diff options
author | Milan Bouchet-Valat <nalimilan@club.fr> | 2010-12-08 18:18:50 +0100 |
---|---|---|
committer | Milan Bouchet-Valat <nalimilan@club.fr> | 2010-12-08 19:00:21 +0100 |
commit | 89eb4014d1196eda59ba9a406a6a50cc23bce465 (patch) | |
tree | a7594b42ee24591b5c741edda03f93f0d93e8673 | |
parent | 3a6c2f9d5b024bab6ac9e6b6ef5e41d9197286a6 (diff) |
Use the same PolicyKit rules for 'active', 'inactive' and 'any' sessions
There's no real point in preventing inactive users from editing system
configuration. Usually, users are clearly active since the backends
are not used by scripts, but there's no reason scripts should be forbidden.
The main interest though is that remote desktop sessions that are not
detected as active by ConsoleKit will work as local sessions, thus
fixing or working around bugs like
https://bugs.launchpad.net/ubuntu/+source/policykit/+bug/221363
-rw-r--r-- | org.freedesktop.SystemToolsBackends.policy.in | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/org.freedesktop.SystemToolsBackends.policy.in b/org.freedesktop.SystemToolsBackends.policy.in index 8d64c97..6a4c0fb 100644 --- a/org.freedesktop.SystemToolsBackends.policy.in +++ b/org.freedesktop.SystemToolsBackends.policy.in @@ -11,7 +11,8 @@ <_description>Manage system configuration</_description> <_message>You need to authenticate to modify the system configuration</_message> <defaults> - <allow_inactive>no</allow_inactive> + <allow_any>auth_admin_keep</allow_any> + <allow_inactive>auth_admin_keep</allow_inactive> <allow_active>auth_admin_keep</allow_active> </defaults> </action> @@ -20,7 +21,8 @@ <_description>Change the user's own account configuration</_description> <_message>You need to authenticate to modify your user account information</_message> <defaults> - <allow_inactive>no</allow_inactive> + <allow_any>yes</allow_any> + <allow_inactive>yes</allow_inactive> <allow_active>yes</allow_active> </defaults> </action> |