diff --git a/sysutils/polkit/Makefile b/sysutils/polkit/Makefile index 2a768cb721d8..c713bb5a77d1 100644 --- a/sysutils/polkit/Makefile +++ b/sysutils/polkit/Makefile @@ -1,100 +1,87 @@ PORTNAME= polkit -DISTVERSION= 125 -PORTREVISION= 1 +DISTVERSION= 127 CATEGORIES= sysutils gnome MAINTAINER= desktop@FreeBSD.org COMMENT= Framework for controlling access to system-wide components WWW= https://github.com/${GH_ACCOUNT}/${GH_PROJECT} LICENSE= LGPL20+ LICENSE_FILE= ${WRKSRC}/COPYING LIB_DEPENDS= libexpat.so:textproc/expat2 \ - libdbus-1.so:devel/dbus + libdbus-1.so:devel/dbus \ + libduktape.so:lang/duktape-lib TEST_DEPENDS= ${PYTHON_PKGNAMEPREFIX}dbus>=0:devel/py-dbus@${PY_FLAVOR} \ ${PYTHON_PKGNAMEPREFIX}python-dbusmock>0:devel/py-python-dbusmock@${PY_FLAVOR} \ ${LOCALBASE}/sbin/console-kit-daemon:sysutils/consolekit2 USERS= polkitd GROUPS= polkitd -USES= compiler:c++17-lang cpe dbus-testing gettext gnome localbase \ - meson pathfix pkgconfig python:test shebangfix tar:bz2 -USE_GNOME= glib20 intltool introspection:build +USES= compiler:c++17-lang cpe dbus-testing gettext-tools gnome \ + localbase meson pathfix perl5 pkgconfig python:test shebangfix +USE_GNOME= glib20 introspection:build SHEBANG_FILES= src/polkitbackend/toarray.pl \ test/wrapper.py - USE_LDCONFIG= yes +USE_PERL5= build CPE_VENDOR= polkit_project USE_GITHUB= yes GH_ACCOUNT= polkit-org MESON_ARGS= -Dpam_include=system \ -Dpam_prefix='etc/pam.d' \ -Dpolkitd_user=${USERS} \ -Dexamples=false \ -Dsession_tracking=ConsoleKit \ -Dtests=true \ -Dintrospection=true \ - -Dgtk_doc=false + -Dgtk_doc=false \ + -Dgettext=true OPTIONS_DEFINE= MANPAGES -OPTIONS_DEFAULT= DUKTAPE - -OPTIONS_SINGLE= JS -OPTIONS_SINGLE_JS= DUKTAPE SPIDERMONKEY - -JS_DESC= JavaScript engines -DUKTAPE_DESC= Duktape JavaScript backend -SPIDERMONKEY_DESC= SpiderMonkey JavaScript backend - -DUKTAPE_LIB_DEPENDS= libduktape.so:lang/duktape-lib -DUKTAPE_MESON_ON= -Djs_engine='duktape' -SPIDERMONKEY_LIB_DEPENDS= libmozjs-115.so:lang/spidermonkey115 -SPIDERMONKEY_MESON_ON= -Djs_engine='mozjs' +OPTIONS_SUB= yes MANPAGES_BUILD_DEPENDS= docbook-sgml>0:textproc/docbook-sgml \ docbook-xsl>0:textproc/docbook-xsl MANPAGES_USE= gnome=libxslt:build MANPAGES_MESON_TRUE= man -OPTIONS_SUB= yes - .ifdef ALLOW_SYSTEM_AFFECTING_TESTS TEST_ENV+= ALLOW_SYSTEM_AFFECTING_TESTS=1 .endif .include post-patch: @${REINPLACE_CMD} -e 's|/usr/bin/|${PREFIX}/bin/|g' \ ${WRKSRC}/docs/man/pkexec.xml \ ${WRKSRC}/src/examples/org.freedesktop.policykit.examples.pkexec.policy.in @${REINPLACE_CMD} -e 's|%%LOCALBASE%%|${PREFIX}|g' \ ${WRKSRC}/docs/man/polkit.xml post-install: ${RM} -r ${STAGEDIR}/usr/lib/systemd ${RM} -r ${STAGEDIR}/usr/lib/sysusers.d ${RM} -r ${STAGEDIR}/usr/lib/tmpfiles.d @${MKDIR} ${STAGEDIR}/var/lib/polkit-1 \ ${STAGEDIR}${PREFIX}/share/polkit-1/rules.d .for i in 10-vendor.d 20-org.d 30-site.d 50-local.d 90-mandatory.d ${MKDIR} ${STAGEDIR}${PREFIX}/etc/polkit-1/localauthority/${i} ${MKDIR} ${STAGEDIR}/var/lib/polkit-1/localauthority/${i} .endfor .if !defined(ALLOW_SYSTEM_AFFECTING_TESTS) post-test: @${ECHO_CMD} @${ECHO_CMD} "===> Polkit tests were skipped, because they create system users and groups" @${ECHO_CMD} "and are only safe to run inside a discardable jail. If that's the case, run" @${ECHO_CMD} "make test ALLOW_SYSTEM_AFFECTING_TESTS=yes" @${ECHO_CMD} .endif .include diff --git a/sysutils/polkit/distinfo b/sysutils/polkit/distinfo index 70ea00eef283..6e31d3b7fd8e 100644 --- a/sysutils/polkit/distinfo +++ b/sysutils/polkit/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1725097769 -SHA256 (polkit-org-polkit-125_GH0.tar.gz) = ea5cd6e6e2afa6bad938ee770bf0c2cd9317910f37956faeba2869adcf3747d1 -SIZE (polkit-org-polkit-125_GH0.tar.gz) = 453652 +TIMESTAMP = 1766007520 +SHA256 (polkit-org-polkit-127_GH0.tar.gz) = 9b7bc16f086479dcc626c575976568ba4a85d34297a750d8ab3d2e57f6d8b988 +SIZE (polkit-org-polkit-127_GH0.tar.gz) = 472872 diff --git a/sysutils/polkit/files/patch-docs_man_polkit.xml b/sysutils/polkit/files/patch-docs_man_polkit.xml index 674c65c30674..1804686e0c16 100644 --- a/sysutils/polkit/files/patch-docs_man_polkit.xml +++ b/sysutils/polkit/files/patch-docs_man_polkit.xml @@ -1,86 +1,84 @@ ---- docs/man/polkit.xml.orig 2018-01-20 14:00:19 UTC +--- docs/man/polkit.xml.orig 2025-12-17 16:14:53 UTC +++ docs/man/polkit.xml -@@ -104,12 +104,12 @@ System Context | | +@@ -104,17 +104,15 @@ +------------------+ | +------------------+ | ^ | - | +--------------------------------------+ -- | | /usr/share/polkit-1/actions/*.policy | -+ | | %%LOCALBASE%%/share/polkit-1/actions/*.policy | - | +--------------------------------------+ + | +--------------------------------------------+ +- | | /etc/polkit-1/actions/*.policy | ++ | | %%LOCALBASE%%/etc/polkit-1/actions/*.policy | + | | /run/polkit-1/actions/*.policy | + | | /usr/local/share/polkit-1/actions/*.policy | +- | | /usr/share/polkit-1/actions/*.policy | + | +--------------------------------------------+ | - +--------------------------------------+ -- | /etc/polkit-1/rules.d/*.rules | -- | /usr/share/polkit-1/rules.d/*.rules | -+ | %%LOCALBASE%%/etc/polkit-1/rules.d/*.rules | -+ | %%LOCALBASE%%/share/polkit-1/rules.d/*.rules | - +--------------------------------------+ + +--------------------------------------------+ +- | /etc/polkit-1/rules.d/*.rules | ++ | %%LOCALBASE%%/etc/polkit-1/rules.d/*.rules | + | /run/polkit-1/rules.d/*.rules | + | /usr/local/share/polkit-1/rules.d/*.rules | +- | /usr/share/polkit-1/rules.d/*.rules | + +--------------------------------------------+ ]]> -@@ -217,7 +217,7 @@ System Context | | +@@ -222,7 +220,7 @@ +----------------------------------------------------- order to use polkit. Actions correspond to operations that clients can request the mechanism to carry out and are defined in XML files that the mechanism installs into the /usr/share/polkit-1/actions + class='directory'>%%LOCALBASE%%/share/polkit-1/actions directory. -@@ -473,21 +473,21 @@ System Context | | +@@ -481,10 +479,9 @@ +----------------------------------------------------- + directories in this order: + + +- /etc/polkit-1/rules.d ++ %%LOCALBASE%%/etc/polkit-1/rules.d + /run/polkit-1/rules.d + /usr/local/share/polkit-1/rules.d +- /usr/share/polkit-1/rules.d + - polkitd reads - .rules files from the -- /etc/polkit-1/rules.d and -- /usr/share/polkit-1/rules.d -+ %%LOCALBASE%%/etc/polkit-1/rules.d and -+ %%LOCALBASE%%/share/polkit-1/rules.d - directories by sorting the files in lexical order based on the - basename on each file (if there's a tie, files in -- /etc -+ %%LOCALBASE%%/etc - are processed before files in -- /usr). -+ %%LOCALBASE%%/share). - For example, for the following four - files, the order is + These directories are processed in lexical order based on the basename +@@ -493,10 +490,9 @@ +----------------------------------------------------- + files, the order is: - /etc/polkit-1/rules.d/10-auth.rules -- /usr/share/polkit-1/rules.d/10-auth.rules -- /etc/polkit-1/rules.d/15-auth.rules -- /usr/share/polkit-1/rules.d/20-auth.rules + %%LOCALBASE%%/etc/polkit-1/rules.d/10-auth.rules -+ %%LOCALBASE%%/share/polkit-1/rules.d/10-auth.rules -+ %%LOCALBASE%%/etc/polkit-1/rules.d/15-auth.rules -+ %%LOCALBASE%%/share/polkit-1/rules.d/20-auth.rules + /run/polkit-1/rules.d/10-auth.rules + /usr/local/share/polkit-1/rules.d/10-auth.rules +- /usr/share/polkit-1/rules.d/10-auth.rules - Both directories are monitored so if a rules file is changed, -@@ -567,7 +567,7 @@ System Context | | + All of these directories are monitored, so if a rules file is changed, +@@ -576,7 +572,7 @@ +----------------------------------------------------- called in the order they have been added until one of the functions returns a value. Hence, to add an authorization rule that is processed before other rules, put it in a file in - /etc/polkit-1/rules.d + %%LOCALBASE%%/etc/polkit-1/rules.d with a name that sorts before other rules files, for example 00-early-checks.rules. Each function should return a value from polkit.Result -@@ -683,8 +683,8 @@ polkit.addRule(function(action, subject) { +@@ -692,8 +688,8 @@ polkit.addRule(function(action, subject) { will produce the following when the user runs 'pkexec -u bateman bash -i' from a shell: -@@ -916,7 +916,7 @@ polkit.addRule(function(action, subject) { +@@ -960,7 +956,7 @@ polkit.addRule(function(action, subject) { session_id, "/org/freedesktop/ConsoleKit", strlen ("/org/freedesktop/ConsoleKit") )) + session_path = g_build_path("/", "/org/freedesktop/ConsoleKit", session->session_id, NULL); + result = g_dbus_connection_call_sync (connection, "org.freedesktop.ConsoleKit", /* name */ - session->session_id, /* object path */ + session_path ? session_path : session->session_id, /* object path */ "org.freedesktop.ConsoleKit.Session", /* interface name */ "GetUser", /* method */ NULL, /* parameters */ -@@ -383,6 +387,7 @@ polkit_unix_session_exists_sync (PolkitSubject *subj +@@ -379,6 +383,7 @@ polkit_unix_session_exists_sync (PolkitSubject *subj -1, cancellable, error); + g_free (session_path); if (result == NULL) goto out; -@@ -472,6 +477,7 @@ polkit_unix_session_initable_init (GInitable *init +@@ -468,6 +473,7 @@ polkit_unix_session_initable_init (GInitable *init PolkitUnixSession *session = POLKIT_UNIX_SESSION (initable); GDBusConnection *connection; GVariant *result; + const gchar* session_path; gboolean ret; connection = NULL; -@@ -502,7 +508,8 @@ polkit_unix_session_initable_init (GInitable *init +@@ -498,7 +504,8 @@ polkit_unix_session_initable_init (GInitable *init if (result == NULL) goto out; - g_variant_get (result, "(o)", &session->session_id); + g_variant_get (result, "(&o)", &session_path); + session->session_id = g_path_get_basename (session_path); g_variant_unref (result); ret = TRUE; diff --git a/sysutils/polkit/files/patch-src_polkitagent_polkitagenthelper-pam.c b/sysutils/polkit/files/patch-src_polkitagent_polkitagenthelper-pam.c new file mode 100644 index 000000000000..0f1a0d673da8 --- /dev/null +++ b/sysutils/polkit/files/patch-src_polkitagent_polkitagenthelper-pam.c @@ -0,0 +1,27 @@ +--- src/polkitagent/polkitagenthelper-pam.c.orig 2025-12-17 16:14:53 UTC ++++ src/polkitagent/polkitagenthelper-pam.c +@@ -38,7 +38,7 @@ + # define SO_PEERPIDFD 0x404B + # elif defined(__sparc__) + # define SO_PEERPIDFD 0x0056 +-# else ++# elif defined(__linux__) + # define SO_PEERPIDFD 77 + # endif + #endif +@@ -137,6 +137,7 @@ main (int argc, char *argv[]) + goto error; + } + ++#ifdef SO_PEERPIDFD + /* We are socket activated and the socket has been set up as stdio/stdout, read user from it */ + if (argv[1] != NULL && strcmp (argv[1], "--socket-activated") == 0) + { +@@ -177,6 +178,7 @@ main (int argc, char *argv[]) + uid = ucred.uid; + } + else ++#endif + user_to_auth = argv[1]; + + cookie = read_cookie (argc, argv); diff --git a/sysutils/polkit/files/patch-src_polkitbackend_meson.build b/sysutils/polkit/files/patch-src_polkitbackend_meson.build index 7190e505d15c..6bf91cba7eeb 100644 --- a/sysutils/polkit/files/patch-src_polkitbackend_meson.build +++ b/sysutils/polkit/files/patch-src_polkitbackend_meson.build @@ -1,19 +1,11 @@ ---- src/polkitbackend/meson.build.orig 2022-10-26 12:12:24 UTC +--- src/polkitbackend/meson.build.orig 2025-12-17 16:14:53 UTC +++ src/polkitbackend/meson.build -@@ -30,7 +30,6 @@ c_flags = [ - '-DPACKAGE_DATA_DIR="@0@"'.format(pk_prefix / pk_datadir), - '-DPACKAGE_SYSCONF_DIR="@0@"'.format(pk_prefix / pk_sysconfdir), - '-D_XOPEN_SOURCE=700', -- '-D_GNU_SOURCE=1', - ] - - if js_engine == 'duktape' -@@ -61,7 +60,7 @@ libpolkit_backend = static_library( - - install_data( - '50-default.rules', +@@ -58,7 +58,7 @@ configure_file( + 'PRIVILEGED_GROUP': privileged_group, + }, + install: true, - install_dir: pk_pkgdatadir / 'rules.d', + install_dir: pk_pkgsysconfdir / 'rules.d', ) program = 'polkitd' diff --git a/sysutils/polkit/files/patch-src_polkitbackend_polkitbackendsessionmonitor.c b/sysutils/polkit/files/patch-src_polkitbackend_polkitbackendsessionmonitor.c index 216f00b94e58..3d1f73ebe13f 100644 --- a/sysutils/polkit/files/patch-src_polkitbackend_polkitbackendsessionmonitor.c +++ b/sysutils/polkit/files/patch-src_polkitbackend_polkitbackendsessionmonitor.c @@ -1,45 +1,45 @@ FreeBSD ConsoleKit is patched to return proper IDs instead D-Bus paths, so adapt Polkit to this case. ---- src/polkitbackend/polkitbackendsessionmonitor.c.orig 2023-07-28 12:34:38 UTC +--- src/polkitbackend/polkitbackendsessionmonitor.c.orig 2025-12-17 16:14:53 UTC +++ src/polkitbackend/polkitbackendsessionmonitor.c -@@ -385,7 +385,7 @@ polkit_backend_session_monitor_get_session_for_subject +@@ -384,7 +384,7 @@ polkit_backend_session_monitor_get_session_for_subject if (POLKIT_IS_UNIX_PROCESS (subject)) { - const gchar *session_id; + const gchar *session_path, *session_id; GVariant *result; result = g_dbus_connection_call_sync (monitor->system_bus, "org.freedesktop.ConsoleKit", -@@ -400,14 +400,16 @@ polkit_backend_session_monitor_get_session_for_subject +@@ -399,14 +399,16 @@ polkit_backend_session_monitor_get_session_for_subject error); if (result == NULL) goto out; - g_variant_get (result, "(&o)", &session_id); + g_variant_get (result, "(&o)", &session_path); + session_id = g_path_get_basename (session_path); session = polkit_unix_session_new (session_id); + g_free (session_id); g_variant_unref (result); } else if (POLKIT_IS_SYSTEM_BUS_NAME (subject)) { guint32 pid; - const gchar *session_id; + const gchar *session_path, *session_id; GVariant *result; result = g_dbus_connection_call_sync (monitor->system_bus, -@@ -439,8 +441,10 @@ polkit_backend_session_monitor_get_session_for_subject +@@ -438,8 +440,10 @@ polkit_backend_session_monitor_get_session_for_subject error); if (result == NULL) goto out; - g_variant_get (result, "(&o)", &session_id); + g_variant_get (result, "(&o)", &session_path); + session_id = g_path_get_basename (session_path); session = polkit_unix_session_new (session_id); + g_free (session_id); g_variant_unref (result); } else diff --git a/sysutils/polkit/files/patch-test_data_etc_polkit-1_rules.d_10-testing.rules b/sysutils/polkit/files/patch-test_data_etc_polkit-1_rules.d_10-testing.rules index 4a3a5ed805fd..90dbb673529f 100644 --- a/sysutils/polkit/files/patch-test_data_etc_polkit-1_rules.d_10-testing.rules +++ b/sysutils/polkit/files/patch-test_data_etc_polkit-1_rules.d_10-testing.rules @@ -1,11 +1,11 @@ ---- test/data/etc/polkit-1/rules.d/10-testing.rules.orig 2024-08-08 13:12:35 UTC +--- test/data/etc/polkit-1/rules.d/10-testing.rules.orig 2025-12-17 16:14:53 UTC +++ test/data/etc/polkit-1/rules.d/10-testing.rules -@@ -152,7 +152,7 @@ polkit.addRule(function(action, subject) { +@@ -162,7 +162,7 @@ polkit.addRule(function(action, subject) { polkit.addRule(function(action, subject) { if (action.id == "net.company.spawning.helper_with_output") { try { - var out = polkit.spawn(["echo", "-n", "-e", "Hello\nWorld"]); + var out = polkit.spawn(["printf", "Hello\nWorld"]); if (out == "Hello\nWorld") return polkit.Result.YES; else diff --git a/sysutils/polkit/files/patch-test_wrapper.py b/sysutils/polkit/files/patch-test_wrapper.py index 50746895bb9b..c2661cb03a84 100644 --- a/sysutils/polkit/files/patch-test_wrapper.py +++ b/sysutils/polkit/files/patch-test_wrapper.py @@ -1,135 +1,76 @@ ---- test/wrapper.py.orig 2026-01-04 14:26:35 UTC +--- test/wrapper.py.orig 2026-01-07 09:02:36 UTC +++ test/wrapper.py -@@ -3,8 +3,13 @@ import os +@@ -3,7 +3,9 @@ import os import argparse import atexit import os +import platform import subprocess +import shutil import sys -+import signal -+import time -+import errno - - import dbus - import dbus.mainloop.glib -@@ -17,18 +22,85 @@ def setup_test_namespace(data_dir): - # Setup a new mount & user namespace, so we can use mount() unprivileged (see user_namespaces(7)) - euid = os.geteuid() - egid = os.getegid() -- os.unshare(os.CLONE_NEWNS|os.CLONE_NEWUSER) -- # Map root to the original EUID and EGID, so we can actually call mount() inside our namespace -- with open("/proc/self/uid_map", "w") as f: -- f.write(f"0 {euid} 1") -- with open("/proc/self/setgroups", "w") as f: -- f.write("deny") -- with open("/proc/self/gid_map", "w") as f: -- f.write(f"0 {egid} 1") -+ try: -+ os.unshare(os.CLONE_NEWNS|os.CLONE_NEWUSER) -+ # Map root to the original EUID and EGID, so we can actually call mount() inside our namespace -+ with open("/proc/self/uid_map", "w") as f: -+ f.write(f"0 {euid} 1") -+ with open("/proc/self/setgroups", "w") as f: -+ f.write("deny") -+ with open("/proc/self/gid_map", "w") as f: -+ f.write(f"0 {egid} 1") - -- # Overmount /etc with our own version -- subprocess.check_call(["mount", "--bind", os.path.join(data_dir, "etc"), "/etc"]) -+ # Overmount /etc with our own version -+ subprocess.check_call(["mount", "--bind", os.path.join(data_dir, "etc"), "/etc"]) -+ except PermissionError: -+ print("Lacking permissions to set up test harness, skipping") + import signal + import time +@@ -34,10 +36,11 @@ def setup_test_namespace(data_dir): + subprocess.check_call(["mount", "--bind", os.path.join(data_dir, "etc"), "/etc"]) + except PermissionError: + print("Lacking permissions to set up test harness, skipping") +- sys.exit(77) + return False -+ except AttributeError: -+ print("Python 3.12 is required for os.unshare(), skipping") + except AttributeError: + print("Python 3.12 is required for os.unshare(), skipping") +- sys.exit(77) + return False + return True -+ -+def stop_dbus(pid: int) -> None: -+ """Stop a D-Bus daemon -+ -+ If DBus daemon is not explicitly killed in the testing environment -+ the test times out and reports as failed. -+ This is a backport of a function dropped from DBusMock source (99c4800e9eed). -+ """ -+ signal.signal(signal.SIGTERM, signal.SIG_IGN) -+ for _ in range(50): -+ try: -+ os.kill(pid, signal.SIGTERM) -+ os.waitpid(pid, os.WNOHANG) -+ except ChildProcessError: -+ break -+ except OSError as e: -+ if e.errno == errno.ESRCH: -+ break -+ raise -+ time.sleep(0.1) -+ else: -+ sys.stderr.write("ERROR: timed out waiting for bus process to terminate\n") -+ os.kill(pid, signal.SIGKILL) -+ try: -+ os.waitpid(pid, 0) -+ except ChildProcessError: -+ pass -+ signal.signal(signal.SIGTERM, signal.SIG_DFL) -+ -+ -+def setup_test_unconstrained_linux(data_dir): -+ shutil.copytree(os.path.join(data_dir, "etc"), "/etc", dirs_exist_ok=True) -+ + + def stop_dbus(pid: int) -> None: +@@ -69,6 +72,32 @@ def stop_dbus(pid: int) -> None: + signal.signal(signal.SIGTERM, signal.SIG_DFL) + + +def setup_test_unconstrained_freebsd(data_dir): + passwd = os.path.join(data_dir, "etc", "passwd") + with open(passwd, 'r') as file: + for line in file: + fields = line.split(":") + if fields[0] == "root": + continue + subprocess.call(["pw", "useradd", "-n", fields[0], "-u", fields[2], "-c", fields[4], "-d", fields[5], "-s", fields[6].strip()]) + group = os.path.join(data_dir, "etc", "group") + with open(group, 'r') as file: + for line in file: + fields = line.split(":") + cmd = ["pw", "groupadd", "-n", fields[0], "-g", fields[2]] + members = fields[3].strip() + if len(members) > 0: + cmd.append("-M") + cmd.append(members) + if fields[0] == "root": + cmd = ["pw", "groupmod", "-g", "0", "-l", "root"] + subprocess.call(cmd) + shutil.copy2(os.path.join(data_dir, "etc", "netgroup"), "/etc/netgroup") + shutil.copy2("/usr/bin/true", "/bin/true") + bus = dbus.SystemBus() + consolekit = bus.get_object("org.freedesktop.ConsoleKit", "/org/freedesktop/ConsoleKit/Manager") + consolekit.GetSeats(dbus_interface="org.freedesktop.ConsoleKit.Manager") + if __name__ == "__main__": parser = argparse.ArgumentParser() parser.add_argument("test_executable", -@@ -39,12 +111,20 @@ if __name__ == "__main__": +@@ -79,7 +108,15 @@ if __name__ == "__main__": help="set up a mock system D-Bus using dbusmock") args = parser.parse_args() - setup_test_namespace(args.data_dir) + if not setup_test_namespace(args.data_dir): + if os.getenv("ALLOW_SYSTEM_AFFECTING_TESTS") == "1": + if platform.system() == 'FreeBSD': + setup_test_unconstrained_freebsd(args.data_dir) + else: + setup_test_unconstrained_linux(args.data_dir) + else: + # skip tests + sys.exit(77) if args.mock_dbus: dbus.mainloop.glib.DBusGMainLoop(set_as_default=True) - dbusmock.DBusTestCase.start_system_bus() -- atexit.register(dbusmock.DBusTestCase.stop_dbus, dbusmock.DBusTestCase.system_bus_pid) -+ atexit.register(stop_dbus, dbusmock.DBusTestCase.system_bus_pid) - - print(f"Executing '{args.test_executable}'") - sys.stdout.flush() diff --git a/sysutils/polkit/pkg-plist b/sysutils/polkit/pkg-plist index 406c2b4cc403..63e089e2bd5b 100644 --- a/sysutils/polkit/pkg-plist +++ b/sysutils/polkit/pkg-plist @@ -1,100 +1,104 @@ bin/pkaction bin/pkcheck @(root,,4755) bin/pkexec bin/pkttyagent etc/pam.d/polkit-1 etc/polkit-1/rules.d/50-default.rules include/polkit-1/polkit/polkit.h include/polkit-1/polkit/polkitactiondescription.h include/polkit-1/polkit/polkitauthority.h include/polkit-1/polkit/polkitauthorityfeatures.h include/polkit-1/polkit/polkitauthorizationresult.h include/polkit-1/polkit/polkitcheckauthorizationflags.h include/polkit-1/polkit/polkitdetails.h include/polkit-1/polkit/polkitenumtypes.h include/polkit-1/polkit/polkiterror.h include/polkit-1/polkit/polkitidentity.h include/polkit-1/polkit/polkitimplicitauthorization.h include/polkit-1/polkit/polkitpermission.h include/polkit-1/polkit/polkitprivate.h include/polkit-1/polkit/polkitsubject.h include/polkit-1/polkit/polkitsystembusname.h include/polkit-1/polkit/polkittemporaryauthorization.h include/polkit-1/polkit/polkittypes.h include/polkit-1/polkit/polkitunixgroup.h include/polkit-1/polkit/polkitunixnetgroup.h include/polkit-1/polkit/polkitunixprocess.h include/polkit-1/polkit/polkitunixsession.h include/polkit-1/polkit/polkitunixuser.h include/polkit-1/polkitagent/polkitagent.h include/polkit-1/polkitagent/polkitagentenumtypes.h include/polkit-1/polkitagent/polkitagentlistener.h include/polkit-1/polkitagent/polkitagentsession.h include/polkit-1/polkitagent/polkitagenttextlistener.h include/polkit-1/polkitagent/polkitagenttypes.h lib/girepository-1.0/Polkit-1.0.typelib lib/girepository-1.0/PolkitAgent-1.0.typelib lib/libpolkit-agent-1.so lib/libpolkit-agent-1.so.0 lib/libpolkit-agent-1.so.0.0.0 lib/libpolkit-gobject-1.so lib/libpolkit-gobject-1.so.0 lib/libpolkit-gobject-1.so.0.0.0 @(root,,4755) lib/polkit-1/polkit-agent-helper-1 lib/polkit-1/polkitd libdata/pkgconfig/polkit-agent-1.pc libdata/pkgconfig/polkit-gobject-1.pc %%MANPAGES%%share/man/man1/pkaction.1.gz %%MANPAGES%%share/man/man1/pkcheck.1.gz %%MANPAGES%%share/man/man1/pkexec.1.gz %%MANPAGES%%share/man/man1/pkttyagent.1.gz %%MANPAGES%%share/man/man8/polkit.8.gz %%MANPAGES%%share/man/man8/polkitd.8.gz share/dbus-1/system-services/org.freedesktop.PolicyKit1.service share/dbus-1/system.d/org.freedesktop.PolicyKit1.conf share/gettext/its/polkit.its share/gettext/its/polkit.loc share/gir-1.0/Polkit-1.0.gir share/gir-1.0/PolkitAgent-1.0.gir +share/locale/bg/LC_MESSAGES/polkit-1.mo share/locale/cs/LC_MESSAGES/polkit-1.mo share/locale/da/LC_MESSAGES/polkit-1.mo share/locale/de/LC_MESSAGES/polkit-1.mo share/locale/hi/LC_MESSAGES/polkit-1.mo share/locale/hr/LC_MESSAGES/polkit-1.mo share/locale/hu/LC_MESSAGES/polkit-1.mo share/locale/id/LC_MESSAGES/polkit-1.mo share/locale/it/LC_MESSAGES/polkit-1.mo share/locale/ka/LC_MESSAGES/polkit-1.mo share/locale/nl/LC_MESSAGES/polkit-1.mo share/locale/nn/LC_MESSAGES/polkit-1.mo +share/locale/oc/LC_MESSAGES/polkit-1.mo share/locale/pl/LC_MESSAGES/polkit-1.mo share/locale/pt/LC_MESSAGES/polkit-1.mo share/locale/pt_BR/LC_MESSAGES/polkit-1.mo share/locale/ro/LC_MESSAGES/polkit-1.mo share/locale/ru/LC_MESSAGES/polkit-1.mo share/locale/sk/LC_MESSAGES/polkit-1.mo share/locale/sl/LC_MESSAGES/polkit-1.mo share/locale/sv/LC_MESSAGES/polkit-1.mo share/locale/tr/LC_MESSAGES/polkit-1.mo share/locale/uk/LC_MESSAGES/polkit-1.mo share/locale/zh_CN/LC_MESSAGES/polkit-1.mo share/locale/zh_TW/LC_MESSAGES/polkit-1.mo +%%MANPAGES%%share/man/man5/polkitd.conf.5.gz share/polkit-1/actions/org.freedesktop.policykit.policy share/polkit-1/policyconfig-1.dtd +share/polkit-1/polkitd.conf @dir(polkitd,,700) etc/polkit-1/rules.d @dir(polkitd,,700) share/polkit-1/rules.d @dir etc/polkit-1/localauthority/90-mandatory.d @dir etc/polkit-1/localauthority/50-local.d @dir etc/polkit-1/localauthority/30-site.d @dir etc/polkit-1/localauthority/20-org.d @dir etc/polkit-1/localauthority/10-vendor.d @dir(,,700) etc/polkit-1/localauthority @dir etc/polkit-1 @dir /var/lib/polkit-1/localauthority/90-mandatory.d @dir /var/lib/polkit-1/localauthority/50-local.d @dir /var/lib/polkit-1/localauthority/30-site.d @dir /var/lib/polkit-1/localauthority/20-org.d @dir /var/lib/polkit-1/localauthority/10-vendor.d @dir /var/lib/polkit-1/localauthority @dir(,,700) /var/lib/polkit-1 @dir /var/lib