The issue seems to be that the change is incorrectly handling symlinked
actions, I've reported an upstream issue on https://github.com/polkit-
org/polkit/issues/530

** Bug watch added: github.com/polkit-org/polkit/issues #530
   https://github.com/polkit-org/polkit/issues/530

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/2089145

Title:
  Backport patch to read actions from /etc and /run

Status in policykit-1 package in Ubuntu:
  Fix Released
Status in policykit-1 source package in Noble:
  Fix Committed
Status in policykit-1 source package in Oracular:
  Fix Committed

Bug description:
  Hey!

  I would like to request a SRU of the following upstream PR for Noble.

  https://github.com/polkit-org/polkit/pull/499

  I have applied this to ubuntu/noble-updates and produced a new patch
  that is attached with identical changes. The PR does not apply
  directly due to mismatch in a couple of lines that differ from
  upstream.

  
  [ Impact ]

  On Ubuntu Core we've had not historically carried polkit before, it
  has only recently been decided to include polkit into the Core24 base
  (and future bases), so this has not been an issue up until now. The
  decision changed as Core Desktop is moving its architecture to using
  the official core24 base snap as their base for all the desktop snaps.

  Core Desktop needs to use polkit for the desktop/user environment, but
  this brings us to this request.

  The polkit version currently in Noble does only support reading
  actions from /usr/share/polkit-1/actions, but this is a protected
  read-only path on Ubuntu Core. We could change this and map this path
  into the writable area, but this would bring us into transition issues
  when/if people want to migrate from core24 to core26 (i.e
  remodelling), where newer polkit supports reading actions from /etc.
  This would leave files in a weird state moving away from mapping that
  path, to the more appropriate /etc.

  The more sustainable plan is to SRU the mentioned patch, allowing
  polkit to read actions from /etc, and would provide us with more
  consistent behaviour moving forward with newer bases, that may contain
  newer polkit versions that naturally support /etc.

  
  [ Where problems could occur ]

   * Think about what the upload changes in the software. Imagine the
     change is wrong or breaks something else: how would this show up?

  Since this is about loading actions, any issues resulting from this
  change should show up immediately by identifying whether the actions
  are loaded.

   * It is assumed that any SRU candidate patch is well-tested before
     upload and has a low overall risk of regression, but it's important
     to make the effort to think about what ''could'' happen in the event
     of a regression.

  In case of a regression, actions from /usr/share/polkit-1/actions
  would not be loaded either.

   * This must never be "None" or "Low", or entirely an argument as to why
     your upload is low risk.

  I would indicate this is a 'Medium' in risk, as this code change is
  very isolated. There is no functional or behavioural changes. This is
  specifically the places we load configuration / actions from.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/2089145/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to