Skip to content

Conversation

@anonfaded
Copy link
Owner

  • Added elevated_daemon_client.py to facilitate communication with the FadCrypt elevated daemon via Unix socket.
  • Introduced methods for checking daemon availability, setting file attributes, and changing permissions.
  • Updated file_lock_manager_linux.py to reflect changes in file protection mechanism using the elevated daemon.

feat: Create Windows Elevated Service

  • Added elevated_service.py to handle file operations as a Windows service with SYSTEM permissions.
  • Implemented methods for protecting and unprotecting files via named pipes.
  • Created elevated_service_client.py for client-side communication with the Windows service.

chore: Update installation scripts for elevated daemon

  • Modified postinst script to install and enable the elevated daemon service.
  • Updated prerm script to stop and disable the service during package removal.
  • Created fadcrypt-elevated.service for systemd service management.

refactor: Remove polkit-based file protection

  • Deleted polkit policy files and helper scripts as the elevated daemon now handles file protection.
  • Updated UI components to reflect the new daemon-based approach for file protection without requiring polkit authorization.

fix: Update file protection logic in UI

  • Adjusted main_window_base.py, settings_panel.py, and file_protection_auth_dialog.py to communicate the new daemon-based file protection.
  • Updated main_window_linux.py to use the elevated daemon for disabling and enabling system tools without password prompts.

- Added `elevated_daemon_client.py` to facilitate communication with the FadCrypt elevated daemon via Unix socket.
- Introduced methods for checking daemon availability, setting file attributes, and changing permissions.
- Updated `file_lock_manager_linux.py` to reflect changes in file protection mechanism using the elevated daemon.

feat: Create Windows Elevated Service

- Added `elevated_service.py` to handle file operations as a Windows service with SYSTEM permissions.
- Implemented methods for protecting and unprotecting files via named pipes.
- Created `elevated_service_client.py` for client-side communication with the Windows service.

chore: Update installation scripts for elevated daemon

- Modified `postinst` script to install and enable the elevated daemon service.
- Updated `prerm` script to stop and disable the service during package removal.
- Created `fadcrypt-elevated.service` for systemd service management.

refactor: Remove polkit-based file protection

- Deleted polkit policy files and helper scripts as the elevated daemon now handles file protection.
- Updated UI components to reflect the new daemon-based approach for file protection without requiring polkit authorization.

fix: Update file protection logic in UI

- Adjusted `main_window_base.py`, `settings_panel.py`, and `file_protection_auth_dialog.py` to communicate the new daemon-based file protection.
- Updated `main_window_linux.py` to use the elevated daemon for disabling and enabling system tools without password prompts.
@anonfaded anonfaded merged commit 8b1a846 into main Oct 21, 2025
@anonfaded anonfaded deleted the feat/daemon-and-service branch October 21, 2025 22:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants