Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Step:15-SP1
polkit-default-privs
0011-whitelist-polkit-untracked-privilege.diff
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0011-whitelist-polkit-untracked-privilege.diff of Package polkit-default-privs
From 2774d489eb03a855af3f196fc151f78c61e6ad1e Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Mon, 12 Mar 2018 12:01:24 +0100 Subject: [PATCH 1/6] polkit-default-privs: mass whitelisting of untracked privileges rpmlint-Factory rules are about to be tightened (sr#579618). The "untracked-privileges" are now also an error. See https://lists.opensuse.org/opensuse-factory/2018-02/msg01044.html for the rationale. To keep things working for packages already accepted to Factory we are doing this amnesty whitelisting ahead of the code reviews. --- polkit-default-privs.restrictive | 49 ++++++++++++++++++++++++++++++++ polkit-default-privs.standard | 49 ++++++++++++++++++++++++++++++++ 2 files changed, 98 insertions(+) diff --git a/polkit-default-privs.restrictive b/polkit-default-privs.restrictive index 5173320..3b09116 100644 --- a/polkit-default-privs.restrictive +++ b/polkit-default-privs.restrictive @@ -401,6 +401,9 @@ org.xfce.power.backlight-helper auth_admin:auth_ org.cinnamon.settings-daemon.plugins.power.backlight-helper no:no:yes org.cinnamon.settingsdaemon.datetimemechanism.configure no:no:auth_admin_keep +# cinnamon settings-daemon (bsc#1083067) +org.cinnamon.settings-users auth_admin + # hp-drive-guard com.hp.driveguard.toggle auth_admin @@ -461,6 +464,9 @@ org.freedesktop.packagekit.clear-offline-update auth_admin_keep org.freedesktop.packagekit.package-reinstall auth_admin:auth_admin:auth_admin_keep org.freedesktop.packagekit.package-downgrade auth_admin:auth_admin:auth_admin_keep +# PackageKit (bnc#993505) +org.freedesktop.packagekit.trigger-offline-upgrade no:auth_admin:auth_admin + # # gparted (bnc#810888) # @@ -755,6 +761,9 @@ org.a11y.brlapi.write-display auth_admin_keep # sysprof (bsc#996111) org.gnome.sysprof2.perf-event-open auth_admin_keep +# sysprof (bsc#1083055) +org.gnome.sysprof2.get-kernel-symbols auth_admin_keep + # flatpak (bsc#984817) org.freedesktop.Flatpak.app-install auth_admin:auth_admin:auth_admin_keep org.freedesktop.Flatpak.runtime-install auth_admin:auth_admin:auth_admin_keep @@ -781,6 +790,9 @@ org.blueman.dhcp.client auth_admin:auth_admin_keep:auth_admin_keep org.blueman.pppd.pppconnect auth_admin:auth_admin_keep:auth_admin_keep org.blueman.rfkill.setstate auth_admin:auth_admin_keep:auth_admin_keep +# blueman (bsc#1083066) +org.blueman.bluez.config no:no:auth_admin_keep + # tuned (bsc#1007279) com.redhat.tuned.gui.run auth_admin com.redhat.tuned.active_profile yes @@ -814,6 +826,9 @@ org.freedesktop.fwupd.verify-update auth_admin:no:auth_admin_keep org.freedesktop.fwupd.update-internal-trusted auth_admin:no:auth_admin_keep org.freedesktop.fwupd.update-hotplug-trusted auth_admin:no:auth_admin_keep +# fwupd (bsc#1083022) +org.freedesktop.fwupd.modify-remote auth_admin:no:auth_admin_keep + # deja-dup (bsc#1058935) org.gnome.DejaDup.duplicity no:no:auth_admin @@ -821,4 +836,38 @@ org.gnome.DejaDup.duplicity no:no:auth_admin net.connman.modify auth_admin_keep net.connman.vpn.modify auth_admin_keep +# connman (bsc#1083069) +net.connman.secret no:no:auth_admin_keep +net.connman.vpn.secret no:no:auth_admin_keep + +# gsmartcontrol (bsc#1084693) +org.gsmartcontrol auth_admin + +# gvfs (bsc#1073214) +org.gtk.vfs.file-operations no:no:auth_admin_keep +org.gtk.vfs.file-operations-helper no:no:auth_admin_keep + +# laptop-mode-tools (bsc#1084695) +org.linux.lmt.gui.policy