polkit.h   polkit.h 
skipping to change at line 31 skipping to change at line 31
#ifndef __POLKIT_H #ifndef __POLKIT_H
#define __POLKIT_H #define __POLKIT_H
#define _POLKIT_INSIDE_POLKIT_H 1 #define _POLKIT_INSIDE_POLKIT_H 1
#include <polkit/polkittypes.h> #include <polkit/polkittypes.h>
#include <polkit/polkitenumtypes.h> #include <polkit/polkitenumtypes.h>
#include <polkit/polkitimplicitauthorization.h> #include <polkit/polkitimplicitauthorization.h>
#include <polkit/polkitactiondescription.h> #include <polkit/polkitactiondescription.h>
#include <polkit/polkitauthorityfeatures.h>
#include <polkit/polkiterror.h> #include <polkit/polkiterror.h>
#include <polkit/polkitidentity.h> #include <polkit/polkitidentity.h>
#include <polkit/polkitunixuser.h> #include <polkit/polkitunixuser.h>
#include <polkit/polkitunixgroup.h> #include <polkit/polkitunixgroup.h>
#include <polkit/polkitsubject.h> #include <polkit/polkitsubject.h>
#include <polkit/polkitunixprocess.h> #include <polkit/polkitunixprocess.h>
#include <polkit/polkitunixsession.h> #include <polkit/polkitunixsession.h>
#include <polkit/polkitsystembusname.h> #include <polkit/polkitsystembusname.h>
#include <polkit/polkitauthorizationresult.h> #include <polkit/polkitauthorizationresult.h>
#include <polkit/polkitcheckauthorizationflags.h> #include <polkit/polkitcheckauthorizationflags.h>
 End of changes. 1 change blocks. 
0 lines changed or deleted 1 lines changed or added


 polkitauthority.h   polkitauthority.h 
skipping to change at line 32 skipping to change at line 32
#if !defined (_POLKIT_COMPILATION) && !defined(_POLKIT_INSIDE_POLKIT_H) #if !defined (_POLKIT_COMPILATION) && !defined(_POLKIT_INSIDE_POLKIT_H)
#error "Only <polkit/polkit.h> can be included directly, this file may disa ppear or change contents." #error "Only <polkit/polkit.h> can be included directly, this file may disa ppear or change contents."
#endif #endif
#ifndef __POLKIT_AUTHORITY_H #ifndef __POLKIT_AUTHORITY_H
#define __POLKIT_AUTHORITY_H #define __POLKIT_AUTHORITY_H
#include <glib-object.h> #include <glib-object.h>
#include <gio/gio.h> #include <gio/gio.h>
#include <polkit/polkittypes.h> #include <polkit/polkittypes.h>
#include <polkit/polkitauthorityfeatures.h>
G_BEGIN_DECLS G_BEGIN_DECLS
#define POLKIT_TYPE_AUTHORITY (polkit_authority_get_type()) #define POLKIT_TYPE_AUTHORITY (polkit_authority_get_type())
#define POLKIT_AUTHORITY(o) (G_TYPE_CHECK_INSTANCE_CAST ((o), PO LKIT_TYPE_AUTHORITY, PolkitAuthority)) #define POLKIT_AUTHORITY(o) (G_TYPE_CHECK_INSTANCE_CAST ((o), PO LKIT_TYPE_AUTHORITY, PolkitAuthority))
#define POLKIT_AUTHORITY_CLASS(k) (G_TYPE_CHECK_CLASS_CAST((k), POLKIT _TYPE_AUTHORITY, PolkitAuthorityClass)) #define POLKIT_AUTHORITY_CLASS(k) (G_TYPE_CHECK_CLASS_CAST((k), POLKIT _TYPE_AUTHORITY, PolkitAuthorityClass))
#define POLKIT_AUTHORITY_GET_CLASS(o) (G_TYPE_INSTANCE_GET_CLASS ((o), POL KIT_TYPE_AUTHORITY, PolkitAuthorityClass)) #define POLKIT_AUTHORITY_GET_CLASS(o) (G_TYPE_INSTANCE_GET_CLASS ((o), POL KIT_TYPE_AUTHORITY, PolkitAuthorityClass))
#define POLKIT_IS_AUTHORITY(o) (G_TYPE_CHECK_INSTANCE_TYPE ((o), PO LKIT_TYPE_AUTHORITY)) #define POLKIT_IS_AUTHORITY(o) (G_TYPE_CHECK_INSTANCE_TYPE ((o), PO LKIT_TYPE_AUTHORITY))
#define POLKIT_IS_AUTHORITY_CLASS(k) (G_TYPE_CHECK_CLASS_TYPE ((k), POLKI T_TYPE_AUTHORITY)) #define POLKIT_IS_AUTHORITY_CLASS(k) (G_TYPE_CHECK_CLASS_TYPE ((k), POLKI T_TYPE_AUTHORITY))
#if 0 #if 0
typedef struct _PolkitAuthority PolkitAuthority; typedef struct _PolkitAuthority PolkitAuthority;
#endif #endif
typedef struct _PolkitAuthorityClass PolkitAuthorityClass; typedef struct _PolkitAuthorityClass PolkitAuthorityClass;
GType polkit_authority_get_type (void) G_GNUC_CONST; GType polkit_authority_get_type (void) G_GNUC_CONST;
PolkitAuthority *polkit_authority_get (void); PolkitAuthority *polkit_authority_get (void);
const gchar *polkit_authority_get_backend_name (PolkitAutho
rity *authority);
const gchar *polkit_authority_get_backend_version (PolkitAutho
rity *authority);
PolkitAuthorityFeatures polkit_authority_get_backend_features (PolkitAutho
rity *authority);
/* ------------------------------------------------------------------------ ---------------------------- */ /* ------------------------------------------------------------------------ ---------------------------- */
GList *polkit_authority_enumerate_actions_sync (PolkitA uthority *authority, GList *polkit_authority_enumerate_actions_sync (PolkitA uthority *authority,
GCancel lable *cancellable, GCancel lable *cancellable,
GError **error); GError **error);
GList *polkit_authority_enumerate_users_sync (PolkitAut hority *authority, GList *polkit_authority_enumerate_users_sync (PolkitAut hority *authority,
GCancella ble *cancellable, GCancella ble *cancellable,
GError **error); GError **error);
skipping to change at line 107 skipping to change at line 112
gboolean polkit_authority_revoke_temporary_authorizations _sync (PolkitAuthority *authority, gboolean polkit_authority_revoke_temporary_authorizations _sync (PolkitAuthority *authority,
PolkitSubject *subject, PolkitSubject *subject,
GCancellable *cancellable, GCancellable *cancellable,
GError **error); GError **error);
gboolean polkit_authority_revoke_temporary_authorization_ by_id_sync (PolkitAuthority *authority, gboolean polkit_authority_revoke_temporary_authorization_ by_id_sync (PolkitAuthority *authority,
const gchar *id, const gchar *id,
GCancellable *cancellable, GCancellable *cancellable,
GError **error); GError **error);
gboolean polkit_authority_add_lockdown_for_action_sync (P
olkitAuthority *authority,
c
onst gchar *action_id,
G
Cancellable *cancellable,
G
Error **error);
gboolean polkit_authority_remove_lockdown_for_action_sync
(PolkitAuthority *authority,
const gchar *action_id,
GCancellable *cancellable,
GError **error);
/* ------------------------------------------------------------------------ ---------------------------- */ /* ------------------------------------------------------------------------ ---------------------------- */
void polkit_authority_enumerate_actions (PolkitAuthor ity *authority, void polkit_authority_enumerate_actions (PolkitAuthor ity *authority,
GCancellable *cancellable, GCancellable *cancellable,
GAsyncReadyC allback callback, GAsyncReadyC allback callback,
gpointer user_data); gpointer user_data);
GList * polkit_authority_enumerate_actions_finish (Polki tAuthority *authority, GList * polkit_authority_enumerate_actions_finish (Polki tAuthority *authority,
GAsyn cResult *res, GAsyn cResult *res,
GErro r **error); GErro r **error);
skipping to change at line 195 skipping to change at line 210
void polkit_authority_revoke_temporary_authorization_ by_id (PolkitAuthority *authority, void polkit_authority_revoke_temporary_authorization_ by_id (PolkitAuthority *authority,
const gchar *id, const gchar *id,
GCancellable *cancellable, GCancellable *cancellable,
GAsyncReadyCallback callback, GAsyncReadyCallback callback,
gpointer user_data); gpointer user_data);
gboolean polkit_authority_revoke_temporary_authorization_ by_id_finish (PolkitAuthority *authority, gboolean polkit_authority_revoke_temporary_authorization_ by_id_finish (PolkitAuthority *authority,
GAsyncResult *res, GAsyncResult *res,
GError **error); GError **error);
void polkit_authority_add_lockdown_for_action (Polkit
Authority *authority,
const
gchar *action_id,
GCance
llable *cancellable,
GAsync
ReadyCallback callback,
gpoint
er user_data);
gboolean polkit_authority_add_lockdown_for_action_finish
(PolkitAuthority *authority,
GAsyncResult *res,
GError **error);
void polkit_authority_remove_lockdown_for_action (Pol
kitAuthority *authority,
con
st gchar *action_id,
GCa
ncellable *cancellable,
GAs
yncReadyCallback callback,
gpo
inter user_data);
gboolean polkit_authority_remove_lockdown_for_action_fini
sh (PolkitAuthority *authority,
GAsyncResult *res,
GError **error);
/* ------------------------------------------------------------------------ ---------------------------- */ /* ------------------------------------------------------------------------ ---------------------------- */
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_AUTHORITY_H */ #endif /* __POLKIT_AUTHORITY_H */
 End of changes. 4 change blocks. 
0 lines changed or deleted 62 lines changed or added


 polkitauthorizationresult.h   polkitauthorizationresult.h 
skipping to change at line 55 skipping to change at line 55
GType polkit_authorization_result_get_type (void) G_GNUC_CONST; GType polkit_authorization_result_get_type (void) G_GNUC_CONST;
PolkitAuthorizationResult *polkit_authorization_result_new (gboolean is_authorized, PolkitAuthorizationResult *polkit_authorization_result_new (gboolean is_authorized,
gboolean is_challenge, gboolean is_challenge,
PolkitDetails *details); PolkitDetails *details);
PolkitDetails *polkit_authorization_result_get_details (PolkitAuthorizationResult *result); PolkitDetails *polkit_authorization_result_get_details (PolkitAuthorizationResult *result);
gboolean polkit_authorization_result_get_is_authorized (PolkitAuthorizationResult *result); gboolean polkit_authorization_result_get_is_authorized (PolkitAuthorizationResult *result);
gboolean polkit_authorization_result_get_is_challenge (PolkitAuthorizationResult *result); gboolean polkit_authorization_result_get_is_challenge (PolkitAuthorizationResult *result);
gboolean polkit_authorization_result_get_retains_authorization (PolkitAuthorizationResult *result); gboolean polkit_authorization_result_get_retains_authorization (PolkitAuthorizationResult *result);
const gchar *polkit_authorization_result_get_temporary_authorization_ id (PolkitAuthorizationResult *result); const gchar *polkit_authorization_result_get_temporary_authorization_ id (PolkitAuthorizationResult *result);
gboolean polkit_authorization_result_get_locked_down (PolkitAuthorizationResult *result);
/* ------------------------------------------------------------------------ ---------------------------- */ /* ------------------------------------------------------------------------ ---------------------------- */
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_AUTHORIZATION_RESULT_H */ #endif /* __POLKIT_AUTHORIZATION_RESULT_H */
 End of changes. 1 change blocks. 
0 lines changed or deleted 1 lines changed or added


 polkitbackendauthority.h   polkitbackendauthority.h 
skipping to change at line 101 skipping to change at line 101
* See polkit_backend_authority_enumerate_temporary_authorizations() * See polkit_backend_authority_enumerate_temporary_authorizations()
* for details. * for details.
