<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE policyconfig PUBLIC "-//freedesktop//DTD polkit Policy Configuration 1.0//EN" "http://www.freedesktop.org/software/polkit/policyconfig-1.dtd"> <!-- SPDX-License-Identifier: CC-BY-SA-4.0 SPDX-FileCopyrightText: Michael Terry --> <policyconfig> <icon_name>org.gnome.DejaDup</icon_name> <action id="org.gnome.DejaDup.duplicity"> <description gettext-domain="deja-dup" gettext-domain="deja-dup">Restore</description> <message gettext-domain="deja-dup" gettext-domain="deja-dup">Privileges are required to restore files to system locations</message> <defaults> <allow_any>no</allow_any> <allow_inactive>no</allow_inactive> <!-- Don't use _keep here. It exposes us to a potential attack where anybody in the session can use our script as root to overwrite files using just our cached auth. Unfortunately, the way deja-dup is currently written, this means that we might ask user twice for root password if backup is encrypted. We can try to solve that separately, it's better than a security vulnerability. --> <allow_active>auth_admin</allow_active> </defaults> <annotate key="org.freedesktop.policykit.exec.path">/usr/libexec/deja-dup/duplicity</annotate> </action> </policyconfig>