Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

polkit-devel-0.116-lp152.1.4 RPM for x86_64

From OpenSuSE Leap 15.2 for x86_64

Name: polkit-devel Distribution: openSUSE Leap 15.2
Version: 0.116 Vendor: openSUSE
Release: lp152.1.4 Build date: Sat May 16 19:29:09 2020
Group: Development/Libraries/C and C++ Build host: lamb14
Size: 396077 Source RPM: polkit-0.116-lp152.1.4.src.rpm
Packager: https://bugs.opensuse.org
Url: http://www.freedesktop.org/wiki/Software/polkit/
Summary: Development files for PolicyKit
Development files for PolicyKit Authorization Framework.

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Fri Nov 29 2019 Bjørn Lie <bjorn.lie@gmail.com>
  - Fix usage of libexecdir instead of prefix/lib where applicable.
* Tue Oct 08 2019 Marcus Meissner <meissner@suse.com>
  - polkit-keyinit.patch: add pam_keyinit to the polkit configuration (bsc#1144053)
* Wed May 29 2019 Bjørn Lie <bjorn.lie@gmail.com>
  - Update to version 0.116:
    + Leaking zombie child processes.
    + Possible resource leak found by static analyzer.
    + Output messages tuneup.
    + Sanity fixes.
    + pkttyagent tty echo disabled on SIGINT.
    + HACKING: add link to Code of Conduct.
    + polkitbackend: comment typos fix.
    + configure.ac: fix detection of systemd with cgroups v2.
    + CVE-2018-19788 High UIDs overflow fix.
    + CVE-2019-6133 Slowfork vulnerability fix.
    + Allow unset process-uid.
    + Port the JS authority to mozjs-60.
    + Use JS_EncodeStringToUTF8.
    + Updated translations.
  - Replace pkgconfig(mozjs-52) with pkgconfig(mozjs-60)
    BuildRequires following upstreams changes.
  - Drop patches fixed upstream:
    + polkit-fix-possible-resource-leak.patch
    + polkit-fix-leaking-zombie-child-processes.patch
    + polkit-CVE-2018-19788.patch
  - Refresh patches with quilt.
* Fri May 10 2019 Dominique Leuenberger <dimstar@opensuse.org>
  - Use systemd_ordering instead of systemd_requires: strictly
    speaking, polkit does not require systemd to be present. Just
    that when we install on a system with systemd (e.g outside
    containers) we would want systemd to be present before
    installing polkit. Help also reduce a cycle without special hacks
    in systemd.spec.
* Fri Apr 26 2019 mvetter@suse.com
  - bsc#1130588: Require shadow instead of old pwdutils
  - User proper Requires(pre)/Requires(post) for permissions and
    shadow
* Thu Dec 20 2018 meissner@suse.com
  - polkit-CVE-2018-19788.patch: Fixed handling of UIDs over MAX_UINT
    (bsc#1118277 CVE-2018-19788)
* Fri Aug 17 2018 bjorn.lie@gmail.com
  - Add polkit-fix-possible-resource-leak.patch: Fix possible
    resource leak found by static analyzer.
  - Add polkit-fix-leaking-zombie-child-processes.patch: polkitd: fix
    zombie not reaped when js spawned process timed out (fdo#106021).
* Wed Jul 11 2018 meissner@suse.com
  - Update to version 0.115:
    - Fix CVE-2018-1116: Trusting client-supplied UID (bsc#1099031)
    - jsauthority: pass "%s" format string to remaining report function
      (obsoletes polkit-jsauthority-pass-format-string.patch)
* Mon Apr 09 2018 bjorn.lie@gmail.com
  - Update to version 0.114:
    + Port to mozjs 52, the latest version of the firefox JavaScript
      engine.
    + Add gettext support for policy files.
    + Fixes for various memory leaks.
    + Updated translations.
  - Update keyring with Ray Strode <halfline@gmail.com> public key.
  - Drop with_systemd define and all conditionals and
    polkit-no-systemd.patch and ConsoleKit BuildRequires, we only
    support systemd now.
  - Drop upstream fixed polkit-itstools.patch.
  - Rebase pkexec.patch with quilt.
  - Add gcc-c++ and pkgconfig(mozjs-52) BuildRequires: New
    dependencies.
  - Drop conditional pkgconfig(mozjs-17.0) and pkgconfig(mozjs185):
    no longer supported.
  - Drop autoconf and automake BuildRequires: They are implicit via
    libtool BuildRequires.
  - Replace glib2-devel and gobject-introspection-devel with their
    pkgconfig counterparts: pkgconfig(gio-unix-2.0),
    pkgconfig(gmodule-2.0) and pkgconfig(gobject-introspection-1.0).
  - Add polkit-jsauthority-pass-format-string.patch: jsauthority:
    pass "%s" format string to remaining report function, patch from
    upstream git, adding missed commit (bgo#105865).
  - Drop polkit-revert-session-magic.patch: Upstream systemd bug is
    since a long time fixed (gh#systemd#58) (boo#954139).
* Thu Mar 01 2018 schwab@suse.de
  - pkexec.patch: pkexec: allow --version and --help even if not setuid
* Wed Feb 28 2018 dimstar@opensuse.org
  - Modernize spec-file by calling spec-cleaner
* Tue Aug 15 2017 dimstar@opensuse.org
  - Add polkit-itstools.patch: Add gettext support for .policy files.
* Tue Jun 13 2017 lnussel@suse.de
  - Use gettext as fallback to get potential distro translations for
    polkit actions. Similar mechnism as used for desktop file
    translations. That way it's possible to use weblate to add
    additional translations that are not provided by upstream
    (polkit-gettext.patch).
* Wed Jun 08 2016 fbui@suse.com
  - Use pkgconfig() instead of requiring systemd package names directly.
* Tue Jun 07 2016 fbui@suse.com
  - systemd.pc is shipped by systemd main package (bsc#983167)
    Strangely polkit wants systemd.pc to detect that the target system
    is running systemd even if its configured to build systemd support...
* Thu Nov 26 2015 meissner@suse.com
  - polkit-revert-session-magic.patch: revert a session detection change
    that could lead to sessions not being detected as active due to
    a systemd bug. bsc#954139
* Thu Aug 06 2015 antoine.belvire@laposte.net
  - Update to 0.113:
    * Fix CVE-2015-4625
    * Fix CVE-2015-3256
    * Fix CVE-2015-3255
    * Fix CVE-2015-3218
    * On systemd-213 and later, the “active” state is shared across
      all sessions of an user, instead of being tracked separately
    * pkexec: when not given a program to execute, runs the users’
      shell by default
  - Remove polkit-no-kded-leak.patch (upstreamed)
* Mon Jan 12 2015 tchvatal@suse.com
  - Try to fix kded leaking due to powerdevil exposing this issue in
    polkit: (bsc#912889)
    * polkit-no-kded-leak.patch
* Tue Dec 09 2014 meissner@suse.com
  - Added gpg signature and keyring with David Zeuthen and Miloslav Trmac
    ids.

