GNU bug report logs - #47326
connman permissions

Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.

Package: guix; Reported by: Christopher Howard <christopher@HIDDEN>; dated Mon, 22 Mar 2021 17:17:03 UTC; Maintainer for guix is bug-guix@HIDDEN.

Message received at submit <at> debbugs.gnu.org:


Received: (at submit) by debbugs.gnu.org; 22 Mar 2021 17:16:49 +0000
From debbugs-submit-bounces <at> debbugs.gnu.org Mon Mar 22 13:16:49 2021
Received: from localhost ([127.0.0.1]:58442 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1lOOAa-0007f6-E8
	for submit <at> debbugs.gnu.org; Mon, 22 Mar 2021 13:16:48 -0400
Received: from lists.gnu.org ([209.51.188.17]:33022)
 by debbugs.gnu.org with esmtp (Exim 4.84_2)
 (envelope-from <christopher@HIDDEN>) id 1lOOAY-0007dO-Lo
 for submit <at> debbugs.gnu.org; Mon, 22 Mar 2021 13:16:47 -0400
Received: from eggs.gnu.org ([2001:470:142:3::10]:39828)
 by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <christopher@HIDDEN>)
 id 1lOOAY-0007QF-8c
 for bug-guix@HIDDEN; Mon, 22 Mar 2021 13:16:46 -0400
Received: from mx.kolabnow.com ([95.128.36.41]:7448)
 by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <christopher@HIDDEN>)
 id 1lOOAV-0000PI-GG
 for bug-guix@HIDDEN; Mon, 22 Mar 2021 13:16:45 -0400
Received: from localhost (unknown [127.0.0.1])
 by ext-mx-out002.mykolab.com (Postfix) with ESMTP id 51943891
 for <bug-guix@HIDDEN>; Mon, 22 Mar 2021 18:16:39 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kolabnow.com; h=
 mime-version:content-type:content-type:date:date:from:from
 :subject:subject:message-id:received:received:received; s=
 dkim20160331; t=1616433398; x=1618247799; bh=VRxPidmABPK8bq70k59
 ynx8dsEo9T4Hxw/3BJC1eKuw=; b=X2eOORPf/HOIncCd5BUZFQJX//yJGgLDHl1
 zx3vTaXuRCFNtlNmVcLUzTnT/SRslLoajctaCcFRttY8cGQpPlFnxc007zbRWAD+
 5tlw3XVtVsk3WgkBamXMui2ube/tJmW/decK/fmSPd18ZQ6x1ZH5Yq825ng9Mb89
 4kfGltX+kQFsMaA4Gul4F/cRvtrhcSX4VfzMOKI3CCWSeFnksoRqo4sS7cDihhsr
 xsgV1T7pUMXt4tYm1427XhqR1Zv8HijdwAwhdAAA+7KFW4PuG6vek3YWLe1DXsHk
 99+DhjF4+OB2ZmHz9QcZiPrmlaIN2p0QbPrs41AXNP/qejf/okmcm8qF5Z5eyejk
 7xEqz0Ij+ob1uJ4ygZjhA5DBYMyWnYue1AlUU9Du7w8Lpyj6q/08BnaVzY7zaSUF
 vogXZX0/NVMWAQXaqKfTHRm5JSbR76yOBXiPvRe0HXKYNS9uMhdCqvZBTT7DrgMN
 bO4NrPtnMyVFaPbcG0c0I/DTrtddPFUxaDX4q/f3cpiDAgY6beFAYYIcYQbwRyUX
 RKGNpmB3RbzEmhNt9CqINlFq6ZsfPrC19FQQMdLvXy6d5+s4iDGHXf3iaw9oD9+1
 1f40efwAv97O3UR996tKC+bbNsRHdCGSJZke3jqFYV7Ekm4diho9susMd8A8hvCC
 JNU6Kftg=
X-Virus-Scanned: amavisd-new at mykolab.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-10 required=5
 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, URIBL_BLOCKED=0.001]
 autolearn=ham autolearn_force=no
Received: from mx.kolabnow.com ([127.0.0.1])
 by localhost (ext-mx-out002.mykolab.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id CgMJVFbdLCxI for <bug-guix@HIDDEN>;
 Mon, 22 Mar 2021 18:16:38 +0100 (CET)
Received: from int-mx002.mykolab.com (unknown [10.9.13.2])
 by ext-mx-out002.mykolab.com (Postfix) with ESMTPS id 71C4548C
 for <bug-guix@HIDDEN>; Mon, 22 Mar 2021 18:16:34 +0100 (CET)
Received: from ext-subm003.mykolab.com (unknown [10.9.6.3])
 by int-mx002.mykolab.com (Postfix) with ESMTPS id 1F62C3A6A
 for <bug-guix@HIDDEN>; Mon, 22 Mar 2021 18:16:33 +0100 (CET)
Message-ID: <5d125fe4c3ddffa4cff0c326eefbde93b42e77b8.camel@HIDDEN>
Subject: connman permissions
From: Christopher Howard <christopher@HIDDEN>
To: bug-guix <bug-guix@HIDDEN>
Date: Mon, 22 Mar 2021 09:16:29 -0800
Content-Type: multipart/mixed; boundary="=-X3aaNZxowMG1ML9otgUr"
MIME-Version: 1.0
Received-SPF: none client-ip=95.128.36.41;
 envelope-from=christopher@HIDDEN; helo=mx.kolabnow.com
X-Spam_score_int: -18
X-Spam_score: -1.9
X-Spam_bar: -
X-Spam_report: (-1.9 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001,
 SPF_NONE=0.001 autolearn=ham autolearn_force=no
X-Spam_action: no action
X-Spam-Score: -2.3 (--)
X-Debbugs-Envelope-To: submit
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: -3.3 (---)


--=-X3aaNZxowMG1ML9otgUr
Content-Type: multipart/alternative; boundary="=-uhKY436/Id5XxzNrDsza"


--=-uhKY436/Id5XxzNrDsza
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit

Short description: In Guix, controlling connman seems to require root
permissions, but a non-root user should be able to control it.

Longer description: I am running a DE with slim + elogind + lxqt +
connman. When logged in to lxqt, I can run applications like csmt and
connmanctl to control connman, but if I start them as a non-root user,
I get a chain of dbus permission errors and am not able to see or
change network settings.

I have attached my system config file as well as info about my Guix
commit and system hardware.

Looking at Guix source, it appears that lxqt-desktop-service-type has
polkit settings, but I'm not seeing something similiar in the source
for connman package (connman.scm). I checked with the folks on #connman
and they said that connman does provide a polkit policy file which
should be working in conjunction with elogind, the standard location
being /usr/share/polkit-1/actions/net.connman.policy.

It could just be a problem with my system config definition, of course,
but it is not obvious to me, and it didn't seem to be anything obvious
to the folks on #guix IRC.

--=-uhKY436/Id5XxzNrDsza
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html dir=3D"ltr"><head></head><body style=3D"text-align:left; direction:lt=
r;"><div>Short description: In Guix, controlling connman seems to require r=
oot permissions, but a non-root user should be able to control it.</div><di=
v><br></div><div>Longer description: I am running a DE with slim + elogind =
+ lxqt + connman. When logged in to lxqt, I can run applications like csmt =
and connmanctl to control connman, but if I start them as a non-root user, =
I get a chain of dbus permission errors and am not able to see or change ne=
twork settings.</div><div><br></div><div>I have attached my system config f=
ile as well as info about my Guix commit and system hardware.</div><div><br=
></div><div>Looking at Guix source, it appears that lxqt-desktop-service-ty=
pe has polkit settings, but I'm not seeing something similiar in the source=
 for connman package (connman.scm). I checked with the folks on #connman an=
d they said that connman does provide a polkit policy file which should be =
working in conjunction with elogind, the standard location being /usr/share=
/polkit-1/actions/net.connman.policy.</div><div><br></div><div>It could jus=
t be a problem with my system config definition, of course, but it is not o=
bvious to me, and it didn't seem to be anything obvious to the folks on #gu=
ix IRC.</div></body></html>

--=-uhKY436/Id5XxzNrDsza--

--=-X3aaNZxowMG1ML9otgUr
Content-Disposition: attachment; filename="4Q7Q.txt"
Content-Type: text/plain; name="4Q7Q.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64
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=


--=-X3aaNZxowMG1ML9otgUr
Content-Disposition: attachment; filename="7MTA.txt"
Content-Type: text/plain; name="7MTA.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64
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--=-X3aaNZxowMG1ML9otgUr
Content-Disposition: attachment; filename="PBHQ.txt"
Content-Type: text/plain; name="PBHQ.txt"; charset="UTF-8"
Content-Transfer-Encoding: base64

R2VuZXJhdGlvbiAzCU1hciAxOSAyMDIxIDAyOjIxOjI1CShjdXJyZW50KQogIGd1aXggMWFiMDNm
YgogICAgcmVwb3NpdG9yeSBVUkw6IGh0dHBzOi8vZ2l0LnNhdmFubmFoLmdudS5vcmcvZ2l0L2d1
aXguZ2l0CiAgICBicmFuY2g6IG1hc3RlcgogICAgY29tbWl0OiAxYWIwM2ZiNzQ1MDU0NThlNzc1
NGRjZTMzOGE1ZGEyOWRjNzU0ZDgw


--=-X3aaNZxowMG1ML9otgUr--





Acknowledgement sent to Christopher Howard <christopher@HIDDEN>:
New bug report received and forwarded. Copy sent to bug-guix@HIDDEN. Full text available.
Report forwarded to bug-guix@HIDDEN:
bug#47326; Package guix. Full text available.
Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.
Last modified: Mon, 22 Mar 2021 17:30:02 UTC

GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.