From unknown Fri Mar 29 05:08:30 2024 X-Loop: owner@bugs.devuan.org Subject: bug#268: mmhhh Reply-To: KatolaZ , 268@bugs.devuan.org Resent-From: KatolaZ Resent-To: devuan-bugs@lists.dyne.org Resent-CC: owner@bugs.devuan.org Resent-Date: Sat, 08 Dec 2018 09:54:18 UTC Resent-Message-ID: Resent-Sender: owner@bugs.devuan.org X-Devuan-PR-Message: report 268 X-Devuan-PR-Package: policykit-1 X-Devuan-PR-Keywords: Received: via spool by 268-submit@bugs.devuan.org id=B268.154426284012115 (code B ref 268); Sat, 08 Dec 2018 09:54:18 UTC Received: (at 268) by bugs.devuan.org; 8 Dec 2018 09:54:00 +0000 Delivered-To: devuanbugs@dyne.org Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for (single-drop); Sat, 08 Dec 2018 10:54:00 +0100 (CET) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: katolaz@freaknet.org) with ESMTPSA id 743AFF60A39 Resent-From: Enzo Resent-Date: Sat, 8 Dec 2018 10:56:34 +0100 Resent-Message-ID: <20181208095634.cj5i2g62e3tefxhb@katolaz.homeunix.net> Resent-To: 269@bugs.devuan.org Date: Sat, 8 Dec 2018 10:17:18 +0100 From: KatolaZ To: 268@bugs.devuan.org Message-ID: <20181208091718.je273iuhnkih7wux@katolaz.homeunix.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="inqsdvv7znhsuzot" Content-Disposition: inline User-Agent: NeoMutt/20170113 (1.7.2) X-Spam-Status: No, score=-0.8 required=5.0 tests=ALL_TRUSTED, HEADER_FROM_DIFFERENT_DOMAINS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org --inqsdvv7znhsuzot Content-Type: text/plain; charset=us-ascii Content-Disposition: inline There is no need to become root in order to use `service`: $ /usr/sbin/service nginx status [ ok ] nginx is running. $ Even with a user with id larger than 4000000000: $ sudo -u testpolkit /usr/sbin/service nginx stop [....] Stopping nginx: nginxstart-stop-daemon: warning: failed to kill 2509: Operation not permitted . ok $ That's because sudo does *not* use policykit to test user privileges (rather, it uses its own config files). So maybe this is not applicable in this case? HND KatolaZ --inqsdvv7znhsuzot Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQSOWdaqRF79tKFTPVpfILOuC18GLwUCXAuMHAAKCRBfILOuC18G Lx6cAJwN3gJXo8n6wnxhlHv/kMTu9wydlwCfZTgjMrHT62Ebg1inz4UdLcVfFhA= =6Ri0 -----END PGP SIGNATURE----- --inqsdvv7znhsuzot--