polkit-whitelisting-13.2+20210813.1c5fb05-3.3.1 >  A a&Rp9|k-7믖bytʨ3妕 ՃRw&wD}W }kiO%h \TS2-H>N-|nr{`ZJY`qWi65kr(PO4LVCcT]d>wUWTU/GXլX}|SnܤQ^q0NouBKmQr} ~ lp;<,?<d, 2 l8<DHa      M PTY^#(?8He9e:4eF9G:H:I: X:Y:\:0]:4^:Pb:Vc:d;e;f;l;u;v;z;;;;<Cpolkit-whitelisting13.2+20210813.1c5fb053.3.1Static polkit whitelists for processing by rpmlint-checksThis package contains static polkit whitelistings for polkit Java Script rule files. The whitelistings will be processed by rpmlint-checks to determine valid rule file installations by other packages.a&1sheep63 SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-laterhttps://www.suse.com/Productivity/Securityhttp://github.com/openSUSE/polkit-default-privs.gitlinuxnoarch a&0e9c3caba65fec29055be1af896d838e70c748815a4df02192fc70d5b171dc577rootrootpolkit-default-privs-13.2+20210813.1c5fb05-3.3.1.src.rpmpolkit-whitelisting    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3a^a_м@_s!_q@^@]߶]]]p]e@]_@]Ik]B@]'$]@]\@\@\\s@\-@\\8\,@\\\@\u*@\s\d\\\Z@\Q\N\J@\@[,[+@[!@[[@Z@ZZZkZqZ_:Z7Z@Z Z@Y|YY@Yn@YqYoIYZ1YI@Y.X@X@Xe@X*XF@W@W֘W^@W4W V3V@V]V@UJ@UuU_@U7@U4@U%@U#TD@TZ@T5TxcT\@TWn@matthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comjsegitz@suse.comjsegitz@suse.commatthias.gerstner@suse.commalte.kraus@suse.commalte.kraus@suse.comjsegitz@suse.commalte.kraus@suse.commalte.kraus@suse.comlnussel@suse.dejsegitz@suse.dematthias.gerstner@suse.comopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgopensuse-packaging@opensuse.orgbjorn.lie@gmail.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comkrahmer@suse.comkrahmer@suse.commatthias.gerstner@suse.comkrahmer@suse.commatthias.gerstner@suse.comrbrown@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commatthias.gerstner@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commeissner@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commeissner@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commeissner@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.comkrahmer@suse.commeissner@suse.comkrahmer@suse.com- Update to version 13.2+20210813.1c5fb05: * malcontent: loosen restrictive ReadOwn actions to prevent spurious auth requests (#56) (#57)- Update to version 13.2+20210811.0c80127: * whitelisting of GNOME malcontent parental controls (bsc#1177974) (#55)- Update to version 13.2+20201209.96f7b21: * libvirt: allow the active session to create read-only connections (bsc#1179126)- Update to version 13.2+20200929.fb820eb: * systemd networkd incremental polkit rules (bsc#1161328) * whitelist chvt action in logind (bsc#1167542)- Update to version 13.2+20200928.bfceddc: * whitelist org.freedesktop.network1.forcerenew (bsc#1176215)- Update to version 13.2+20200421.207b724: * packagekit: allow system-sources-refresh w/o password entry (bsc#1169540)- Update to version 13.2+20191128.c2eb3f7: * fix ModemManager1.Time whitelisting (bsc#1156961)- Update to version 13.2+20191122.eb9cc80: * whitelist org.freedesktop.ModemManager1.Modem.Time (bsc#1156961) * kcm_sddm: incremental addition of new rules (bsc#1145182)- Update to version 13.2+20191015.280c25b: * gnome-initial-session: whitelist polkit rules in 20-gnome-initial-setup.rules (bsc#1125432) * Networkd rules whitelisted for package "sytemd-network"- Update to version 13.2+20190905.0016c47: * whitelist new systemd-resolved actions (bnc#1149216)- Update to version 13.2+20190827.0cc2a82: * make new systemd rules more restrictive (boo#1146300, boo#1145639)- Update to version 13.2+20190823.a5f89c3: * systemd-networkd (boo#1146300) * systemd-portabled (boo#1145639)- Update to version 13.2+20190806.841a06b: * libvirt polkit actions: Additional no:no:no action (bsc#1144077)- Update to version 13.2+20190801.f0c6234: * calamares: whitelist pkexec run as root in X11 action * mousepad: whitelisting of pkexec action (bsc#1143216)- Update to version 13.2+20190711.953db4f: * libvirt: add a couple of additional polkit actions (bsc#1140151)- Update to version 13.2+20190704.dfb36ad: * libvirt rules: fix whitelisting (bsc#1125314)- Update to version 13.2+20190703.9a076dc: * libvirt polkit actions: whitelisting of incremental no:no:no actions (bsc#1140151) * backintime-qt: removal of old rule name (bsc#1133680)- Update to version 13.2+20190527.64d9813: * polkit-rules-whitelist.json: fix syntax error- Update to version 13.2+20190523.efe368f: * polkit profiles: whitelist lightdm-gtk-greeter-settings (bsc#1135695)- Update to version 13.2+20190520.a67a2af: * polkit rules: whitelist libvirt (bsc#1125314) * rules for systemd org.freedesktop.login1.set-reboot* (bsc#1133843)- Update to version 13.2+20190507.75c6d67: * fwupd: add one more follow-up rules for bsc#1133082- Update to version 13.2+20190503.00651e7: * tuned: add new plugin doc actions (bsc#1131858)- Update to version 13.2+20190502.37ad64c: * fwupd: add incrementally added polkit actions (bsc#1133082)- Update to version 13.2+20190430.a4836d6: * backintime: add renamed gui pkexec action (bsc#1133680) * backintime: add restrictive config, too- Update to version 13.2+20190411.5775d58: * gamemode: additional polkit action for gpuclockctl (bsc#1129967) * NetworkManager: remove wrongly named wifi-scan rule (bsc#1128560)- Update to version 13.2+20190315.3da47ba: * rules.d whitelist: add systemd-network (bsc#1125438) and flatpak entries (bsc#984817)- Update to version 13.2+20190315.b904805: * polkit privs whitelisting: add renamed wifi-scan -> wifi.scan action (bsc#1128560)- Update to version 13.2+20190306.b56445c: * whitelisting: systemd org.freedesktop.hostname1.get-product-uuid- Update to version 13.2+20190226.f884108: * polkit-rules-whitelist: adjust format to better support follow-up audits (bsc#1125314)- Update to version 13.2+20190225.0ef150d: * relax change-own-user-data action in the restrictive profile (bsc#1125110)- Update to version 13.2+20190213.2f39f9b: * add whitelisting file for files installed in polkit-1/rules.d * (bsc#1125314) * the new whitelisting is packaged in a separate subpackage, because it is not needed for normal operation, only during OBS build time for rpmlint to find it.- Update to version 13.2+20190207.4d86620: * add manage-vdo privilege of udisks2 (bsc#1123747) * further improve documentation in /etc/polkit-default-privs.local * sort the output rules in /etc/polkit-1/rules.d/90-default-privs to make the runs reproducible. (https://github.com/openSUSE/polkit-default-privs/issues/3)- Update to version 13.2+20190207.9bb8655: * man pages: extend documentation to better describe syntax and profiles * install README.md as part of package documentation * set_polkit_default_privs: add warning about unknown profiles * introduce a new polkit-default-privs easy profile- Update to version 13.2+20190130.b2262b2: * Whitelist additional Flatpak action metadata-update (bsc#1123653) * soften authentication requirements for flatpak's appstream-update (bsc#1122116)- whitelist newly introduced network manager wifi-scan action (bsc#1122262)- Be explicit in service file about master branch is the one in use for tarball generation via revision parameter.- introduce service file for pulling new releases from git upstream instead of using the old mkchanges script from the git repo (bsc#1121841). This changes the version number of the package but nothing else.- luckybackup: initial whitelisting of polkit pkexec action (bsc#1120403)- boltd: initial whitelisting of polkit actions (bsc#1119975)- tuned: add new logging actions (bsc#1118117)- chkstat: adjust DO NOT EDIT banner in generated rules file (bsc#1099754)- spice-gtk: relax lowlevelusbaccess requirements (bsc#1083025). Users already need to be in the kvm group to access the setuid binary anyways.- blueman: relax standard profile rules, drop unneeded bluez.config rule (bsc#1083066)- polkit-default-privs: add renamed libvirt rules (bsc#1106813)- polkit-default-privs: add meson install action (bsc#1103811)- polkit-default-privs: fix syntax error in gamemode whitelisting (bsc#1104135)- polkit-default-privs: whitelist gamemode pkexec action (bsc#1093979)- polkit-default-privs: fix switchboard-plug* whitelisting. An error slipped in that causes `set_polkit_default_privs` to print an error message.- polkit-default-privs: whitelist incremental libvirt actions (bnc#1100328) - polkit-default-privs: group together the large blocks of libvirt rules- polkit-default-privs: whitelist switchboard-plug-* (bsc#1088472)- polkit-default-privs: add cinnamon-control-center datetime action (bnc#1090371)- polkit-default-privs: add lightdm rules (bnc#1089436)- polkit-default-privs: added liblxqt backlight action (bnc#1092192)- polkit-default-privs: whitelisting new resolve1 action of systemd (bnc#1096907) - polkit-default-privs: harmonized systemd comments a bit- polkit-default-privs: new action change-own-password for accountsservice (bnc#1088780)- polkit-default-privs: whitelisting renamed kalarm polkit actions (bnc#1087714)- polkit-default-privs: additional tuned rules (bnc#1088648)- polkit-default-privs: some more amnesty whitelisting of untracked privileges. Two more packages are affected: - bleachbit (bsc#1087326) - systemd, systemd-mini (bsc#1087328)- polkit-default-privs: mass amnesty whitelisting of untracked privileges. See https://lists.opensuse.org/opensuse-factory/2018-02/msg01044.html for rationale. This allows existing packages in Factory to continue building after the tighter rpmlint-Factory checks become effective. Following packages are affected: - blueman (bsc#1083066) - cinnamon settings-daemon (bnc#1083067) - connman (bsc#1083069) - flatpak (bsc#984817) - fwupd (bsc#1083022) - gsmartcontrol (bsc#1084693) - gvfs (bsc#1073214) - laptop-mode-tools (bsc#1084695) - mate-system-monitor (bsc#1084701) - nemo (bsc#1084702) - nemo-extensions (bsc#1084703) - PackageKit (bnc#993505) - pantheon-files (bsc#1084704) - scap-workbench (bsc#1084706) - spice-gtk (bsc#1083025) - sysprof (bsc#1083055)- polkit-default-privs: adding more NM actions (bsc#1077504)- polkit-default-privs: adding new udisks2 rules (bsc#1073216)- polkit-default-privs: added connectivity-check for NetworkManager (bnc#1072702)- polkit-default-privs: adding new sddm kcm actions (bsc#1065563)- Fixed usage of %_fillupdir macro, needs to be passed to `make install` such that the file is installed into the right location.- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- polkit-default-privs: adding flatpak (bsc#1064011) - polkit-default-privs: adding connman (bsc#1057697)- polkit-default-privs: adding deja-dup (bsc#1058935)- polkit-default-privs: adding fwupd (bsc#932807)- adding more flatpak rules (bsc#1012961)- Added new tuned method verify_profile_ignore_missing (bnc#1048961)- polkit-default-privs: adding new realmd action (bsc#1048025)- polkit-default-privs: adjusting brltty (bsc#967436)- relaxing action "org.opensuse.cupspkhelper.mechanism.job-edit" (bsc#827331)- added polkit rules for backintime (bnc#1007723, bnc#1032717) - relaxing powerdevil rules (bsc#1026038)- added polkit rules for renamed kcmwallet -> kcmwallet5 (bsc#1033296)- added polkit rules for tuned (bsc#1007279)- polkit-default-privs: adding blueman actions (bsc#987141)- adding kde powerdevil gpu helper (bsc#1019644)- adding org.freedesktop.login1.set-self-linger (bsc#1009468)- add flatpak privileges, but currently auth_admin currently (bsc#984817)- polkit-default-privs: cleanups as per discussion with Ludwig - polkit-default-privs: adding rules for sysprof (bsc#996111) and networkmanager (bsc#996110)- polkit-default-privs: adding ModemManager (bsc#976945)- added brltty (bsc#967436)- add importd privs as default tracked (bsc#964935)- polkit-default-privs: relaxing firewalld polkit rule for desktop (bsc#971580)- polkit-default-privs: adding libvirt action ids (bsc#959297)- polkit-default-privs: Adding new systemd actions (bsc#955626) - polkit-default-privs: create files with consistent permissions- polkit-default-privs: adding rules for cinnamon settings-daemon (bsc#951830) - polkit-default-privs: relaxing some ModemManager rules to avoid typing password after screenlock/hibernate (bsc#948728)- polkit-default-privs: PackageKit (bnc#929212)- polkit-default-privs: adding netvisix rules (bsc#930195)- instead of auth-admin, disallow colord management for inactive and other users, so they do not get root password popups bsc#918594- polkit-default-privs: adding gnome-control-center actions (bnc#927508) adding realmd actions (bnc#916767)- polkit-default-privs: rename of powerdevil action-names (bnc#927275)- polkit-default-privs: add urfkill (bnc#926288) polkit action- polkit-default-privs: added gnome-multi-writer actions (bnc#924062)- adding storaged rules (bnc#915770)- adding KDE5 powerdevil rules (bnc#912121)- added firewalld (bnc#907625) polkit actions- polkit-default-privs: adding _keep to ModemManager rules (bnc#900813)- Add org.kde.kcontrol.kcmsddm.save (bsc#904313)- polkit-default-privs: relaxing pcsc rules (bsc#864178)sheep63 162988241713.2+20210813.1c5fb05-3.3.1polkit-rules-whitelist.json/etc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:20949/SUSE_SLE-15-SP3_Update/2d8e7db4f939027099ceeaecb0f9ab76-polkit-default-privs.SUSE_SLE-15-SP3_Updatecpioxz5noarch-suse-linuxASCII texte>5'#&utf-8ca92b0b6716ba44691aa674c7ef3bb9b7c84c576c67efae30543c7fc11c9f022?P7zXZ !t/ 4] crv(vX0&G1!Xgb=>+qׯ6E\Ga%r7|w0)"<9(jT7;z-*Oխv)PKQG0fvHGXSڲpfʖϥ°:9 a${l2K֪z.%?O$b_BtOzȶŻ#1\ ̧}ƶu/Tox nDiƖM[hWp{US7:Zw2ΈtxW$nsǐ1r.VtH6 f[_5x靀+X&{,lH2#*{vaM8OGfJXƷ7O^h(qpls9'b[Oul8B I&{G{Ůq@îp=K0lv[A&l>wNؖOaߘOem?]).)05 WYK%0Gՠ֏A];_C1e^HZAwl||M ВnECP#5E8=L.Ur[rQ?*WsX-3SRM3ϲ!d[= G6\@Ӷ)0Mq0,-,cĵ,ҁy$j޳h++Hm"GM'a.e|ʹGYp-lיc_^$'lde%9aNsrl̖(ⷸ׃n Mo7k:b%!AmeGv5a?/[u \Ϯ ";:Yܮм!@8.aJj)- Ux](XjC_Xvz*~ *՗ »lix=bGRQ*`CSJ!'""WKC]F.ܶ YZ