Hello Philip, or anyone else affected, Accepted policykit-1 into oracular-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/policykit-1/124-2ubuntu1.24.10.2 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- oracular to verification-done-oracular. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed-oracular. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Tags removed: verification-failed ** Tags added: verification-needed ** Tags removed: verification-failed-noble ** Tags added: verification-needed-noble -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to policykit-1 in Ubuntu. https://bugs.launchpad.net/bugs/2089145 Title: Backport patch to read actions from /etc and /run Status in policykit-1 package in Ubuntu: Fix Released Status in policykit-1 source package in Noble: Fix Committed Status in policykit-1 source package in Oracular: Fix Committed Bug description: Hey! I would like to request a SRU of the following upstream PR for Noble. https://github.com/polkit-org/polkit/pull/499 I have applied this to ubuntu/noble-updates and produced a new patch that is attached with identical changes. The PR does not apply directly due to mismatch in a couple of lines that differ from upstream. [ Impact ] On Ubuntu Core we've had not historically carried polkit before, it has only recently been decided to include polkit into the Core24 base (and future bases), so this has not been an issue up until now. The decision changed as Core Desktop is moving its architecture to using the official core24 base snap as their base for all the desktop snaps. Core Desktop needs to use polkit for the desktop/user environment, but this brings us to this request. The polkit version currently in Noble does only support reading actions from /usr/share/polkit-1/actions, but this is a protected read-only path on Ubuntu Core. We could change this and map this path into the writable area, but this would bring us into transition issues when/if people want to migrate from core24 to core26 (i.e remodelling), where newer polkit supports reading actions from /etc. This would leave files in a weird state moving away from mapping that path, to the more appropriate /etc. The more sustainable plan is to SRU the mentioned patch, allowing polkit to read actions from /etc, and would provide us with more consistent behaviour moving forward with newer bases, that may contain newer polkit versions that naturally support /etc. [ Test plan ] 1. Install the package from proposed. 2. If no authentication agent is running, start one: /usr/lib/policykit-1-gnome/polkit-gnome-authentication-agent 3. Execute 'firewall-cmd --list-services'. A dialogue should appear, input your password and see that command returns normally, in a unaltered setup it says dhcpv6-client ssh. [ Where problems could occur ] * Think about what the upload changes in the software. Imagine the change is wrong or breaks something else: how would this show up? Since this is about loading actions, any issues resulting from this change should show up immediately by identifying whether the actions are loaded. * It is assumed that any SRU candidate patch is well-tested before upload and has a low overall risk of regression, but it's important to make the effort to think about what ''could'' happen in the event of a regression. In case of a regression, actions from /usr/share/polkit-1/actions would not be loaded either. * This must never be "None" or "Low", or entirely an argument as to why your upload is low risk. I would indicate this is a 'Medium' in risk, as this code change is very isolated. There is no functional or behavioural changes. This is specifically the places we load configuration / actions from. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/2089145/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp