Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upAllow for easy escalation to root in AppVM #202
Comments
marmarek
assigned
rootkovska
Mar 8, 2015
marmarek
added this to the Release 1 Beta 1 milestone
Mar 8, 2015
marmarek
added
bug
C: core
P: major
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by marmarek on 6 Apr 2011 14:06 UTC |
marmarek
assigned
marmarek
and unassigned
rootkovska
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 6 Apr 2011 21:06 UTC
http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=8047ec780a44c6b538b412e0173152045ab82191
|
Comment by marmarek on 6 Apr 2011 21:06 UTC |
marmarek
closed this
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 6 Apr 2011 21:48 UTC
This doesn't work for gpk-application, one of the most important app on a templateVM...
When I open gpk-aplication and then choose "Refresh package list" from the menu, it throws an authorization failure message.
Interestingly e.g. system-config-date works just fine.
|
Comment by joanna on 6 Apr 2011 21:48 UTC When I open gpk-aplication and then choose "Refresh package list" from the menu, it throws an authorization failure message. Interestingly e.g. system-config-date works just fine. |
marmarek
reopened this
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 7 Apr 2011 22:50 UTC
This requires forcing ConsoleKit to think that our X session is local.
Perhaps implement own ck-xinit-session?
|
Comment by marmarek on 7 Apr 2011 22:50 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 7 Apr 2011 22:53 UTC
When done - remove workaround for nm-applet (/etc/dbus-1/system.d/qubes-nm-applet.conf and sed on /usr/share/polkit-1/actions/...)
|
Comment by marmarek on 7 Apr 2011 22:53 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 7 Apr 2011 23:03 UTC |
marmarek
modified the milestones:
Release 1 Beta 2,
Release 1 Beta 1
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 17 Apr 2011 16:07 UTC |
marmarek
added
enhancement
and removed
bug
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 29 Apr 2011 10:33 UTC
ck-xinit-session-qubes does the work - ConsoleKit session is set up properly as "local" and "active". I've removed workaround for nm-applet. For other applications which asks for root password, we should remove root password.
Unfortunately polkit-gnome-authentication-agent is still needed, just to (automatically) respond with empty password... When user tries to do some privileged task (i.e. install package), password prompt shows for a (almost unnoticeable) moment.
|
Comment by marmarek on 29 Apr 2011 10:33 UTC Unfortunately polkit-gnome-authentication-agent is still needed, just to (automatically) respond with empty password... When user tries to do some privileged task (i.e. install package), password prompt shows for a (almost unnoticeable) moment. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 12 May 2011 17:24 UTC
http://git.qubes-os.org/gitweb/?p=marmarek/core.git;a=commit;h=bb073c3cdb91775eef966d8bc4f9d4299da7f9ca
|
Comment by marmarek on 12 May 2011 17:24 UTC |
marmarek commentedMar 8, 2015
Reported by joanna on 6 Apr 2011 13:30 UTC
Should work for:
Add explanation why this is a good idea and not a security breach.
Migrated-From: https://wiki.qubes-os.org/ticket/202