Skip to content

feat(udev): Enhance udev rules for modern desktop environments#1695

Open
m1st0 wants to merge 1 commit intotidepool-org:developfrom
m1st0:develop
Open

feat(udev): Enhance udev rules for modern desktop environments#1695
m1st0 wants to merge 1 commit intotidepool-org:developfrom
m1st0:develop

Conversation

@m1st0
Copy link

@m1st0 m1st0 commented Jul 8, 2025

This commit refines the udev rules to provide more robust and user-friendly device access for common desktop environments (DEs).

The updated rules aim to:

  • Integrate seamlessly with PolicyKit: Respecting PolicyKit's role in access control for the current logged-in user, which provides a more secure and automated way to grant permissions.
  • Offer modern "plug-and-play" convenience: Utilizing the TAG+="uaccess" mechanism to automatically grant device access to the active graphical user, simplifying setup for most users.
  • Maintain traditional, reliable group-based permissions: By retaining GROUP="plugdev" and appropriate MODE settings, the rules ensure that users in the plugdev group still have access, serving as a robust fallback for non-graphical use cases or in environments where PolicyKit might not be fully configured. This dual approach provides flexibility and resilience in various operational scenarios.

This improvement reduces friction for users connecting devices while maintaining appropriate security posture.

I agree to the terms of Tidepool Project’s Volunteer/Contributor License Agreement v1.1 as it exists at http://tidepool-org.github.io/files/TidepoolVCLA-1.1.pdf on July 8, 2025.

This commit refines the udev rules to provide more robust and user-friendly device access for common desktop environments (DEs).

The updated rules aim to:
* **Integrate seamlessly with PolicyKit:** Respecting PolicyKit's role in access control for the current logged-in user, which provides a more secure and automated way to grant permissions.
* **Offer modern "plug-and-play" convenience:** Utilizing the `TAG+="uaccess"` mechanism to automatically grant device access to the active graphical user, simplifying setup for most users.
* **Maintain traditional, reliable group-based permissions:** By retaining `GROUP="plugdev"` and appropriate `MODE` settings, the rules ensure that users in the `plugdev` group still have access, serving as a robust fallback for non-graphical use cases or in environments where PolicyKit might not be fully configured. This dual approach provides flexibility and resilience in various operational scenarios.

This improvement reduces friction for users connecting devices while maintaining appropriate security posture.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant