Bug #2318
RCP: X.X, improve TXM update management under Linux
Status: | New | Start date: | 01/11/2018 | |
---|---|---|---|---|
Priority: | Normal | Due date: | ||
Assignee: | - | % Done: | 0% |
|
Category: | Update | Spent time: | - | |
Target version: | TXM X.X |
Description
Currently the TXM update mecanism relies on a specific access rights policy on TXM files to work.
In some cases this policy can not work.
We should change the update mecanism to be more compatible with usual access rights policies.
Solution 1.a¶
Raise user privileges for TXM update operations with gksu or PolicyKit
Solution 1.b¶
Use a 'setuid' strategy (start with root privileges by suid bit, lower privileges for usual sessions by setuid and raise privileges only for TXM update operations) or any privilege mecanism available for a Linux application to udpate with or without the system software update mecanism.
Solution 2¶
Change TXM components architecture to allow any user or only the current user or only the system software update mecanism to update TXM.
History
#1 Updated by Serge Heiden almost 6 years ago
- Description updated (diff)
#2 Updated by Sebastien Jacquot over 5 years ago
- Target version changed from TXM 0.8.0a (split/restructuration) to TXM 0.8.0
#3 Updated by Matthieu Decorde over 4 years ago
- Target version changed from TXM 0.8.0 to TXM X.X