polkit-0.113-14.6.1<>,|\7/=„6eJq%7sH;v^[G6AH#@KP@(),Sg sBGNhN ;)Kju+Ӳ'32YSM(+k\J 4 WhB rJ)DwPoR"/\1/B$ilDWZ_gD32A]`!>/1C8,8l#3 #VƝkt!\>Dh?hd   8 0agnu  P!! ! X! ! ! !D!!!4\%%%(U7\8898:"!8=Xh>Xp?Xx@XCXFXGX!HY(!IY!XYYY\Z!]Z!^\2b]c^d_#e_(f_-l_/u_D!v_ we!xf!yg<zgCpolkit0.11314.6.1PolicyKit Authorization FrameworkPolicyKit is a toolkit for defining and handling authorizations. It is used for allowing unprivileged processes to speak to privileged processes.\7cloud106MopenSUSE Leap 42.3openSUSELGPL-2.1+http://bugs.opensuse.orgSystem/Librarieshttp://www.freedesktop.org/wiki/Software/polkit/linuxx86_64getent group polkitd > /dev/null || groupadd -r polkitd getent passwd polkitd > /dev/null || useradd -r -g polkitd -d /var/lib/polkit -s /sbin/nologin -c "User for polkitd" polkitd test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in polkit.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in polkit.service ; do # The tag file might have been left by a preceding # update (see bsc#1059627) rm -f "/run/rpm-polkit-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-polkit-update-$service-new-in-upgrade" fi done for service in polkit.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi exit 0 if [ -x /usr/bin/chkstat ]; then /usr/bin/chkstat -n --set --system /usr/bin/pkexec fi if [ -x /usr/bin/chkstat ]; then /usr/bin/chkstat -n --set --system /usr/lib/polkit-1/polkit-agent-helper-1 fi test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset polkit.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in polkit.service ; do if [ ! -e "/run/rpm-polkit-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-polkit-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in polkit.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable polkit.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop polkit.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart polkit.service ) || : fi else # package uninstall for service in polkit.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi~A9K h`:8p8c+sRV CAA큤AAA큤AA큤A큤AA큤AA\/\/\/\/\0\0\0\1\1\1\1\1\1\1\/\/\/\/\2RսQ\1\1\0\0\0\0\0\0\0\0\/\0\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-0.113-14.6.1.src.rpmconfig(polkit)polkitpolkit(x86-64) !@@@@@@@@@@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/sh/bin/shconfig(polkit)dbus-1libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libexpat.so.1()(64bit)libgio-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libmozjs-17.0.so()(64bit)libmozjs-17.0.so(mozjs_17.0)(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libpolkit-agent-1.so.0()(64bit)libpolkit-gobject-1.so.0()(64bit)libpolkit0libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libsystemd.so.0()(64bit)libsystemd.so.0(LIBSYSTEMD_209)(64bit)libsystemd.so.0(LIBSYSTEMD_213)(64bit)permissionspwdutilsrpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)systemdsystemdsystemdsystemdrpmlib(PayloadIsLzma)0.113-14.6.10.113-14.6.13.0.4-14.0-14.4.6-14.11.2 /usr/bin/chkstat -n --warn --system -e /usr/bin/pkexec 1>&2 /usr/bin/chkstat -n --warn --system -e /usr/lib/polkit-1/polkit-agent-helper-1 1>&2\@[= %version instead of the exact version. This will ease upgrade problems should there ever be a soname bump of libpolkit0.- Enable systemd inetegration (change with_systemd to 1): As an agreed target for 12.3, systemd integration will be enabled.- Add pwdutils to prereq for groupadd and useradd.- Add polkit-no-systemd.patch: this patch, only applied when not building systemd support, removes the systemd service reference from the dbus .service file. This is needed as the systemd .service file does not get installed in that case and dbus gets confused because it expects it. - Make %{_datadir}/polkit-1/rules.d and %{_sysconfdir}/polkit-1/rules.d owned by user polkitd, as those directories have 0700 as permissions. - Those two changes should fix polkit so it can start. Fix bnc#782395.- Use %{_localstatedir}/lib/polkit for $HOME of polkit user, instead of %{_libexecdir}/polkit-1. The directory is manually created in %install.- Update to version 0.107: + Try harder to look up the right localization + Introduce a polkit.Result enumeration for authorization rules + pkexec: add support for argv1 annotation and mention shebang-wrappers + doc: update guidance on situations where there is no polkit authority - Changes from version 0.106: + Major change: switch from .pkla files (keyfile-format) to .rules files (JavaScript) + Nuke polkitbackend library, localauthority backend and extension system + Run polkitd as an unprivileged user + Add a systemd .service file + Several other code changes. + Updated documentation. - Changes from version 0.105: + Add pkttyagent(1) helper + Make it possible to influence agent registration with an a{sv} parameter + Several other code changes. - Add pkgconfig(mozjs185) BuildRequires: new dependency for the authority backend. - Rebase polkit-no-wheel-group.patch: the admin configuration is now in a .rules file. - Rebase polkit-suid_flags.patch. - Explicitly pass --enable-libsystemd-login or - -disable-libsystemd-login, depending on whether we build systemd support. - Add a %pre script to create the polkitd group and user, as polkitd now run as an unprivileged user.- also use -z now for binary hardening- Package /etc/polkit-1/localauthority and its subdirectories. They were forgotten because they were empty, but people might need them to put .pkla files.- Change the way we pass -fpie/-pie: + Drop polkit-pie.patch: this was not upstreamable. + Add polkit-suid_flags.patch: respect SUID_CFLAGS/SUID_LDFLAGS when building the suid binaries (pkexec and polkit-agent-helper-1). + Add autoconf, automake and libtool BuildRequires, and call autoreconf, for the new patch. + Set SUID_CFLAGS to -fPIE and SUID_LDFLAGS to -pie in %build. + Pass --with-pic to configure instead of changing CFLAGS to contain -fPIC.- fixed bnc#743145 - added -fpie/-pie flags to compilation and linking of polkit-agent-helper and pkexec- Split typelib file into typelib-1_0-Polkit-1_0 subpackage. - Add typelib-1_0-Polkit-1_0 Requires to devel subpackage. - Add explicit libpolkit0 Requires to devel subpackage: it was missing before. - Remove explicit glib2-devel Requires from devel subpackage: it will automatically be added the pkgconfig() way. - Improve summary of libpolkit0 subpackage.- A quick test reveals that the systemd backend does not integrate very well with packages yet, revert.- Previous update missed systemd-devel in buildrequires without it no systemd support is built- Update to version 0.104: + Add optional systemd support + Add netgroup support (fdo#43610) + Add unit tests (fdo#43608) - Changes from version 0.103: + Mistype in DBus object: PoliycKit1 -> PolicyKit1 + Add support for the org.freedesktop.policykit.imply annotation + Add --no-debug option and use this for D-Bus activation + Add org.freedesktop.policykit.owner annotation (fdo#41025) + Default to AdminIdentities=unix-group:wheel for local authority - Drop patches that were taken from upstream: + 0001-Add-support-for-the-org.freedesktop.policykit.imply-a.diff + 0002-Add-no-debug-option-and-use-this-for-D-Bus-activation.diff + 0003-Bug-41025-Add-org.freedesktop.policykit.owner-annotat.diff - Add polkit-no-wheel-group.patch: do not allow the wheel group as admin identity, and revert to only accept the root user for this.- pick some patches from git to add support for org.freedesktop.policykit.imply, disable debug spam and allow unprivileged users to query authorizations (bnc#698250)- Update to version 0.102: + pkexec: - fdo#38769: Support running X11 apps - Avoid time-of-check-to-time-of-use problems with parent process + Fix backend crash if a .policy file does not specify + Fix multi-line pam prompt handling + Don't show diagnostic messages intended for the administrator to the end user + PolkitUnixProcess: - Clarify that the real uid is returned, not the effective one - Record the uid of the process + Backend: Use polkit_unix_process_get_uid() to get the owner of a process + Introspection fixes: - Add --c-include to the gir files - Specify exported pkg-config files in GIRs + Build fix. - Drop polkit-CVE-2011-1485-1.patch, polkit-CVE-2011-1485-2.patch, polkit-CVE-2011-1485-3.patch, polkit-CVE-2011-1485-4.patch: fixed upstream. - Remove service usage, following the new consensus on Factory packaging.- BuildIgnore ruby, which is being dragged in via indirect dependencies by gtk-doc for one of the helpers, which we do not need during the build of polkit. Not dragging ruby in resolves a build-cycle.- Use %set_permissions instead of deprecated %run_permissions in %post. - Add permissions PreReq, which was missing before.- use LGPLv2.1+ in spec file- stat race condition (CVE-2011-1485) (bnc#688788)- Remove PolkitAgent-1.0.typelib from main package, it is in library package.- update to 0.101: * tons of bug fixes, see NEWS- fix file list- Update to version 0.99: + Remove duplicate definitions of enumeration types + Fix (correct) GCC warning about possibly-uninitialized variable + Fix another GCC uninitialized variable warning + fdo#29816: Install polkitagentenumtypes.h - Drop polkit-install-missing-header.patch: fixed upstream.- Update to version 0.98: + Fix scanning of unix-process subjects + Add textual authentication agent and use it in pkexec(1) + Fix ConsoleKit interaction bug + pkexec: add --disable-internal-agent option + pkcheck: add --enable-internal-agent option + Fix wording in pkexec(1) man page + Various doc cleanups - Changes from version 0.97: + Port to GDBus + Add shadow authentication support + Remove Lock Down functionality + fdo#26982: pkexec information disclosure vulnerability + Make polkitd accept --replace and gracefully handle SIGINT + Implement polkit_temporary_authorization_new_for_gvariant() + Make NameOwnerChanged a private impl detail of the interactive authority + Add a GPermission implementation + PolkitAuthority: Implement failable initialization + PolkitAuthority: Add g_return_if_fail() checks + Add g_return_if_fail() to all public API entry points + Use polkit_authority_get_sync() instead of deprecated polkit_authority_get + PolkitBackend: Don't export unneeded convenience API + Update GI annotations + Don't dist org.freedesktop.ConsoleKit.xml. + Properly reference headers + fdo#29051: Configuration reload on every query - Drop pkexec-information-disclosure.patch: fixed upstream. - Add polkit-install-missing-header.patch to install a header that should get installed. - Remove eggdbus-devel BuildRequires. - Build with introspection support: add gobject-introspection BuildRequires and pass --enable-introspection to configure. - Fix groups of all packages to be valid groups.- use %_smp_mflags- fix pkexec information disclosure (fdo#26982, CVE-2010-0750, bnc#593959)- add baselibs.conf- new upstream release 0.96 - Bug 25367 — Also read local authority configuration data from /etc - Run the open_session part of the PAM stack in pkexec(1) - Bug 25594 – System logging - Properly handle return value from getpwnam_r() - Fix error message when no authentication agent is available - Make pkexec(1) validate environment variables - Make pkexec(1) use the syslogging facilities - Save original cwd in pkexec(1) since it will change during the life-time - Complain on stderr, not stdout - Don't log authorization checks- update to 0.95: The major change this release is that the lockdown feature has been cleaned up in a way so it isn't specific to the local authority. See the NEWS files for more details.- Package documentation as noarch- Add Requires on polkit to libpolkit0: all applications using libpolkit0 will really need polkit to be installed to work properly.- new upstream release 0.94 - Allow unprivileged callers to check authorizations - Don't spawn man(1) from a setuid program - Add polkit.retains_authorization_after_challenge to authz result - Ensure all fds except stdin/stdout/stderr are closed after exec(2) - Be more careful when determining process start time - Remove temporary authorization when the subject it applies to vanishes - Generate GI gir and typelibs for libpolkit-gobject-1 - drop patches which are in the release now - disable introspection- add upstream patches: polkit-close-stdfds.patch polkit-no-man-spawn.patch polkit-proc-stat-parse-fix.patch - drop rpmlint patch- check for the right binary in verify_permisisons- disable suid bit for now to get software build on top - split out libraries to follow shared library policy- update to version 0.93- initial import of polkit 0.92/bin/sh/bin/sh/bin/sh/bin/sh/bin/shcloud106 1545378871  !csda0.113-14.6.10.113-14.6.10.113-14.6.1  dbus-1system.dorg.freedesktop.PolicyKit1.confpolkit-1polkit-1rules.d50-default.rulespkactionpkcheckpkexecpkttyagentpolkit-1polkit-agent-helper-1polkitdpolkit.servicedbus-1system-servicesorg.freedesktop.PolicyKit1.servicepolkitCOPYINGpolkit-1.mopolkit-1.mopkaction.1.gzpkcheck.1.gzpkexec.1.gzpkttyagent.1.gzpolkit.8.gzpolkitd.8.gzpolkit-1actionsorg.freedesktop.policykit.policyrules.dpolkit/etc//etc/dbus-1//etc/dbus-1/system.d//etc/pam.d//etc/polkit-1//etc/polkit-1/rules.d//usr/bin//usr/lib//usr/lib/polkit-1//usr/lib/systemd/system//usr/share//usr/share/dbus-1//usr/share/dbus-1/system-services//usr/share/doc/packages//usr/share/doc/packages/polkit//usr/share/locale/cs/LC_MESSAGES//usr/share/locale/da/LC_MESSAGES//usr/share/man/man1//usr/share/man/man8//usr/share/polkit-1//usr/share/polkit-1/actions//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9378/openSUSE_Leap_42.3_Update/5a60c813760b988272f25212df6cff71-polkit.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux directoryXML document textASCII textELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=6eb14cd6b756fa45e765f172fe5f87186735c290, strippedELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=726be8f4681cbba852fc67767b22eb83a594ed24, strippedsetuid ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=14de18d7577fbe52117a1d8aa24852db6fae7b3a, strippedELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=9293f95cf9ee9b627b3323fd2fbbdd3a25abbf06, strippedsetuid ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=e83ee27cecdbe6ccd27d4495c6a754ba3baff2a4, strippedELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.0.0, BuildID[sha1]=15e90a02ac66d59a494282e29385000f6f59c8c4, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)#- RRRRRRR RR RRRRRRRRR RRRRRRRRRR RRRRRRRRR R RRRRRRRRRRRR RRR RRRR RRRki:QhwL/i?]"k%Y:0wD8i|©nsxfБG5CX/:5-%M'q66.}fh> viXѳQ;::9x=Bm9 Pr=Y368nfcP)Օm f{.\L4..jK#1;vHr'p򡬂̲3#x Cf4b<6GR6c6B؄cg;TU3f$j5H2O,5u{~JO?#7Xi\5YaqzQK=OvLEkc:"R @ʔy^6b)dR<04*ܿ69=ӶtGAW 7\6(_9 GUdOV]WՓm*mPra$=5+3]q9v-0|lNhFxd3% }Aꀪ_d%u&cf nB R0Ͻ F0KlL"= gE^ joՌ䙂ZĆJ@F8[p/̈́IrΔ2Aށo uՊCS!4Y "@q`S&`ĠǜXѢ2O3FSdMyf%󃔂Rxg -ˀ M⻋l͈07f1 "N#PoPj⢮a3oϲokizy -=p5z WN0a'rJK:"骯g'Wzp6Ev^]RMs&'z3eGUؙ}i}*g=.IF<IW],ʏц*5yi~![诱}0f3nuFw{ټ<(oȞWإ鞯B(¬FzSzTތk7yX>B%]h[sT[&sa6VN`/Ro;5 φ}L,Tt6Dse#dKq=&Z_DH(rA9LZbCrjxfe:0]G7آP#g|4X6K Ѷ_Q+V)"C]cSeY]L1QAtWc?tsoX7k{R$2Qbp}BfѢfSS4-IZXK+ 3".RK  }FzzQ4%~g+uQp_id`DtnM"iqB|Sn☗ 9/ξtiq=eR٧؉ZGimzmbg gogH!&M+n1,k8ئ]ӕC \cY'2lU R3`l<qUn65u$VJ*j J?jx0>{ Yo#%g?;ܬ!KWr\S/Yl[t| W %Rɡ{_=fv-r^%5w!G2~ʃQf"# F^}R7I=JtÂ扠l39>Еlү!-Sĥc^)մ}!zThPm$֦ j[{X; S#$-$I|Pw״fPfUkWsnۻmOMVb<&))za^Y`;M tbA.G8ںH^- }siNŕ{\[M0yyJ <6/j}sۤϡ} %e 1r0⑚G\~;]j aSK4gTGuvIYVS)i#FJ8aL:Nj6o% نj#Ì<7`<$&mե-t_ A;ĝ Qy"UWZr`v)6RYSړppw3~cm[Ggt3 +g0y˟m! ۠2+,͇ r:8Զ,S%ɥ-1igs UP@ ꦌ{fP[<Q!W@hoҴr;Q4x/ք F`A=w-\,JAiN&EЃP3Eܔ{Sxx,k\H\l h4l% c81۝>_d)sEa3Ql'n}lg!Bu0{B0XA`qի Ͼ~Nj/ONl31 Ab +C* 6Zƒg?yn[.$NxJUXKA ib3eT<9zZ=jg07ŏ語tR( 'Z&"?T[kt$cfQv!:d&)f[`^YCSf#Uc>##$oLҤNICLK0(_]:хi+0mN-^z{fw{g_ϬїXӵPnp.4&T<,>W;/0ɗ>O!T fc~NUqe<[+*bD>8{qL!}&