summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMilan Bouchet-Valat <nalimilan@club.fr>2010-12-08 18:18:50 +0100
committerMilan Bouchet-Valat <nalimilan@club.fr>2010-12-08 19:00:21 +0100
commit89eb4014d1196eda59ba9a406a6a50cc23bce465 (patch)
treea7594b42ee24591b5c741edda03f93f0d93e8673
parent3a6c2f9d5b024bab6ac9e6b6ef5e41d9197286a6 (diff)
Use the same PolicyKit rules for 'active', 'inactive' and 'any' sessions
There's no real point in preventing inactive users from editing system configuration. Usually, users are clearly active since the backends are not used by scripts, but there's no reason scripts should be forbidden. The main interest though is that remote desktop sessions that are not detected as active by ConsoleKit will work as local sessions, thus fixing or working around bugs like https://bugs.launchpad.net/ubuntu/+source/policykit/+bug/221363
-rw-r--r--org.freedesktop.SystemToolsBackends.policy.in6
1 files changed, 4 insertions, 2 deletions
diff --git a/org.freedesktop.SystemToolsBackends.policy.in b/org.freedesktop.SystemToolsBackends.policy.in
index 8d64c97..6a4c0fb 100644
--- a/org.freedesktop.SystemToolsBackends.policy.in
+++ b/org.freedesktop.SystemToolsBackends.policy.in
@@ -11,7 +11,8 @@
<_description>Manage system configuration</_description>
<_message>You need to authenticate to modify the system configuration</_message>
<defaults>
- <allow_inactive>no</allow_inactive>
+ <allow_any>auth_admin_keep</allow_any>
+ <allow_inactive>auth_admin_keep</allow_inactive>
<allow_active>auth_admin_keep</allow_active>
</defaults>
</action>
@@ -20,7 +21,8 @@
<_description>Change the user's own account configuration</_description>
<_message>You need to authenticate to modify your user account information</_message>
<defaults>
- <allow_inactive>no</allow_inactive>
+ <allow_any>yes</allow_any>
+ <allow_inactive>yes</allow_inactive>
<allow_active>yes</allow_active>
</defaults>
</action>