Files

/usr/bin/pk-example-frobnicate
/usr/include/polkit-1
/usr/include/polkit-1/polkit
/usr/include/polkit-1/polkit/polkit.h
/usr/include/polkit-1/polkit/polkitactiondescription.h
/usr/include/polkit-1/polkit/polkitauthority.h
/usr/include/polkit-1/polkit/polkitauthorityfeatures.h
/usr/include/polkit-1/polkit/polkitauthorizationresult.h
/usr/include/polkit-1/polkit/polkitcheckauthorizationflags.h
/usr/include/polkit-1/polkit/polkitdetails.h
/usr/include/polkit-1/polkit/polkitenumtypes.h
/usr/include/polkit-1/polkit/polkiterror.h
/usr/include/polkit-1/polkit/polkitidentity.h
/usr/include/polkit-1/polkit/polkitimplicitauthorization.h
/usr/include/polkit-1/polkit/polkitpermission.h
/usr/include/polkit-1/polkit/polkitprivate.h
/usr/include/polkit-1/polkit/polkitsubject.h
/usr/include/polkit-1/polkit/polkitsystembusname.h
/usr/include/polkit-1/polkit/polkittemporaryauthorization.h
/usr/include/polkit-1/polkit/polkittypes.h
/usr/include/polkit-1/polkit/polkitunixgroup.h
/usr/include/polkit-1/polkit/polkitunixnetgroup.h
/usr/include/polkit-1/polkit/polkitunixprocess.h
/usr/include/polkit-1/polkit/polkitunixsession.h
/usr/include/polkit-1/polkit/polkitunixuser.h
/usr/include/polkit-1/polkitagent
/usr/include/polkit-1/polkitagent/polkitagent.h
/usr/include/polkit-1/polkitagent/polkitagentenumtypes.h
/usr/include/polkit-1/polkitagent/polkitagentlistener.h
/usr/include/polkit-1/polkitagent/polkitagentsession.h
/usr/include/polkit-1/polkitagent/polkitagenttextlistener.h
/usr/include/polkit-1/polkitagent/polkitagenttypes.h
/usr/lib64/libpolkit-agent-1.so
/usr/lib64/libpolkit-gobject-1.so
/usr/lib64/pkgconfig/polkit-agent-1.pc
/usr/lib64/pkgconfig/polkit-gobject-1.pc
/usr/share/gettext/its/polkit.its
/usr/share/gettext/its/polkit.loc
/usr/share/gir-1.0/Polkit-1.0.gir
/usr/share/gir-1.0/PolkitAgent-1.0.gir
/usr/share/polkit-1/actions/org.freedesktop.policykit.examples.pkexec.policy


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 11:31:35 2024