auth_admin + +# mate-system-monitor (bsc#1084701) +org.mate.mate-system-monitor.kill no:no:auth_admin +org.mate.mate-system-monitor.renice no:no:auth_admin + +# nemo (bsc#1084702) +org.nemo.root no:no:auth_admin_keep + +# nemo-extensions (bsc#1084703) +org.nemo-share.samba_install no:no:auth_admin_keep + +# pantheon-files (bsc#1084704) +org.freedesktop.policykit.pkexec.pantheon-files auth_admin:auth_admin:auth_admin +org.freedesktop.policykit.pkexec.io.elementary.files auth_admin:auth_admin:auth_admin + +# scap-workbench (bsc#1084706) +scap-workbench-oscap.run auth_admin:auth_admin:auth_admin + +# spice-gtk (bsc#1083025) +org.spice-space.lowlevelusbaccess no:no:auth_admin + ### diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index c5d2de9..9cd9f80 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -420,6 +420,9 @@ org.xfce.power.backlight-helper no:no:yes org.cinnamon.settings-daemon.plugins.power.backlight-helper no:no:yes org.cinnamon.settingsdaemon.datetimemechanism.configure no:no:auth_admin_keep +# blueman (bsc#1083066) +org.cinnamon.settings-users auth_admin + # hp-drive-guard com.hp.driveguard.toggle auth_admin com.hp.driveguard.install-setup auth_admin @@ -478,6 +481,9 @@ org.freedesktop.packagekit.clear-offline-update auth_admin_keep:auth_admin_kee org.freedesktop.packagekit.package-reinstall auth_admin:auth_admin:auth_admin_keep org.freedesktop.packagekit.package-downgrade auth_admin:auth_admin:auth_admin_keep +# PackageKit (bnc#993505) +org.freedesktop.packagekit.trigger-offline-upgrade auth_admin:auth_admin:auth_admin + # # gparted (bnc#810888) # @@ -818,6 +824,9 @@ org.a11y.brlapi.write-display no:no:yes # sysprof (bsc#996111) org.gnome.sysprof2.perf-event-open auth_admin_keep +# sysprof (bsc#1083055) +org.gnome.sysprof2.get-kernel-symbols auth_admin_keep + # flatpak (bsc#984817) org.freedesktop.Flatpak.app-install auth_admin:auth_admin:auth_admin_keep org.freedesktop.Flatpak.runtime-install auth_admin:auth_admin:auth_admin_keep @@ -844,6 +853,9 @@ org.blueman.dhcp.client auth_admin:auth_admin_keep:yes org.blueman.pppd.pppconnect auth_admin:auth_admin_keep:yes org.blueman.rfkill.setstate auth_admin:auth_admin_keep:yes +# blueman (bsc#1083066) +org.blueman.bluez.config no:no:auth_admin_keep + # tuned (bsc#1007279) com.redhat.tuned.gui.run auth_admin com.redhat.tuned.active_profile yes @@ -882,6 +894,9 @@ org.freedesktop.fwupd.verify-update auth_admin:no:auth_admin_keep org.freedesktop.fwupd.update-internal-trusted auth_admin:no:yes org.freedesktop.fwupd.update-hotplug-trusted auth_admin:no:yes +# fwupd (bsc#1083022) +org.freedesktop.fwupd.modify-remote auth_admin:no:auth_admin_keep + # deja-dup (bsc#1058935) org.gnome.DejaDup.duplicity no:no:auth_admin @@ -889,4 +904,38 @@ org.gnome.DejaDup.duplicity no:no:auth_admin net.connman.modify auth_admin_keep net.connman.vpn.modify auth_admin_keep +# connman (bsc#1083069) +net.connman.secret no:no:auth_admin_keep +net.connman.vpn.secret no:no:auth_admin_keep_session + +# gsmartcontrol (bsc#1084693) +org.gsmartcontrol auth_admin + +# gvfs (bsc#1073214) +org.gtk.vfs.file-operations no:no:auth_admin_keep +org.gtk.vfs.file-operations-helper no:no:auth_admin_keep + +# laptop-mode-tools (bsc#1084695) +org.linux.lmt.gui.policy auth_admin + +# mate-system-monitor (bsc#1084701) +org.mate.mate-system-monitor.kill no:no:auth_admin_keep +org.mate.mate-system-monitor.renice no:no:auth_admin_keep + +# nemo (bsc#1084702) +org.nemo.root no:no:auth_admin_keep + +# nemo-extensions (bsc#1084703) +org.nemo-share.samba_install no:no:auth_admin_keep + +# pantheon-files (bsc#1084704) +org.freedesktop.policykit.pkexec.pantheon-files auth_admin:auth_admin:auth_admin +org.freedesktop.policykit.pkexec.io.elementary.files auth_admin:auth_admin:auth_admin + +# scap-workbench (bsc#1084706) +scap-workbench-oscap.run auth_admin_keep:auth_admin_keep:auth_admin_keep + +# spice-gtk (bsc#1083025) +org.spice-space.lowlevelusbaccess auth_admin:no:auth_admin + ### -- 2.21.0 From cbfcb086ca65742e8862f80fee488de741a3521c Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Thu, 15 Nov 2018 18:22:26 +0100 Subject: [PATCH 2/6] spice-gtk: relax lowlevelusbaccess requirements The spice-gtk setuid helper binary is already only accessible to members of the kvm group. So we skip the password prompt for locally logged in users in the standard profile. --- polkit-default-privs.standard | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index 9cd9f80..a023cc0 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -936,6 +936,6 @@ org.freedesktop.policykit.pkexec.io.elementary.files auth_admin:auth_admin:auth_ scap-workbench-oscap.run auth_admin_keep:auth_admin_keep:auth_admin_keep # spice-gtk (bsc#1083025) -org.spice-space.lowlevelusbaccess auth_admin:no:auth_admin +org.spice-space.lowlevelusbaccess auth_admin:no:yes ### -- 2.21.0 From ac162371c5853c1bf4a3e36e7cfa75467c26080f Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Wed, 28 Mar 2018 17:41:45 +0200 Subject: [PATCH 3/6] polkit-default-privs: some more amnesty whitelisting of untracked privileges systemd and bleachbit are still affected by the more picky rpmlint rules. --- polkit-default-privs.restrictive | 8 ++++++++ polkit-default-privs.standard | 8 ++++++++ 2 files changed, 16 insertions(+) diff --git a/polkit-default-privs.restrictive b/polkit-default-privs.restrictive index 3b09116..0795331 100644 --- a/polkit-default-privs.restrictive +++ b/polkit-default-privs.restrictive @@ -870,4 +870,12 @@ scap-workbench-oscap.run auth_admin:auth_admin:auth_admin # spice-gtk (bsc#1083025) org.spice-space.lowlevelusbaccess no:no:auth_admin +# bleachbit (bsc#1087326) +org.bleachbit auth_admin + +# systemd, systemd-mini (bsc#1087328) +org.freedesktop.login1.halt auth_admin_keep +org.freedesktop.login1.halt-ignore-inhibit auth_admin_keep +org.freedesktop.login1.halt-multiple-sessions auth_admin_keep + ### diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index a023cc0..209210a 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -938,4 +938,12 @@ scap-workbench-oscap.run auth_admin_keep:auth_admin_keep:auth_admin_keep # spice-gtk (bsc#1083025) org.spice-space.lowlevelusbaccess auth_admin:no:yes +# bleachbit (bsc#1087326) +org.bleachbit auth_admin + +# systemd, systemd-mini (bsc#1087328) +org.freedesktop.login1.halt auth_admin_keep +org.freedesktop.login1.halt-ignore-inhibit auth_admin_keep +org.freedesktop.login1.halt-multiple-sessions auth_admin_keep + ### -- 2.21.0 From 6c09069f1c9001063ea2ed95cbfae4d2808ff648 Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Thu, 3 Jan 2019 17:28:23 +0100 Subject: [PATCH 4/6] luckybackup: initial whitelisting of polkit pkexec action (bsc#1120403) --- polkit-default-privs.restrictive | 4 ++++ polkit-default-privs.standard | 4 ++++ 2 files changed, 8 insertions(+) diff --git a/polkit-default-privs.restrictive b/polkit-default-privs.restrictive index 0795331..f2d4676 100644 --- a/polkit-default-privs.restrictive +++ b/polkit-default-privs.restrictive @@ -878,4 +878,8 @@ org.freedesktop.login1.halt auth_admin_keep org.freedesktop.login1.halt-ignore-inhibit auth_admin_keep org.freedesktop.login1.halt-multiple-sessions auth_admin_keep +# luckybackup (bsc#1120403) +# Don't relax this, it runs rsync with arbitrary