follow-up for a23d9ce3
-
- Oct 20, 2023
-
-
Simon McVittie authored
-
Simon McVittie authored
This avoids making it too easy to backport a version that won't work correctly. Thanks: Michael Biebl
-
- Oct 19, 2023
-
-
Simon McVittie authored
-
- Oct 17, 2023
-
-
Simon McVittie authored
This was allowed by Technical Committee resolution #1053901. polkit has not usually been backported, so it doesn't seem important to make backports trivial for this particular package.
-
- Oct 04, 2023
-
-
Ray Strode authored
The polkit-gobject-1.pc file currently doesn't offer a variable where polkit rules can be installed. This commit fixes that.
-
Xi Ruoyao authored
No code change is needed!
-
Jan Rybar authored
-