tree-wide: use "polkit" to refer to PolicyKit/polkit

Back in 2012 the project was renamed, see the release notes for v 0.105
[https://cgit.freedesktop.org/polkit/tree/NEWS#n754]. Let's update our
documentation and comments to do the same. Referring to PolicyKit is confusing
to users because at the time the polkit api changed too, and we support the new
version. I updated NEWS too, since all the references to PolicyKit there were
added after the rename.

"PolicyKit" is unchanged in various URLs and method call names.
This commit is contained in:
Zbigniew Jędrzejewski-Szmek 2018-07-16 12:44:24 +02:00
parent b750778751
commit d35f51ea84
6 changed files with 45 additions and 47 deletions

76
NEWS
View File

@ -3327,11 +3327,10 @@ CHANGES WITH 226:
correct dequeuing of real-time signals, without losing correct dequeuing of real-time signals, without losing
signal events. signal events.
* When systemd requests a PolicyKit decision when managing * When systemd requests a polkit decision when managing units it
units it will now add additional fields to the request, will now add additional fields to the request, including unit
including unit name and desired operation. This enables more name and desired operation. This enables more powerful polkit
powerful PolicyKit policies, that make decisions depending policies, that make decisions depending on these parameters.
on these parameters.
* nspawn learnt support for .nspawn settings files, that may * nspawn learnt support for .nspawn settings files, that may
accompany the image files or directories of containers, and accompany the image files or directories of containers, and
@ -3366,13 +3365,12 @@ CHANGES WITH 225:
options and allows other programs to query the values. options and allows other programs to query the values.
* SELinux access control when enabling/disabling units is no * SELinux access control when enabling/disabling units is no
longer enforced with this release. The previous longer enforced with this release. The previous implementation
implementation was incorrect, and a new corrected was incorrect, and a new corrected implementation is not yet
implementation is not yet available. As unit file operations available. As unit file operations are still protected via
are still protected via PolicyKit and D-Bus policy this is polkit and D-Bus policy this is not a security problem. Yet,
not a security problem. Yet, distributions which care about distributions which care about optimal SELinux support should
optimal SELinux support should probably not stabilize on probably not stabilize on this release.
this release.
* sd-bus gained support for matches of type "arg0has=", that * sd-bus gained support for matches of type "arg0has=", that
test for membership of strings in string arrays sent in bus test for membership of strings in string arrays sent in bus
@ -3744,11 +3742,10 @@ CHANGES WITH 220:
* systemd-importd gained support for verifying downloaded * systemd-importd gained support for verifying downloaded
images with gpg2 (previously only gpg1 was supported). images with gpg2 (previously only gpg1 was supported).
* systemd-machined, systemd-logind, systemd: most bus calls * systemd-machined, systemd-logind, systemd: most bus calls are
are now accessible to unprivileged processes via now accessible to unprivileged processes via polkit. Also,
PolicyKit. Also, systemd-logind will now allow users to kill systemd-logind will now allow users to kill their own sessions
their own sessions without further privileges or without further privileges or authorization.
authorization.
* systemd-shutdownd has been removed. This service was * systemd-shutdownd has been removed. This service was
previously responsible for implementing scheduled shutdowns previously responsible for implementing scheduled shutdowns
@ -4530,11 +4527,11 @@ CHANGES WITH 217:
directly from now on, again. directly from now on, again.
* Support for the new ALLOW_INTERACTIVE_AUTHORIZATION D-Bus * Support for the new ALLOW_INTERACTIVE_AUTHORIZATION D-Bus
message flag has been added for all of systemd's PolicyKit message flag has been added for all of systemd's polkit
authenticated method calls has been added. In particular authenticated method calls has been added. In particular this
this now allows optional interactive authorization via now allows optional interactive authorization via polkit for
PolicyKit for many of PID1's privileged operations such as many of PID1's privileged operations such as unit file
unit file enabling and disabling. enabling and disabling.
* "udevadm hwdb --update" learnt a new switch "--usr" for * "udevadm hwdb --update" learnt a new switch "--usr" for
placing the rebuilt hardware database in /usr instead of placing the rebuilt hardware database in /usr instead of
@ -4613,11 +4610,11 @@ CHANGES WITH 216:
well as the user/group databases, which should enhance well as the user/group databases, which should enhance
compatibility with certain tools like grpck. compatibility with certain tools like grpck.
* A number of bus APIs of PID 1 now optionally consult * A number of bus APIs of PID 1 now optionally consult polkit to
PolicyKit to permit access for otherwise unprivileged permit access for otherwise unprivileged clients under certain
clients under certain conditions. Note that this currently conditions. Note that this currently doesn't support
doesn't support interactive authentication yet, but this is interactive authentication yet, but this is expected to be
expected to be added eventually, too. added eventually, too.
* /etc/machine-info now has new fields for configuring the * /etc/machine-info now has new fields for configuring the
deployment environment of the machine, as well as the deployment environment of the machine, as well as the
@ -7090,8 +7087,8 @@ CHANGES WITH 198:
the rest of the package. It also has been updated to work the rest of the package. It also has been updated to work
correctly in initrds. correctly in initrds.
* Policykit previously has been runtime optional, and is now * polkit previously has been runtime optional, and is now also
also compile time optional via a configure switch. compile time optional via a configure switch.
* systemd-analyze has been reimplemented in C. Also "systemctl * systemd-analyze has been reimplemented in C. Also "systemctl
dot" has moved into systemd-analyze. dot" has moved into systemd-analyze.
@ -7259,9 +7256,9 @@ CHANGES WITH 197:
user/vendor or is automatically determined from ACPI and DMI user/vendor or is automatically determined from ACPI and DMI
information if possible. information if possible.
* A number of PolicyKit actions are now bound together with * A number of polkit actions are now bound together with "imply"
"imply" rules. This should simplify creating UIs because rules. This should simplify creating UIs because many actions
many actions will now authenticate similar ones as well. will now authenticate similar ones as well.
* Unit files learnt a new condition ConditionACPower= which * Unit files learnt a new condition ConditionACPower= which
may be used to conditionalize a unit depending on whether an may be used to conditionalize a unit depending on whether an
@ -7400,14 +7397,13 @@ CHANGES WITH 196:
to maintain the necessary patches downstream, or find a to maintain the necessary patches downstream, or find a
different solution. (Talk to us if you have questions!) different solution. (Talk to us if you have questions!)
* Various systemd components will now bypass PolicyKit checks * Various systemd components will now bypass polkit checks for
for root and otherwise handle properly if PolicyKit is not root and otherwise handle properly if polkit is not found to
found to be around. This should fix most issues for be around. This should fix most issues for polkit-less
PolicyKit-less systems. Quite frankly this should have been systems. Quite frankly this should have been this way since
this way since day one. It is absolutely our intention to day one. It is absolutely our intention to make systemd work
make systemd work fine on PolicyKit-less systems, and we fine on polkit-less systems, and we consider it a bug if
consider it a bug if something does not work as it should if something does not work as it should if polkit is not around.
PolicyKit is not around.
* For embedded systems it is now possible to build udev and * For embedded systems it is now possible to build udev and
systemd without blkid and/or kmod support. systemd without blkid and/or kmod support.

2
README
View File

@ -173,7 +173,7 @@ REQUIREMENTS:
NOTE: If using dbus < 1.9.18, you should override the default NOTE: If using dbus < 1.9.18, you should override the default
policy directory (--with-dbuspolicydir=/etc/dbus-1/system.d). policy directory (--with-dbuspolicydir=/etc/dbus-1/system.d).
dracut (optional) dracut (optional)
PolicyKit (optional) polkit (optional)
To build in directory build/: To build in directory build/:
meson build/ && ninja -C build meson build/ && ninja -C build

View File

@ -45,8 +45,10 @@
a session, then this ID is reused as the session ID. Otherwise, an independent session counter is a session, then this ID is reused as the session ID. Otherwise, an independent session counter is
used.</para></listitem> used.</para></listitem>
<listitem><para>Providing PolicyKit-based access for users for <listitem><para>Providing <ulink
operations such as system shutdown or sleep</para></listitem> url="http://www.freedesktop.org/wiki/Software/polkit">polkit</ulink>-based
access for users for operations such as system shutdown or sleep</para>
</listitem>
<listitem><para>Implementing a shutdown/sleep inhibition logic <listitem><para>Implementing a shutdown/sleep inhibition logic
for applications</para></listitem> for applications</para></listitem>

View File

@ -220,7 +220,7 @@ option('smack', type : 'boolean',
option('smack-run-label', type : 'string', option('smack-run-label', type : 'string',
description : 'run systemd --system itself with a specific SMACK label') description : 'run systemd --system itself with a specific SMACK label')
option('polkit', type : 'combo', choices : ['auto', 'true', 'false'], option('polkit', type : 'combo', choices : ['auto', 'true', 'false'],
description : 'PolicyKit support') description : 'polkit support')
option('ima', type : 'boolean', option('ima', type : 'boolean',
description : 'IMA support') description : 'IMA support')

View File

@ -50,7 +50,7 @@ int bus_job_method_cancel(sd_bus_message *message, void *userdata, sd_bus_error
/* Access is granted to the job owner */ /* Access is granted to the job owner */
if (!sd_bus_track_contains(j->bus_track, sd_bus_message_get_sender(message))) { if (!sd_bus_track_contains(j->bus_track, sd_bus_message_get_sender(message))) {
/* And for everybody else consult PolicyKit */ /* And for everybody else consult polkit */
r = bus_verify_manage_units_async(j->unit->manager, message, error); r = bus_verify_manage_units_async(j->unit->manager, message, error);
if (r < 0) if (r < 0)
return r; return r;

View File

@ -3178,7 +3178,7 @@ static int logind_set_wall_message(void) {
#endif #endif
/* Ask systemd-logind, which might grant access to unprivileged users /* Ask systemd-logind, which might grant access to unprivileged users
* through PolicyKit */ * through polkit */
static int logind_reboot(enum action a) { static int logind_reboot(enum action a) {
#if ENABLE_LOGIND #if ENABLE_LOGIND
_cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
@ -8414,7 +8414,7 @@ static int halt_main(void) {
} }
/* Try logind if we are a normal user and no special /* Try logind if we are a normal user and no special
* mode applies. Maybe PolicyKit allows us to shutdown * mode applies. Maybe polkit allows us to shutdown
* the machine. */ * the machine. */
if (IN_SET(arg_action, ACTION_POWEROFF, ACTION_REBOOT, ACTION_HALT)) { if (IN_SET(arg_action, ACTION_POWEROFF, ACTION_REBOOT, ACTION_HALT)) {
r = logind_reboot(arg_action); r = logind_reboot(arg_action);