parameters +net.luckybackup.su auth_admin + ### diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index 209210a..6c71f06 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -946,4 +946,8 @@ org.freedesktop.login1.halt auth_admin_keep org.freedesktop.login1.halt-ignore-inhibit auth_admin_keep org.freedesktop.login1.halt-multiple-sessions auth_admin_keep +# luckybackup (bsc#1120403) +# Don't relax this, it runs rsync with arbitrary parameters +net.luckybackup.su auth_admin + ### -- 2.21.0 From 7e71b1f1efd8fda5a47dc26b8c99c566028fb2fd Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Thu, 15 Nov 2018 16:17:28 +0100 Subject: [PATCH 5/6] blueman: relax standard profile rules, drop unneeded bluez.config rule (bsc#1083066) The bluez.config rule was never used and with upstream version 2.0.6 it has also been formally dropped. The other blueman rules need to be more relaxed as users are complaining about multiple root password prompts right after login. --- polkit-default-privs.restrictive | 3 --- polkit-default-privs.standard | 3 --- 2 files changed, 6 deletions(-) diff --git a/polkit-default-privs.restrictive b/polkit-default-privs.restrictive index f2d4676..89f7bad 100644 --- a/polkit-default-privs.restrictive +++ b/polkit-default-privs.restrictive @@ -790,9 +790,6 @@ org.blueman.dhcp.client auth_admin:auth_admin_keep:auth_admin_keep org.blueman.pppd.pppconnect auth_admin:auth_admin_keep:auth_admin_keep org.blueman.rfkill.setstate auth_admin:auth_admin_keep:auth_admin_keep -# blueman (bsc#1083066) -org.blueman.bluez.config no:no:auth_admin_keep - # tuned (bsc#1007279) com.redhat.tuned.gui.run auth_admin com.redhat.tuned.active_profile yes diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index 6c71f06..c50423c 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -853,9 +853,6 @@ org.blueman.dhcp.client auth_admin:auth_admin_keep:yes org.blueman.pppd.pppconnect auth_admin:auth_admin_keep:yes org.blueman.rfkill.setstate auth_admin:auth_admin_keep:yes -# blueman (bsc#1083066) -org.blueman.bluez.config no:no:auth_admin_keep - # tuned (bsc#1007279) com.redhat.tuned.gui.run auth_admin com.redhat.tuned.active_profile yes -- 2.21.0 From edbe7f6f2b9574e1369abe91a83d9f79fb486773 Mon Sep 17 00:00:00 2001 From: Matthias Gerstner <matthias.gerstner@suse.de> Date: Tue, 24 Apr 2018 15:05:21 +0200 Subject: [PATCH 6/6] polkit-default-privs: whitelisting renamed kalarm polkit actions --- polkit-default-privs.restrictive | 2 ++ polkit-default-privs.standard | 2 ++ 2 files changed, 4 insertions(+) diff --git a/polkit-default-privs.restrictive b/polkit-default-privs.restrictive index 89f7bad..891d0fc 100644 --- a/polkit-default-privs.restrictive +++ b/polkit-default-privs.restrictive @@ -324,6 +324,8 @@ org.kde.powerdevil.discretegpuhelper.hasdualgpu no:no:yes # kdepim4/kalarm (bnc#707723) org.kde.kalarmrtcwake.settimer auth_admin_keep +# kalarm (bnc#1087714, renamed from kalarmrtcwake) +org.kde.kalarm.rtcwake.settimer auth_admin_keep # sddm kcm oepration (bnc#904313) org.kde.kcontrol.kcmsddm.save auth_admin diff --git a/polkit-default-privs.standard b/polkit-default-privs.standard index c50423c..aca1738 100644 --- a/polkit-default-privs.standard +++ b/polkit-default-privs.standard @@ -337,6 +337,8 @@ org.kde.powerdevil.discretegpuhelper.hasdualgpu yes # kdepim4/kalarm (bnc#707723) org.kde.kalarmrtcwake.settimer auth_admin_keep +# kalarm (bnc#1087714, renamed from kalarmrtcwake) +org.kde.kalarm.rtcwake.settimer auth_admin_keep # sddm kcm oepration (bnc#904313) org.kde.kcontrol.kcmsddm.save auth_admin -- 2.21.0
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor