Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

polkit-default-privs-1550+20211008.9751669-1.1 RPM for noarch

From OpenSuSE Tumbleweed for noarch

Name: polkit-default-privs Distribution: openSUSE Tumbleweed
Version: 1550+20211008.9751669 Vendor: openSUSE
Release: 1.1 Build date: Mon Oct 11 17:56:06 2021
Group: Productivity/Security Build host: goat15
Size: 160242 Source RPM: polkit-default-privs-1550+20211008.9751669-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: http://github.com/openSUSE/polkit-default-privs.git
Summary: SUSE PolicyKit default permissions
Predefined polkit profiles for different usage scenarios like desktop and
server. These profiles define the kind of authentication required for various
polkit actions used across applications.

Provides

Requires

License

GPL-2.0-or-later

Changelog

* Fri Oct 08 2021 Matthias Gerstner <matthias.gerstner@suse.com>
  - drop backward compatibility symlink in /etc/polkit-default-privs.standard.
    rpmlint 2.0 is now in Factory and the check there directly uses the profile
    in /usr/etc/polkit-default-privs/profiles/standard.
  - drop polkit-whitelisting sub-package. This is now handled in rpmlint 2.0
    internally.
* Fri Oct 08 2021 matthias.gerstner@suse.com
  - Update to version 1550+20211008.9751669:
    * whitelist power-profiles-daemon actions (bsc#1189900)
    * cleanup: remove polkit-rules-whitelist.json
* Wed Aug 18 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210818.b0c41fd:
    * whitelist deepin-api service actions (bsc#1070943)
* Fri Aug 13 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210813.ce0df56:
    * malcontent: loosen restrictive ReadOwn actions to prevent spurious auth requests (#56)
* Thu Jul 22 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210722.ae1891d:
    * whitelist zypp-gui action (bsc#1188364)
    * introduce sub-directories for profiles in both /etc and /usr/etc
    * remove polkit-default-privs.d package specific directory
    * Moving polkit-default-privs.easy, polkit-default-privs.local and polkit-default-privs.restrictive from /etc /to /usr/etc directory
* Thu Jul 15 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210715.b7d5b97:
    * kdenetwork-filesharing: tighten the restrictive profile
* Wed Jul 14 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210714.9c51c0e:
    * 50-default.rules: move to /usr (contents unchanged)
    See also: https://build.opensuse.org/request/show/905083
* Thu Jul 08 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210708.6401347:
    * fprint.device.enroll: keep restrictive profile in sync with upstream
* Thu Jul 08 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210708.c4d6bf4:
    * kdenetwork-filesharing: align with upstream (#49)
* Thu Jul 08 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210701.3047fcb:
    * ModemManager1.USSD: fix inconsistencies in standard and easy profiles
    * powerdevil.discretegpuhelper.hasdualgpu: align with upstream settings
    * cupspkhelper.mechanism.job-edit: align with upstream setting
    * org.fedoraproject.FirewallD1.info: don't be more restrictive than the 'standard' profile
    * remove org.selinux.* (policycoreutils) since they no longer exist in Factory
    * remove cinnamon.controlcenter.datetime.configure: no longer packaged
    * net.connman.vpn.secret: fix invalid label "auth_admin_keep_session"
* Tue Jun 15 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210615.e149f78:
    * profiles: cinnamon-settings-daemon (bsc#1186845)
* Thu Jun 10 2021 jsegitz@suse.com
  - Update to version 1550+20210610.25c9b98:
    * Whitelist setroubleshoot (boo#1186344)
* Thu May 20 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210520.336dcea:
    * whitelist incremental libvirt org.libvirt.api.node-device.delete (bsc#1186270)
* Mon May 17 2021 paolo.perego@suse.com
  - Update to version 1550+20210517.56da22d:
    * Add systemd homed (boo#1185285)
* Mon May 03 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210503.88baaca:
    * whitelist deepin-system-monitor pkexec actions (bsc#1181886)
* Fri Apr 30 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210430.c408cda:
    * systemd: add newly added inhibit-handle-reboot-key action (bsc#1185468)
    * whitelist non-functional change in systemd-networkd rules (bsc#1185469)
* Thu Apr 29 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210429.a605b7d:
    * tuned: whitelist incrementally added polkit action (bsc#1185418)
* Mon Apr 12 2021 wolfgang.frisch@suse.com
  - Update to version 1550+20210409.c29362e:
    * profiles: add KDiskMark (bsc#1182521)
    * profiles: add kdenetwork-filesharing (bsc#1175633) (#37)
* Mon Jan 11 2021 matthias.gerstner@suse.com
  - Update to version 1550+20210111.f725c25:
    * polkit-rules-whitelist: add brltty brlapi group rule (bsc#1180593)
* Tue Dec 08 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201208.135bf51:
    * libvirt: allow the active session to create read-only connections (bsc#1179126)
    * profiles: cleanup outdates keep_always entries
* Thu Nov 19 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201119.2c1dce4:
    - cleanup of dead and inconsistent polkit actions:
    * profiles: drop the now rather confusing comment from nwfilter-binding actions
    * profiles: harmonize and normalize profile syntax and style
    * profiles: harmonize spice-space.lowlevelusbaccess actions
    * profiles: remove dead pantheon actions
    * profiles: remove dead org.gnome.DejaDup.duplicity action
    * profiles: drop dead com.redhat.tuned.gui.run action
    * profiles: fix brltty action(s)
    * profiles: remove dead netvisix action
    * profiles: realmd.discover-realm action: fix restrictive any setting
    * profiles: remove dead com.redhat.lvm2.* actions
    * profiles: group together org.kde.powerdevil actions
    * profiles: remove dead org.kde.powerdevil.backlighthelper actions
    * profiles: fix FirewallD1.info action in standard profile
    * profiles: remove dead org.kde.baloo action
    * profiles: remove dead kwallet actions and fix kwallet5 restrictive setting
    * profiles: selinux actions: make restrictive profile no weaker than upstream
    * profiles: remove dead gufw pkexec action
    * profiles: adjust mate actions better to upstream defaults
    * profiles: remove dead org.libvirt.api.newfilter.bind-* actions
    * profiles: clear dead nepomuk.filewatch.raiselimit action
    * profiles: remove dead kcmlightdm actions
    * profiles: adjust gnome.controlcenter actions better to upstream defaults
    * profiles: remove dead org.kde.recorditnow helper
    * profiles: remove dead de.berlios.smb4k.mounthelper actions
    * profiles: adjust user-administration action better to upstream defaults
    * profiles: cleanup urfkill actions
    * profiles: adjust ModemManager1 actions better to upstream settings
    * profiles: cleanup ModemManager actions
    * profiles: sync hp.driveguard.* actions with upstream settings
    * profiles: gnome settings, xfce backlight-helper actions: sanitize settings
    * profiles: cleanup dead and sync existing org.gnome actions
    * profiles: sync timedate1 actions in restrictive profile with standard profile
    * profiles: remove dead sytemd1.bus-access action
    * profiles: remove dead org.kde actions
    * profiles: make org.kde settings no weaker than upstream settings
    * profiles: remove leftover dead yast actions
    * profiles: remove dead yast.modules.yapi actions
    * profiles: remove dead yast.modules.ysr actions
    * profiles: remove dead yast.modules actions
    * profiles: remove dead yast.module-manager and yast.scr actions
    * profiles: remove dead upower actions
    * profiles: add missing udisks2 actions in restrictive profile
    * profiles: remove dead udisks (1) actions
    * profiles: remove dead policykit.lockdown action, harmonize .exec setting
    * profiles: adjust RealtimeKit actions to upstream settings
    * profiles: remove dead SuSEfirewall2 zone switcher action
    * profiles: remove dead backupmanager action
    * profiles: remove dead smpppd action
    * profiles: remove dead consolekit actions
    * profiles: polkit example action run-frobnicate: adjust to upstream settings
    * profiles: remove dead org.gnome.policykit.examples.* actions
    * profiles: remove unused pulseaudio realtime actions
    * profiles: cleanup PackageKit actions
    * profiles: cleanup gnome-settings-daemon actions
    * profiles: cleanup network manager actions
    * profiles: cleanup outdated PolicyKit actions
* Tue Nov 03 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201103.994a5ed:
    * udisks2: rename of manage-led action to match upstream changes (bsc#1178321)
* Mon Nov 02 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201030.d1b5d8b:
    * whitelisting of GNOME malcontent parental controls (bsc#1177974)
    * restrictive profile: fix conflicting duplicate action org.kde.powerdevil.backlighthelper.setbrightness
    * restrictive profile: fix conflicting duplicate action org.freedesktop.color-manager.delete-profile
    * profiles: fix conflicting duplicate action org.kde.powerdevil.backlighthelper.brightness
    * profiles: remove duplicate actions with same authentication settings
    * tools: new script to cleanly remove duplicate actions
* Mon Oct 19 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201012.1df5a0d:
    * whitelist new plasma5-disks smartmon helper (bsc#1176742)
* Thu Oct 01 2020 matthias.gerstner@suse.com
  - Update to version 1550+20201001.cb7020b:
    * Whitelist newly added powerdevil battery charge threshold actions (bsc#1176474)
* Thu Sep 10 2020 matthias.gerstner@suse.com
  - Update to version 1550+20200909.647e56f:
    * whitelist org.freedesktop.network1.forcerenew (bsc#1176215)
* Wed Jul 15 2020 matthias.gerstner@suse.com
  - Update to version 1550+20200715.6ddc764:
    * whitelist libvirt-dbus rule file (bsc#1173093)
* Tue Jun 30 2020 jsegitz@suse.com
  - Update to version 1550+20200630.e9f182b:
    * whitelist io.veyon.pkexec.veyon-configurator (bsc#1172318)
* Wed May 20 2020 jsegitz@suse.de
  - Update to version 1550+20200520.d0dc67f:
    * whitelist org.cockpit-project.cockpit.root-bridge (bsc#1169614)
* Mon Apr 20 2020 matthias.gerstner@suse.com
  - Update to version 1550+20200417.940923e:
    * packagekit: allow system-sources-refresh w/o password entry (bsc#1169540)
* Wed Mar 25 2020 malte.kraus@suse.com
  - Update to version 1550+20200325.f1362c4:
    * whitelist chvt action in logind (bsc#1167542)
* Tue Mar 10 2020 matthias.gerstner@suse.com
  - Update to version 1550+20200310.cdde967:
    * profiles: whitelist new timeshift pkexec actions (bsc#1165436)
    * polkit profile: remove trailing '###' lines
* Fri Feb 28 2020 Johannes Segitz <jsegitz@suse.de>
  - Going back to old versioning scheme as only %suse_version doesn't
    carry enough information. Keeping the git hash would be enough,
    but with that we can't ensure that versions increase. So we keep
    also the timestamp and prefix it with the current %suse_version
* Wed Feb 19 2020 Johannes Segitz <jsegitz@suse.de>
  - Change the package version to match %suse_version. The current
    versioning was obviously based on this at one time. Dropping date
    and git commit information since it's meaningless.
  - Removed author information from the description
  - Removed conditional Requires: for libmozjs185-1_0 for old
    distributions
* Thu Feb 13 2020 matthias.gerstner@suse.com
  - Update to version 13.2+20200213.f716f0a:
    * Revert "whitelist lutris (bsc#1161650)"
* Thu Feb 06 2020 matthias.gerstner@suse.com
  - Update to version 13.2+20200206.331ac1d:
    * whitelist lutris (bsc#1161650)
* Tue Jan 21 2020 matthias.gerstner@suse.com
  - Update to version 13.2+20200121.bfca858:
    * systemd networkd incremental polkit rules (bsc#1161328)
* Thu Jan 16 2020 jsegitz@suse.de
  - Update to version 13.2+20200116.0f7fd4b:
    * Previous submission didn't contain all necessary files (bsc#1161091)
* Thu Jan 16 2020 jsegitz@suse.de
  - Update to version 13.2+20200116.3c654b5:
    * flatpak: Add additional entry to whitelist to reflect added
      override-parental-controls entry (bsc#1161091)
* Thu Jan 16 2020 malte.kraus@suse.com
  - Update to version 13.2+20200116.c29a8c3:
    * whitelist new sysprof3 polkit rule org.gnome.sysprof3.profile
      (bsc#1151418)
* Tue Dec 10 2019 matthias.gerstner@suse.com
  - Update to version 13.2+20191210.15c9882:
    * polkit-rules-whitelist: adjust whitelist format to new rpmlint-checks logic
* Thu Nov 28 2019 malte.kraus@suse.com
  - Update to version 13.2+20191128.c2eb3f7:
    * fix ModemManager1.Time whitelisting (bsc#1156961)
* Fri Nov 22 2019 malte.kraus@suse.com
  - Update to version 13.2+20191122.eb9cc80:
    * whitelist org.freedesktop.ModemManager1.Modem.Time (bsc#1156961)
* Tue Nov 19 2019 matthias.gerstner@suse.com
  - Update to version 13.2+20191119.a36b458:
    * kcm_sddm: incremental addition of new rules (bsc#1145182)
* Tue Oct 15 2019 jsegitz@suse.de
  - Update to version 13.2+20191015.280c25b:
    * gnome-initial-session: whitelist polkit rules in
      20-gnome-initial-setup.rules (bsc#1125432)
* Mon Oct 14 2019 malte.kraus@suse.com
  - Update to version 13.2+20191014.aad0cdf:
    * Networkd package actually ended up beeing called
      "sytemd-network" (#11, boo#1153885)
* Thu Sep 19 2019 jsegitz@suse.de
  - Update to version 13.2+20190919.a656be4:
    * transition networkd rules to subpackage
* Thu Sep 05 2019 malte.kraus@suse.com
  - Update to version 13.2+20190905.0016c47:
    * whitelist new systemd-resolved actions (bnc#1149216)
* Tue Aug 27 2019 malte.kraus@suse.com
  - Update to version 13.2+20190827.0cc2a82:
    * make new systemd rules more restrictive (boo#1146300,
      boo#1145639)
* Fri Aug 23 2019 lnussel@suse.de
  - Update to version 13.2+20190823.a5f89c3:
    * systemd-networkd (boo#1146300)
    * systemd-portabled (boo#1145639)
* Tue Aug 06 2019 jsegitz@suse.de
  - Update to version 13.2+20190806.841a06b:
    * libvirt polkit actions: Additional no:no:no action (bsc#1144077)
* Thu Aug 01 2019 matthias.gerstner@suse.com
  - Update to version 13.2+20190801.f0c6234:
    * calamares: whitelist pkexec run as root in X11 action
    * mousepad: whitelisting of pkexec action (bsc#1143216)
* Thu Jul 11 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190711.953db4f:
    * libvirt: add a couple of additional polkit actions (bsc#1140151)
* Thu Jul 04 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190704.dfb36ad:
    * libvirt rules: fix whitelisting (bsc#1125314)
* Wed Jul 03 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190703.9a076dc:
    * libvirt polkit actions: whitelisting of incremental no:no:no actions (bsc#1140151)
    * backintime-qt: removal of old rule name (bsc#1133680)
* Mon May 27 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190527.64d9813:
    * polkit-rules-whitelist.json: fix syntax error
* Thu May 23 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190523.efe368f:
    * polkit profiles: whitelist lightdm-gtk-greeter-settings (bsc#1135695)
* Mon May 20 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190520.a67a2af:
    * polkit rules: whitelist libvirt (bsc#1125314)
    * rules for systemd org.freedesktop.login1.set-reboot* (bsc#1133843)
* Tue May 07 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190507.75c6d67:
    * fwupd: add one more follow-up rules for bsc#1133082
* Fri May 03 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190503.00651e7:
    * tuned: add new plugin doc actions (bsc#1131858)
* Thu May 02 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190502.37ad64c:
    * fwupd: add incrementally added polkit actions (bsc#1133082)
* Tue Apr 30 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190430.a4836d6:
    * backintime: add renamed gui pkexec action (bsc#1133680)
    * backintime: add restrictive config, too
* Thu Apr 11 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190411.5775d58:
    * gamemode: additional polkit action for gpuclockctl (bsc#1129967)
    * NetworkManager: remove wrongly named wifi-scan rule (bsc#1128560)
* Fri Mar 15 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190315.3da47ba:
    * rules.d whitelist: add systemd-network (bsc#1125438) and flatpak entries (bsc#984817)
* Fri Mar 15 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190315.b904805:
    * polkit privs whitelisting: add renamed wifi-scan -> wifi.scan action (bsc#1128560)
* Wed Mar 06 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190306.b56445c:
    * whitelisting: systemd org.freedesktop.hostname1.get-product-uuid
* Tue Feb 26 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190226.f884108:
    * polkit-rules-whitelist: adjust format to better support follow-up audits
      (bsc#1125314)
* Mon Feb 25 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190225.0ef150d:
    * relax change-own-user-data action in the restrictive profile (bsc#1125110)
* Wed Feb 13 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190213.2f39f9b:
    * add whitelisting file for files installed in polkit-1/rules.d * (bsc#1125314)
    * the new whitelisting is packaged in a separate subpackage, because it is
      not needed for normal operation, only during OBS build time for rpmlint to
      find it.
* Thu Feb 07 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190207.4d86620:
    * add manage-vdo privilege of udisks2 (bsc#1123747)
    * further improve documentation in /etc/polkit-default-privs.local
    * sort the output rules in /etc/polkit-1/rules.d/90-default-privs to
      make the runs reproducible. (https://github.com/openSUSE/polkit-default-privs/issues/3)
* Wed Feb 06 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190207.9bb8655:
    * man pages: extend documentation to better describe syntax and profiles
    * install README.md as part of package documentation
    * set_polkit_default_privs: add warning about unknown profiles
    * introduce a new polkit-default-privs easy profile
* Wed Jan 30 2019 opensuse-packaging@opensuse.org
  - Update to version 13.2+20190130.b2262b2:
    * Whitelist additional Flatpak action metadata-update (bsc#1123653)
    * soften authentication requirements for flatpak's appstream-update (bsc#1122116)
* Mon Jan 28 2019 opensuse-packaging@opensuse.org
  - whitelist newly introduced network manager wifi-scan action (bsc#1122262)
* Fri Jan 25 2019 bjorn.lie@gmail.com
  - Be explicit in service file about master branch is the one in use
    for tarball generation via revision parameter.
* Mon Jan 14 2019 matthias.gerstner@suse.com
  - introduce service file for pulling new releases from git upstream instead of
    using the old mkchanges script from the git repo (bsc#1121841). This changes
    the version number of the package but nothing else.
* Thu Jan 03 2019 matthias.gerstner@suse.com
  - luckybackup: initial whitelisting of polkit pkexec action (bsc#1120403)
* Fri Dec 21 2018 matthias.gerstner@suse.com
  - boltd: initial whitelisting of polkit actions (bsc#1119975)
* Tue Dec 11 2018 matthias.gerstner@suse.com
  - tuned: add new logging actions (bsc#1118117)
* Tue Nov 27 2018 matthias.gerstner@suse.com
  - chkstat: adjust DO NOT EDIT banner in generated rules file (bsc#1099754)
* Thu Nov 15 2018 matthias.gerstner@suse.com
  - spice-gtk: relax lowlevelusbaccess requirements (bsc#1083025). Users already
    need to be in the kvm group to access the setuid binary anyways.
* Thu Nov 15 2018 matthias.gerstner@suse.com
  - blueman: relax standard profile rules, drop unneeded bluez.config rule (bsc#1083066)
* Wed Sep 05 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add renamed libvirt rules (bsc#1106813)
* Thu Aug 09 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add meson install action (bsc#1103811)
* Wed Aug 08 2018 matthias.gerstner@suse.com
  - polkit-default-privs: fix syntax error in gamemode whitelisting (bsc#1104135)
* Mon Jul 30 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist gamemode pkexec action (bsc#1093979)
* Fri Jul 27 2018 matthias.gerstner@suse.com
  - polkit-default-privs: fix switchboard-plug* whitelisting. An error slipped
    in that causes `set_polkit_default_privs` to print an error message.
* Fri Jul 06 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist incremental libvirt actions (bnc#1100328)
  - polkit-default-privs: group together the large blocks of libvirt rules
* Thu Jul 05 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelist switchboard-plug-* (bsc#1088472)
* Fri Jun 22 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add cinnamon-control-center datetime action (bnc#1090371)
* Thu Jun 21 2018 matthias.gerstner@suse.com
  - polkit-default-privs: add lightdm rules (bnc#1089436)
* Wed Jun 13 2018 matthias.gerstner@suse.com
  - polkit-default-privs: added liblxqt backlight action (bnc#1092192)
* Tue Jun 12 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelisting new resolve1 action of systemd (bnc#1096907)
  - polkit-default-privs: harmonized systemd comments a bit
* Thu Jun 07 2018 matthias.gerstner@suse.com
  - polkit-default-privs: new action change-own-password for accountsservice (bnc#1088780)
* Tue Apr 24 2018 matthias.gerstner@suse.com
  - polkit-default-privs: whitelisting renamed kalarm polkit actions (bnc#1087714)
* Wed Apr 11 2018 matthias.gerstner@suse.com
  - polkit-default-privs: additional tuned rules (bnc#1088648)
* Wed Mar 28 2018 matthias.gerstner@suse.com
  - polkit-default-privs: some more amnesty whitelisting of untracked
    privileges. Two more packages are affected:
    - bleachbit (bsc#1087326)
    - systemd, systemd-mini (bsc#1087328)
* Mon Mar 12 2018 matthias.gerstner@suse.com
  - polkit-default-privs: mass amnesty whitelisting of untracked privileges. See
    https://lists.opensuse.org/opensuse-factory/2018-02/msg01044.html for
    rationale. This allows existing packages in Factory to continue building
    after the tighter rpmlint-Factory checks become effective. Following
    packages are affected:
    - blueman (bsc#1083066)
    - cinnamon settings-daemon (bnc#1083067)
    - connman (bsc#1083069)
    - flatpak (bsc#984817)
    - fwupd (bsc#1083022)
    - gsmartcontrol (bsc#1084693)
    - gvfs (bsc#1073214)
    - laptop-mode-tools (bsc#1084695)
    - mate-system-monitor (bsc#1084701)
    - nemo (bsc#1084702)
    - nemo-extensions (bsc#1084703)
    - PackageKit (bnc#993505)
    - pantheon-files (bsc#1084704)
    - scap-workbench (bsc#1084706)
    - spice-gtk (bsc#1083025)
    - sysprof (bsc#1083055)
* Wed Jan 31 2018 krahmer@suse.com
  - polkit-default-privs: adding more NM actions (bsc#1077504)
* Wed Jan 17 2018 krahmer@suse.com
  - polkit-default-privs: adding new udisks2 rules (bsc#1073216)

Files

/etc/polkit-1/rules.d/90-default-privs.rules
/sbin/chkstat-polkit
/sbin/set_polkit_default_privs
/usr/etc/polkit-default-privs
/usr/etc/polkit-default-privs/local.template
/usr/etc/polkit-default-privs/profiles
/usr/etc/polkit-default-privs/profiles/easy
/usr/etc/polkit-default-privs/profiles/restrictive
/usr/etc/polkit-default-privs/profiles/standard
/usr/share/doc/packages/polkit-default-privs
/usr/share/doc/packages/polkit-default-privs/README.md
/usr/share/fillup-templates/sysconfig.security-polkit_default_privs
/usr/share/man/man5/polkit-default-privs.5.gz
/usr/share/man/man8/set_polkit_default_privs.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Nov 23 23:17:31 2021