* @revoke_temporary_authorizations: Called to revoke temporary * @revoke_temporary_authorizations: Called to revoke temporary
* authorizations or %NULL if the backend doesn't support the operation. * authorizations or %NULL if the backend doesn't support the operation.
* See polkit_backend_authority_revoke_temporary_authorizations() * See polkit_backend_authority_revoke_temporary_authorizations()
* for details. * for details.
* @revoke_temporary_authorization_by_id: Called to revoke a temporary * @revoke_temporary_authorization_by_id: Called to revoke a temporary
* authorization identified by id or %NULL if the backend doesn't support * authorization identified by id or %NULL if the backend doesn't support
* the operation. See polkit_backend_authority_revoke_temporary_authorizati on_by_id() * the operation. See polkit_backend_authority_revoke_temporary_authorizati on_by_id()
* for details. * for details.
* @system_bus_name_owner_changed: temporary VFunc, to be removed before 1. * @add_lockdown_for_action: Called to add lock down for an action. See pol
0. kit_backend_authority_add_lockdown_for_action() for details. Can be %NULL i
f not supported by the backend.
* @add_lockdown_for_action_finish: Called to finish adding lock down for a
n an action. See polkit_backend_authority_add_lockdown_for_action_finish()
for details. Can be %NULL if not supported by the backend.
* @remove_lockdown_for_action: Called when removing lock down for an actio
n. See polkit_backend_authority_remove_lockdown_for_action() for details. C
an be %NULL if not supported by the backend.
* @remove_lockdown_for_action_finish: Called to finish removing lock down
for an action. See polkit_backend_authority_remove_lockdown_for_action_fini
sh() for details. Can be %NULL if not supported by the backend.
* @system_bus_name_owner_changed: temporary VFunc, to be removed before AP
I is declared stable.
* *
* VFuncs that authority backends need to implement. * VFuncs that authority backends need to implement.
*/ */
struct _PolkitBackendAuthorityClass struct _PolkitBackendAuthorityClass
{ {
/*< public >*/ /*< public >*/
GObjectClass parent_class; GObjectClass parent_class;
/* Signals */ /* Signals */
void (*changed) (PolkitBackendAuthority *authority); void (*changed) (PolkitBackendAuthority *authority);
/* VTable */ /* VTable */
const gchar *(*get_name) (PolkitBackendAuthority *authori
ty);
const gchar *(*get_version) (PolkitBackendAuthority *authori
ty);
PolkitAuthorityFeatures (*get_features) (PolkitBackendAuthority *authori
ty);
GList *(*enumerate_actions) (PolkitBackendAuthority *authority, GList *(*enumerate_actions) (PolkitBackendAuthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
const gchar *locale, const gchar *locale,
GError **error); GError **error);
void (*check_authorization) (PolkitBackendAuthority *authority, void (*check_authorization) (PolkitBackendAuthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
PolkitSubject *subject, PolkitSubject *subject,
const gchar *action_id, const gchar *action_id,
PolkitDetails *details, PolkitDetails *details,
skipping to change at line 168 skipping to change at line 176
gboolean (*revoke_temporary_authorizations) (PolkitBackendAuthority *au thority, gboolean (*revoke_temporary_authorizations) (PolkitBackendAuthority *au thority,
PolkitSubject *ca ller, PolkitSubject *ca ller,
PolkitSubject *su bject, PolkitSubject *su bject,
GError **er ror); GError **er ror);
gboolean (*revoke_temporary_authorization_by_id) (PolkitBackendAuthority *authority, gboolean (*revoke_temporary_authorization_by_id) (PolkitBackendAuthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
const gchar *id, const gchar *id,
GError **error); GError **error);
void (*add_lockdown_for_action) (PolkitBackendAuthority *authority,
PolkitSubject *caller,
const gchar *action_id,
GAsyncReadyCallback callback,
gpointer user_data);
gboolean (*add_lockdown_for_action_finish) (PolkitBackendAuthority *auth
ority,
GAsyncResult *res,
GError **erro
r);
void (*remove_lockdown_for_action) (PolkitBackendAuthority *authority,
PolkitSubject *caller,
const gchar *action_id,
GAsyncReadyCallback callback,
