History log of /systemd/src/core/org.freedesktop.systemd1.policy.in.in
Revision Date Author Comments Expand
1d22e9068c52c1cf935bcdff70b9b9654e3c939e 18-Feb-2015 Lennart Poettering <lennart@poettering.net>

core: rework policykit hookup - Always issue selinux access check as early as possible, and PK check as late as possible. - Introduce a new policykit action for altering environment - Open most remaining bus calls to unprivileged clients via PK

b576fcf43a32c0bb2e3f8a4f61770d2cdac00fcb 13-Oct-2014 Lennart Poettering <lennart@poettering.net>

polkit: as we dropped support for the polkit bus transport, also drop its polkit policy

283868e1dcd8ea7475850d9c6e7d4722c473dd50 18-Aug-2014 Stef Walter <stef@thewalter.net>

core: Verify systemd1 DBus method callers via polkit DBus methods that retrieve information can be called by anyone. DBus methods that modify state of units are verified via polkit action: org.freedesktop.systemd1.manage-units DBus methods that modify state of unit files are verified via polkit action: org.freedesktop.systemd1.manage-unit-files DBus methods that reload the entire daemon state are verified via polkit action: org.freedesktop.systemd1.reload-daemon DBus methods that modify job state are callable from the clients that started the job. root (ie: CAP_SYS_ADMIN) can continue to perform all calls, property access etc. There are several DBus methods that can only be called by root. Open up the dbus1 policy for the above methods. (Heavily modified by Lennart, making use of the new bus_verify_polkit_async() version that doesn't force us to always pass the original callback around. Also, interactive auhentication must be opt-in, not unconditional, hence I turned this off.)

90ccc3fca7e53a60a9e67b9d5812e1d4a27fc07d 12-Apr-2012 Kay Sievers <kay@vrfy.org>

move more main systemd parts to core/