pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/security/polkit



Module Name:    pkgsrc
Committed By:   wiz
Date:           Sun Dec 21 15:44:05 UTC 2025

Modified Files:
        pkgsrc/security/polkit: Makefile PLIST distinfo
        pkgsrc/security/polkit/patches: patch-src_polkit_polkitunixprocess.c
            patch-src_polkitbackend_polkitbackendinteractiveauthority.c
            patch-src_polkitbackend_polkitd.c patch-src_programs_pkttyagent.c
Added Files:
        pkgsrc/security/polkit/patches:
            patch-src_polkitagent_polkitagenthelper-pam.c

Log Message:
polkit: update to 127.

## polkit 127

### Highlights:
- socket-activated polkit-agent-helper can now run without SETUID (Luca Boccassi)
- user id (UID) now accessible to JavaScript rules via subject.uid (Rosentti, Jan Rybar)
- INI config file support for polkitd with configurable auth expiration timer (Luca Boccassi)
- auth_keep: skip re-authentication if new process shares same UID/parent/cgroup/tty (Luca Boccassi)
- CheckAuthorization now returns 'polkit.result' in the details dict (Luca Boccassi)
- pkexec: set $SUDO_UID/$SUDO_GID for compatibility with sudo (Lennart Poettering)
- pkexec: use realpath when comparing org.freedesktop.policykit.exec.path (Walter Doekes)
- memory limits added to systemd unit to mitigate memory leaks (Alexander Meshcheryakov)
- new translations: Bulgarian (twlvnn kraftwerk), Occitan (Mejans)


To generate a diff of this commit:
cvs rdiff -u -r1.57 -r1.58 pkgsrc/security/polkit/Makefile
cvs rdiff -u -r1.9 -r1.10 pkgsrc/security/polkit/PLIST
cvs rdiff -u -r1.20 -r1.21 pkgsrc/security/polkit/distinfo
cvs rdiff -u -r1.7 -r1.8 \
    pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c
cvs rdiff -u -r0 -r1.1 \
    pkgsrc/security/polkit/patches/patch-src_polkitagent_polkitagenthelper-pam.c
cvs rdiff -u -r1.4 -r1.5 \
    pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c \
    pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c
cvs rdiff -u -r1.3 -r1.4 \
    pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/polkit/Makefile
diff -u pkgsrc/security/polkit/Makefile:1.57 pkgsrc/security/polkit/Makefile:1.58
--- pkgsrc/security/polkit/Makefile:1.57        Thu Oct 23 20:39:10 2025
+++ pkgsrc/security/polkit/Makefile     Sun Dec 21 15:44:05 2025
@@ -1,12 +1,11 @@
-# $NetBSD: Makefile,v 1.57 2025/10/23 20:39:10 wiz Exp $
+# $NetBSD: Makefile,v 1.58 2025/12/21 15:44:05 wiz Exp $
 
-DISTNAME=      polkit-126
-PKGREVISION=   2
+DISTNAME=      polkit-127
 CATEGORIES=    security
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=polkit-org/}
 
 MAINTAINER=    pkgsrc-users%NetBSD.org@localhost
-HOMEPAGE=      https://www.freedesktop.org/wiki/Software/polkit
+HOMEPAGE=      https://github.com/polkit-org/polkit
 COMMENT=       Authorization Manager
 LICENSE=       gnu-lgpl-v2
 

Index: pkgsrc/security/polkit/PLIST
diff -u pkgsrc/security/polkit/PLIST:1.9 pkgsrc/security/polkit/PLIST:1.10
--- pkgsrc/security/polkit/PLIST:1.9    Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/PLIST        Sun Dec 21 15:44:05 2025
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.9 2025/01/15 08:41:38 adam Exp $
+@comment $NetBSD: PLIST,v 1.10 2025/12/21 15:44:05 wiz Exp $
 bin/pkaction
 bin/pkcheck
 bin/pkexec
@@ -47,6 +47,7 @@ man/man1/pkaction.1
 man/man1/pkcheck.1
 man/man1/pkexec.1
 man/man1/pkttyagent.1
+man/man5/polkitd.conf.5
 man/man8/polkit.8
 man/man8/polkitd.8
 share/dbus-1/system-services/org.freedesktop.PolicyKit1.service
@@ -56,6 +57,7 @@ share/gettext/its/polkit.its
 share/gettext/its/polkit.loc
 share/gir-1.0/Polkit-1.0.gir
 share/gir-1.0/PolkitAgent-1.0.gir
+share/locale/bg/LC_MESSAGES/polkit-1.mo
 share/locale/cs/LC_MESSAGES/polkit-1.mo
 share/locale/da/LC_MESSAGES/polkit-1.mo
 share/locale/de/LC_MESSAGES/polkit-1.mo
@@ -67,6 +69,7 @@ share/locale/it/LC_MESSAGES/polkit-1.mo
 share/locale/ka/LC_MESSAGES/polkit-1.mo
 share/locale/nl/LC_MESSAGES/polkit-1.mo
 share/locale/nn/LC_MESSAGES/polkit-1.mo
+share/locale/oc/LC_MESSAGES/polkit-1.mo
 share/locale/pl/LC_MESSAGES/polkit-1.mo
 share/locale/pt/LC_MESSAGES/polkit-1.mo
 share/locale/pt_BR/LC_MESSAGES/polkit-1.mo
@@ -81,3 +84,5 @@ share/locale/zh_CN/LC_MESSAGES/polkit-1.
 share/locale/zh_TW/LC_MESSAGES/polkit-1.mo
 share/polkit-1/actions/org.freedesktop.policykit.policy
 share/polkit-1/policyconfig-1.dtd
+share/polkit-1/polkitd.conf
+share/polkit-1/rules.d/50-default.rules

Index: pkgsrc/security/polkit/distinfo
diff -u pkgsrc/security/polkit/distinfo:1.20 pkgsrc/security/polkit/distinfo:1.21
--- pkgsrc/security/polkit/distinfo:1.20        Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/distinfo     Sun Dec 21 15:44:05 2025
@@ -1,10 +1,10 @@
-$NetBSD: distinfo,v 1.20 2025/01/15 08:41:38 adam Exp $
+$NetBSD: distinfo,v 1.21 2025/12/21 15:44:05 wiz Exp $
 
-BLAKE2s (polkit-126.tar.gz) = 57477b8715fb9f11c97af94e398f1bb3909444edbf460964707c314498aedb24
-SHA512 (polkit-126.tar.gz) = dbdbc31b7a231c963788b37cf1a138e30336466fb662225a812faaf58e45439925d9d39346cc8f07e54f22040c2f142435acb9fded315d33e24930e0abc736c7
-Size (polkit-126.tar.gz) = 456138 bytes
-SHA1 (patch-src_polkit_polkitunixprocess.c) = 1550f4d6ab915dafb3cf120f953b95755d22a099
-SHA1 (patch-src_polkitbackend_polkitbackendinteractiveauthority.c) = efb2cfa112c2eed8fe6ad00d4bddce07f84e816a
-SHA1 (patch-src_polkitbackend_polkitd.c) = 555624d414223b0198dfbf8e470a72da80b41d41
-SHA1 (patch-src_programs_pkexec.c) = e678105e73a4c034921aace21cb2cd4f901de51f
-SHA1 (patch-src_programs_pkttyagent.c) = f172e0bceeacddb77b2681886500b263ddd9d930
+BLAKE2s (polkit-127.tar.gz) = 42e8bb751fc99d41b4ab296e7eeed826d14be0b13709399f2821aa12302f279f
+SHA512 (polkit-127.tar.gz) = 54b315f2ca05e957e7b9aafda16c1cddcc2266d6018c77dbf4cfe73b7d5b1569e6e07570884b9c5ecc4bdb3a29966169006aa727b089019d959208f2b53067e6
+Size (polkit-127.tar.gz) = 472872 bytes
+SHA1 (patch-src_polkit_polkitunixprocess.c) = b95f8e5d7c1dd0ab9b084e3bd5b1fc6d05744b57
+SHA1 (patch-src_polkitagent_polkitagenthelper-pam.c) = 74e3a9d1b3f4c4e28a2353f4f824c83c0032b97d
+SHA1 (patch-src_polkitbackend_polkitbackendinteractiveauthority.c) = b10371e6d3e5b4771fbe3dd8a77240b415f80018
+SHA1 (patch-src_polkitbackend_polkitd.c) = e587e99017128477522050391c5410024a1e25c7
+SHA1 (patch-src_programs_pkttyagent.c) = d9044bcc2ebd79a885c7bbc8327bdebab5680748

Index: pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c
diff -u pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c:1.7 pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c:1.8
--- pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c:1.7     Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/patches/patch-src_polkit_polkitunixprocess.c Sun Dec 21 15:44:05 2025
@@ -1,13 +1,14 @@
-$NetBSD: patch-src_polkit_polkitunixprocess.c,v 1.7 2025/01/15 08:41:38 adam Exp $
+$NetBSD: patch-src_polkit_polkitunixprocess.c,v 1.8 2025/12/21 15:44:05 wiz Exp $
 
 Fix SunOS includes.
 Fix pid_t type.
+https://github.com/polkit-org/polkit/pull/624
 
---- src/polkit/polkitunixprocess.c.orig        2024-08-08 13:12:35.000000000 +0000
+--- src/polkit/polkitunixprocess.c.orig        2025-12-17 16:14:53.000000000 +0000
 +++ src/polkit/polkitunixprocess.c
-@@ -20,6 +20,11 @@
-  */
- 
+@@ -27,6 +27,11 @@
+ #include <sys/vfs.h>
+ #endif
  #include <sys/types.h>
 +#ifdef HAVE_SOLARIS
 +#include <sys/stat.h>
@@ -17,7 +18,7 @@ Fix pid_t type.
  #ifdef HAVE_FREEBSD
  #include <sys/param.h>
  #include <sys/sysctl.h>
-@@ -175,7 +180,7 @@ enum
+@@ -189,7 +194,7 @@ enum
  
  static void subject_iface_init (PolkitSubjectIface *subject_iface);
  
@@ -25,4 +26,4 @@ Fix pid_t type.
 +static guint64 get_start_time_for_pid (pid_t pid,
                                         GError **error);
  
- #if defined(HAVE_FREEBSD) || defined(HAVE_NETBSD) || defined(HAVE_OPENBSD)
+ static gint

Index: pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c
diff -u pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c:1.4 pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c:1.5
--- pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c:1.4      Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitbackendinteractiveauthority.c  Sun Dec 21 15:44:05 2025
@@ -1,8 +1,9 @@
-$NetBSD: patch-src_polkitbackend_polkitbackendinteractiveauthority.c,v 1.4 2025/01/15 08:41:38 adam Exp $
+$NetBSD: patch-src_polkitbackend_polkitbackendinteractiveauthority.c,v 1.5 2025/12/21 15:44:05 wiz Exp $
 
 * for *BSD netgroup functions
+https://github.com/polkit-org/polkit/pull/624
 
---- src/polkitbackend/polkitbackendinteractiveauthority.c.orig 2024-08-08 13:12:35.000000000 +0000
+--- src/polkitbackend/polkitbackendinteractiveauthority.c.orig 2025-12-17 16:14:53.000000000 +0000
 +++ src/polkitbackend/polkitbackendinteractiveauthority.c
 @@ -25,8 +25,13 @@
  #ifdef HAVE_NETGROUP_H
@@ -18,8 +19,8 @@ $NetBSD: patch-src_polkitbackend_polkitb
  #include <string.h>
  #include <glib/gstdio.h>
  #include <locale.h>
-@@ -2255,7 +2260,7 @@ get_users_in_net_group (PolkitIdentity
- #ifdef HAVE_SETNETGRENT
+@@ -2383,7 +2388,7 @@ get_users_in_net_group (PolkitIdentity  
+ 
    name = polkit_unix_netgroup_get_name (POLKIT_UNIX_NETGROUP (group));
  
 -# ifdef HAVE_SETNETGRENT_RETURN
Index: pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c
diff -u pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c:1.4 pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c:1.5
--- pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c:1.4  Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/patches/patch-src_programs_pkttyagent.c      Sun Dec 21 15:44:05 2025
@@ -1,6 +1,7 @@
-$NetBSD: patch-src_programs_pkttyagent.c,v 1.4 2025/01/15 08:41:38 adam Exp $
+$NetBSD: patch-src_programs_pkttyagent.c,v 1.5 2025/12/21 15:44:05 wiz Exp $
 
 Avoid %m usage in printf.
+https://github.com/polkit-org/polkit/pull/624
 
 --- src/programs/pkttyagent.c.orig     2024-08-08 13:12:35.000000000 +0000
 +++ src/programs/pkttyagent.c

Index: pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c
diff -u pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c:1.3 pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c:1.4
--- pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c:1.3        Wed Jan 15 08:41:38 2025
+++ pkgsrc/security/polkit/patches/patch-src_polkitbackend_polkitd.c    Sun Dec 21 15:44:05 2025
@@ -1,6 +1,7 @@
-$NetBSD: patch-src_polkitbackend_polkitd.c,v 1.3 2025/01/15 08:41:38 adam Exp $
+$NetBSD: patch-src_polkitbackend_polkitd.c,v 1.4 2025/12/21 15:44:05 wiz Exp $
 
 Avoid %m usage in printf.
+https://github.com/polkit-org/polkit/pull/624
 
 --- src/polkitbackend/polkitd.c.orig   2025-01-13 14:54:22.000000000 +0000
 +++ src/polkitbackend/polkitd.c

Added files:

Index: pkgsrc/security/polkit/patches/patch-src_polkitagent_polkitagenthelper-pam.c
diff -u /dev/null pkgsrc/security/polkit/patches/patch-src_polkitagent_polkitagenthelper-pam.c:1.1
--- /dev/null   Sun Dec 21 15:44:05 2025
+++ pkgsrc/security/polkit/patches/patch-src_polkitagent_polkitagenthelper-pam.c        Sun Dec 21 15:44:05 2025
@@ -0,0 +1,40 @@
+$NetBSD: patch-src_polkitagent_polkitagenthelper-pam.c,v 1.1 2025/12/21 15:44:05 wiz Exp $
+
+Fix build on NetBSD.
+https://github.com/polkit-org/polkit/pull/624
+
+--- src/polkitagent/polkitagenthelper-pam.c.orig       2025-12-21 14:47:56.694667615 +0000
++++ src/polkitagent/polkitagenthelper-pam.c
+@@ -141,7 +141,9 @@ main (int argc, char *argv[])
+   if (argv[1] != NULL && strcmp (argv[1], "--socket-activated") == 0)
+     {
+       socklen_t socklen = sizeof(int);
++#ifdef SO_PEERCRED
+       struct ucred ucred;
++#endif
+ 
+       user_to_auth_free = read_cookie (argc, argv);
+       if (!user_to_auth_free)
+@@ -165,8 +167,12 @@ main (int argc, char *argv[])
+           goto error;
+         }
+ 
++#ifdef SO_PEERCRED
+       socklen = sizeof(ucred);
+       rc = getsockopt(STDIN_FILENO, SOL_SOCKET, SO_PEERCRED, &ucred, &socklen);
++#else
++      rc = -1;
++#endif
+       if (rc < 0)
+         {
+           syslog (LOG_ERR, "Unable to get credentials from socket");
+@@ -174,7 +180,9 @@ main (int argc, char *argv[])
+           goto error;
+         }
+ 
++#ifdef SO_PEERCRED
+       uid = ucred.uid;
++#endif
+     }
+   else
+     user_to_auth = argv[1];



Home | Main Index | Thread Index | Old Index