gpointer user_data);
gboolean (*remove_lockdown_for_action_finish) (PolkitBackendAuthority *a
uthority,
GAsyncResult *r
es,
GError **e
rror);
/* TODO: need something more efficient such that we don't watch all name changes */ /* TODO: need something more efficient such that we don't watch all name changes */
void (*system_bus_name_owner_changed) (PolkitBackendAuthority *authori ty, void (*system_bus_name_owner_changed) (PolkitBackendAuthority *authori ty,
const gchar *name, const gchar *name,
const gchar *old_own er, const gchar *old_own er,
const gchar *new_own er); const gchar *new_own er);
/*< private >*/ /*< private >*/
/* Padding for future expansion */ /* Padding for future expansion */
void (*_polkit_reserved1) (void); void (*_polkit_reserved1) (void);
void (*_polkit_reserved2) (void); void (*_polkit_reserved2) (void);
skipping to change at line 214 skipping to change at line 242
void (*_polkit_reserved29) (void); void (*_polkit_reserved29) (void);
void (*_polkit_reserved30) (void); void (*_polkit_reserved30) (void);
void (*_polkit_reserved31) (void); void (*_polkit_reserved31) (void);
void (*_polkit_reserved32) (void); void (*_polkit_reserved32) (void);
}; };
GType polkit_backend_authority_get_type (void) G_GNUC_CONST; GType polkit_backend_authority_get_type (void) G_GNUC_CONST;
/* --- */ /* --- */
const gchar *polkit_backend_authority_get_name (PolkitBacke
ndAuthority *authority);
const gchar *polkit_backend_authority_get_version (PolkitBacke
ndAuthority *authority);
PolkitAuthorityFeatures polkit_backend_authority_get_features (PolkitBacke
ndAuthority *authority);
void polkit_backend_authority_system_bus_name_owner_changed (PolkitBack endAuthority *authority, void polkit_backend_authority_system_bus_name_owner_changed (PolkitBack endAuthority *authority,
const gcha r *name, const gcha r *name,
const gcha r *old_owner, const gcha r *old_owner,
const gcha r *new_owner); const gcha r *new_owner);
GList *polkit_backend_authority_enumerate_actions (PolkitBackendA uthority *authority, GList *polkit_backend_authority_enumerate_actions (PolkitBackendA uthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
const gchar *locale, const gchar *locale,
GError **error); GError **error);
skipping to change at line 272 skipping to change at line 304
gboolean polkit_backend_authority_revoke_temporary_authorizations (PolkitBa ckendAuthority *authority, gboolean polkit_backend_authority_revoke_temporary_authorizations (PolkitBa ckendAuthority *authority,
PolkitSu bject *caller, PolkitSu bject *caller,
PolkitSu bject *subject, PolkitSu bject *subject,
GError **error); GError **error);
gboolean polkit_backend_authority_revoke_temporary_authorization_by_id (Pol kitBackendAuthority *authority, gboolean polkit_backend_authority_revoke_temporary_authorization_by_id (Pol kitBackendAuthority *authority,
Pol kitSubject *caller, Pol kitSubject *caller,
con st gchar *id, con st gchar *id,
GEr ror **error); GEr ror **error);
void polkit_backend_authority_add_lockdown_for_action (PolkitBackendAuthori
ty *authority,
PolkitSubject
*caller,
const gchar
*action_id,
GAsyncReadyCallback
callback,
gpointer
user_data);
gboolean polkit_backend_authority_add_lockdown_for_action_finish (PolkitBac
kendAuthority *authority,
GAsyncRes
ult *res,
GError
**error);
void polkit_backend_authority_remove_lockdown_for_action (PolkitBackendAuth
ority *authority,
PolkitSubject
*caller,
const gchar
*action_id,
GAsyncReadyCallba
ck callback,
gpointer
user_data);
gboolean polkit_backend_authority_remove_lockdown_for_action_finish (Polkit
BackendAuthority *authority,
GAsync
Result *res,
GError
**error);
/* --- */ /* --- */
PolkitBackendAuthority *polkit_backend_authority_get (void); PolkitBackendAuthority *polkit_backend_authority_get (void);
gboolean polkit_backend_register_authority (PolkitBackendAuthority *autho rity, gboolean polkit_backend_register_authority (PolkitBackendAuthority *autho rity,
const gchar *well_ known_name, const gchar *well_ known_name,
const gchar *objec t_path, const gchar *objec t_path,
GError **error ); GError **error );
G_END_DECLS G_END_DECLS
 End of changes. 5 change blocks. 
2 lines changed or deleted 89 lines changed or added


 polkitbackendinteractiveauthority.h   polkitbackendinteractiveauthority.h 
skipping to change at line 86 skipping to change at line 86
PolkitDetai ls *details); PolkitDetai ls *details);
PolkitImplicitAuthorization (*check_authorization_sync) (PolkitBackendInt eractiveAuthority *authority, PolkitImplicitAuthorization (*check_authorization_sync) (PolkitBackendInt eractiveAuthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
PolkitSubject *subject, PolkitSubject *subject,
PolkitIdentity *user_for_subject, PolkitIdentity *user_for_subject,
gboolean subject_is_local, gboolean subject_is_local,
gboolean subject_is_active, gboolean subject_is_active,
const gchar *action_id, const gchar *action_id,
PolkitDetails *details, PolkitDetails *details,
PolkitImplicitAu PolkitImplicitAu
thorization implicit); thorization implicit,
PolkitDetails
*out_details);
/*< private >*/ /*< private >*/
/* Padding for future expansion */ /* Padding for future expansion */
void (*_polkit_reserved1) (void); void (*_polkit_reserved1) (void);
void (*_polkit_reserved2) (void); void (*_polkit_reserved2) (void);
void (*_polkit_reserved3) (void); void (*_polkit_reserved3) (void);
void (*_polkit_reserved4) (void); void (*_polkit_reserved4) (void);
void (*_polkit_reserved5) (void); void (*_polkit_reserved5) (void);
void (*_polkit_reserved6) (void); void (*_polkit_reserved6) (void);
void (*_polkit_reserved7) (void); void (*_polkit_reserved7) (void);
skipping to change at line 141 skipping to change at line 142
PolkitImplicitAuthorization polkit_backend_interactive_authority_check_auth orization_sync ( PolkitImplicitAuthorization polkit_backend_interactive_authority_check_auth orization_sync (
PolkitBackendInte ractiveAuthority *authority, PolkitBackendInte ractiveAuthority *authority,
PolkitSubject *caller, PolkitSubject *caller,
PolkitSubject *subject, PolkitSubject *subject,
PolkitIdentity *user_for_subject, PolkitIdentity *user_for_subject,
gboolean subject_is_local, gboolean subject_is_local,
gboolean subject_is_active, gboolean subject_is_active,
const gchar *action_id, const gchar *action_id,
PolkitDetails *details, PolkitDetails *details,
PolkitImplicitAut PolkitImplicitAut
horization implicit); horization implicit,
PolkitDetails
*out_details);
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_BACKEND_INTERACTIVE_AUTHORITY_H */ #endif /* __POLKIT_BACKEND_INTERACTIVE_AUTHORITY_H */
 End of changes. 2 change blocks. 
4 lines changed or deleted 8 lines changed or added


 polkitbackendlocalauthorizationstore.h   polkitbackendlocalauthorizationstore.h 
skipping to change at line 80 skipping to change at line 80
GType polkit_backend_local_authorization_st ore_get_type (void) G_GNUC_CONST; GType polkit_backend_local_authorization_st ore_get_type (void) G_GNUC_CONST;
PolkitBackendLocalAuthorizationStore *polkit_backend_local_authorization_st ore_new (GFile *directory, PolkitBackendLocalAuthorizationStore *polkit_backend_local_authorization_st ore_new (GFile *directory,
const gchar *extension); const gchar *extension);
gboolean polkit_backend_local_authorization_store_lookup (PolkitBackendL ocalAuthorizationStore *store, gboolean polkit_backend_local_authorization_store_lookup (PolkitBackendL ocalAuthorizationStore *store,
PolkitIdentity *identity, PolkitIdentity *identity,
const gchar *action_id, const gchar *action_id,
PolkitDetails *details, PolkitDetails *details,
PolkitImplicit Authorization *out_result_any, PolkitImplicit Authorization *out_result_any,
PolkitImplicit Authorization *out_result_inactive, PolkitImplicit Authorization *out_result_inactive,
PolkitImplicit PolkitImplicit
Authorization *out_result_active); Authorization *out_result_active,
PolkitDetails
*out_details);
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_BACKEND_LOCAL_AUTHORIZATION_STORE_H */ #endif /* __POLKIT_BACKEND_LOCAL_AUTHORIZATION_STORE_H */
 End of changes. 1 change blocks. 
2 lines changed or deleted 4 lines changed or added


 polkitcheckauthorizationflags.h   polkitcheckauthorizationflags.h 
skipping to change at line 48 skipping to change at line 48
* PolkitCheckAuthorizationFlags: * PolkitCheckAuthorizationFlags:
* @POLKIT_CHECK_AUTHORIZATION_FLAGS_NONE: No flags set. * @POLKIT_CHECK_AUTHORIZATION_FLAGS_NONE: No flags set.
* @POLKIT_CHECK_AUTHORIZATION_FLAGS_ALLOW_USER_INTERACTION: If the subject can obtain the authorization * @POLKIT_CHECK_AUTHORIZATION_FLAGS_ALLOW_USER_INTERACTION: If the subject can obtain the authorization
* through authentication, and an authentication agent is available, then a ttempt to do so. Note, this * through authentication, and an authentication agent is available, then a ttempt to do so. Note, this
* means that the method used for checking authorization is likely to block for a long time. * means that the method used for checking authorization is likely to block for a long time.
* *
* Possible flags when checking authorizations. * Possible flags when checking authorizations.
*/ */
typedef enum typedef enum
{ {
POLKIT_CHECK_AUTHORIZATION_FLAGS_NONE = 0x0000, /*< nick=none >*/ POLKIT_CHECK_AUTHORIZATION_FLAGS_NONE = 0,
POLKIT_CHECK_AUTHORIZATION_FLAGS_ALLOW_USER_INTERACTION = 0x0001, POLKIT_CHECK_AUTHORIZATION_FLAGS_ALLOW_USER_INTERACTION = (1<<0),
} PolkitCheckAuthorizationFlags; } PolkitCheckAuthorizationFlags;
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_CHECK_AUTHORIZATION_FLAGS_H */ #endif /* __POLKIT_CHECK_AUTHORIZATION_FLAGS_H */
 End of changes. 1 change blocks. 
2 lines changed or deleted 2 lines changed or added


 polkitenumtypes.h   polkitenumtypes.h 
skipping to change at line 22 skipping to change at line 22
GType polkit_check_authorization_flags_get_type (void) G_GNUC_CONST; GType polkit_check_authorization_flags_get_type (void) G_GNUC_CONST;
#define POLKIT_TYPE_CHECK_AUTHORIZATION_FLAGS (polkit_check_authorization_f lags_get_type ()) #define POLKIT_TYPE_CHECK_AUTHORIZATION_FLAGS (polkit_check_authorization_f lags_get_type ())
/* enumerations from "polkiterror.h" */ /* enumerations from "polkiterror.h" */
GType polkit_error_get_type (void) G_GNUC_CONST; GType polkit_error_get_type (void) G_GNUC_CONST;
#define POLKIT_TYPE_ERROR (polkit_error_get_type ()) #define POLKIT_TYPE_ERROR (polkit_error_get_type ())
/* enumerations from "polkitimplicitauthorization.h" */ /* enumerations from "polkitimplicitauthorization.h" */
GType polkit_implicit_authorization_get_type (void) G_GNUC_CONST; GType polkit_implicit_authorization_get_type (void) G_GNUC_CONST;
#define POLKIT_TYPE_IMPLICIT_AUTHORIZATION (polkit_implicit_authorization_g et_type ()) #define POLKIT_TYPE_IMPLICIT_AUTHORIZATION (polkit_implicit_authorization_g et_type ())
/* enumerations from "polkitauthorityfeatures.h" */
GType polkit_authority_features_get_type (void) G_GNUC_CONST;
#define POLKIT_TYPE_AUTHORITY_FEATURES (polkit_authority_features_get_type
())
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_ENUM_TYPES_H__ */ #endif /* __POLKIT_ENUM_TYPES_H__ */
/* Generated data ends here */ /* Generated data ends here */
 End of changes. 1 change blocks. 
0 lines changed or deleted 5 lines changed or added


 polkitsystembusname.h   polkitsystembusname.h 
skipping to change at line 49 skipping to change at line 49
#define POLKIT_SYSTEM_BUS_NAME_CLASS(k) (G_TYPE_CHECK_CLASS_CAST((k), POLKIT_TYPE_SYSTEM_BUS_NAME, PolkitSystemBusNameClass)) #define POLKIT_SYSTEM_BUS_NAME_CLASS(k) (G_TYPE_CHECK_CLASS_CAST((k), POLKIT_TYPE_SYSTEM_BUS_NAME, PolkitSystemBusNameClass))
#define POLKIT_SYSTEM_BUS_NAME_GET_CLASS(o) (G_TYPE_INSTANCE_GET_CLASS ((o ), POLKIT_TYPE_SYSTEM_BUS_NAME, PolkitSystemBusNameClass)) #define POLKIT_SYSTEM_BUS_NAME_GET_CLASS(o) (G_TYPE_INSTANCE_GET_CLASS ((o ), POLKIT_TYPE_SYSTEM_BUS_NAME, PolkitSystemBusNameClass))
#define POLKIT_IS_SYSTEM_BUS_NAME(o) (G_TYPE_CHECK_INSTANCE_TYPE (( o), POLKIT_TYPE_SYSTEM_BUS_NAME)) #define POLKIT_IS_SYSTEM_BUS_NAME(o) (G_TYPE_CHECK_INSTANCE_TYPE (( o), POLKIT_TYPE_SYSTEM_BUS_NAME))
#define POLKIT_IS_SYSTEM_BUS_NAME_CLASS(k) (G_TYPE_CHECK_CLASS_TYPE ((k), POLKIT_TYPE_SYSTEM_BUS_NAME)) #define POLKIT_IS_SYSTEM_BUS_NAME_CLASS(k) (G_TYPE_CHECK_CLASS_TYPE ((k), POLKIT_TYPE_SYSTEM_BUS_NAME))
#if 0 #if 0
typedef struct _PolkitSystemBusName PolkitSystemBusName; typedef struct _PolkitSystemBusName PolkitSystemBusName;
#endif #endif
typedef struct _PolkitSystemBusNameClass PolkitSystemBusNameClass; typedef struct _PolkitSystemBusNameClass PolkitSystemBusNameClass;
GType polkit_system_bus_name_get_type (void) G_GNUC_CONST; GType polkit_system_bus_name_get_type (void) G_GNUC_CON
PolkitSubject *polkit_system_bus_name_new (const gchar *name) ST;
; PolkitSubject *polkit_system_bus_name_new (const gchar
const gchar *polkit_system_bus_name_get_name (PolkitSystemBusName *syste *name);
m_bus_name); const gchar *polkit_system_bus_name_get_name (PolkitSystemBusN
void polkit_system_bus_name_set_name (PolkitSystemBusName *syste ame *system_bus_name);
m_bus_name, void polkit_system_bus_name_set_name (PolkitSystemBusN
const gchar *name) ame *system_bus_name,
; const gchar
*name);
/* TODO: add async version of get_process() method */
PolkitSubject *polkit_system_bus_name_get_process_sync (PolkitSystemBusN
ame *system_bus_name,
GCancellable
*cancellable,
GError
**error);
G_END_DECLS G_END_DECLS
#endif /* __POLKIT_SYSTEM_BUS_NAME_H */ #endif /* __POLKIT_SYSTEM_BUS_NAME_H */
 End of changes. 1 change blocks. 
9 lines changed or deleted 17 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/