Changeset 7a5b2e77 for xsoft/other/gparted.xml
- Timestamp:
- 01/08/2014 05:56:18 PM (10 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 7.10, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 8a6b187
- Parents:
- 6af5a27c
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
xsoft/other/gparted.xml
r6af5a27c r7a5b2e77 165 165 Other solution is to use <application>pkexec</application>, from 166 166 <xref linkend="polkit"/>, but some configuration is necessary. 167 Another simple solution is the <application>GTK+</application> based 168 <application>ssh-askpass</application> (does not need 169 <application>GNOME</application>). Below, we describe these two 170 alternatives: "ssh-askpass" and "pkexec". 167 Another simple solution is <xref linkend="ssh-askpass"/>. Below, we 168 describe these two alternatives: "ssh-askpass" and "pkexec". 171 169 </para> 172 170 … … 174 172 <title>ssh-askpass</title> 175 173 <para> 176 To optionally use <application>ssh-askpass</application>, you need 177 <xref linkend="sudo"/> and <xref linkend="openssh"/> to be installed. 178 Uncompress the <xref linkend="openssh"/> tarball and, inside the 179 source directory, install <application>ssh-askpass</application> by 180 running the following commands: 181 </para> 182 183 <screen><userinput>cd contrib && 184 make gnome-ssh-askpass2</userinput></screen> 185 186 <para> 187 Now, as the <systemitem class="username">root</systemitem> user: 188 </para> 189 190 <screen role="root"><userinput>install -v -d -m755 /usr/lib/openssh/contrib && 191 install -v -m755 gnome-ssh-askpass2 /usr/lib/openssh/contrib && 192 ln -sv -f contrib/gnome-ssh-askpass2 /usr/lib/openssh/ssh-askpass</userinput></screen> 193 194 <para> 195 Still as the <systemitem class="username">root</systemitem> user, 196 configure <xref linkend="gparted"/> and <xref linkend="sudo"/> to 197 use <application>ssh-askpass</application>: 174 To optionally use <xref linkend="ssh-askpass"/> if it is installed in 175 your system, run the following commands as the 176 <systemitem class="username">root</systemitem> user: 198 177 </para> 199 178 200 179 <screen role="root"><userinput>cp -v /usr/share/applications/gparted.desktop /usr/share/applications/gparted.desktop.back && 201 sed -i 's/Exec=/Exec=sudo -A /' /usr/share/applications/gparted.desktop && 202 203 cat >> /etc/sudo.conf << "EOF" && 204 # Path to askpass helper program 205 Path askpass /usr/lib/openssh/ssh-askpass 206 EOF 207 chmod -v 0644 /etc/sudo.conf</userinput></screen> 180 sed -i 's/Exec=/Exec=sudo -A /' /usr/share/applications/gparted.desktop &&</userinput></screen> 208 181 209 182 <para> 210 183 Now, clicking in the menu item for Gparted, a dialog appears in the 211 screen, asking for the administrator password. Any graphical program 212 requiring root privileges can be run using "sudo -A <program>", 213 e.g. from a terminal, from a desktop launcher, or including it in the 214 desktop file. 215 </para> 184 screen, asking for the administrator password.</para> 216 185 217 186 </sect3> … … 221 190 <para> 222 191 To optionally use <application>pkexec</application>, you need 223 <xref linkend="which"/> (for the script),224 192 <xref linkend="polkit-gnome"/> or <xref linkend="lxpolkit"/>, and 225 193 <xref linkend="consolekit"/> installed with support to … … 236 204 237 205 cat > /usr/sbin/gparted_polkit << "EOF" && 238 #!/bin/bash 239 if [ $(which pkexec) ]; then 240 pkexec --disable-internal-agent "/usr/sbin/gparted" "$@" 241 else 242 /usr/sbin/gparted "$@" 243 fi 206 <literal>#!/bin/bash 207 208 pkexec /usr/sbin/gparted $@</literal> 244 209 EOF 245 210 chmod -v 0755 /usr/sbin/gparted_polkit</userinput></screen> … … 251 216 </para> 252 217 253 <screen role="root"><userinput>cat > /usr/share/polkit-1/actions/org. freedesktop.policykit.pkexec.policy << "EOF"254 <?xml version="1.0" encoding="UTF-8"?>218 <screen role="root"><userinput>cat > /usr/share/polkit-1/actions/org.gnome.gparted.policy << "EOF" 219 <literal><?xml version="1.0" encoding="UTF-8"?> 255 220 <!DOCTYPE policyconfig PUBLIC 256 221 "-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN" … … 270 235 </action> 271 236 272 </policyconfig> 237 </policyconfig></literal> 273 238 EOF 274 chmod -v 0644 /usr/share/polkit-1/actions/org. freedesktop.policykit.pkexec.policy</userinput></screen>239 chmod -v 0644 /usr/share/polkit-1/actions/org.gnome.gparted.policy</userinput></screen> 275 240 276 241 <para> 277 242 Now, clicking in the menu item for Gparted, a dialog appears in the 278 screen, asking for the administrator password. Any graphical program 279 requiring root privileges can be run using "pkexec <program>", 280 e.g. from a terminal, from a desktop launcher, or including it in the 281 desktop file. 282 </para> 243 screen, asking for the administrator password.</para> 283 244 284 245 </sect3> … … 296 257 <seglistitem> 297 258 <seg> 298 gparted and gpartedbin259 gparted, gpartedbin and gparted_polkit (optional) 299 260 </seg> 300 261 <seg> … … 338 299 </varlistentry> 339 300 301 <varlistentry id="gparted_polkit"> 302 <term><command>gparted_polkit</command></term> 303 <listitem> 304 <para> 305 is an optional script which can be used to run gparted with polkit, 306 from a menu. 307 </para> 308 <indexterm zone="gparted gparted_polkit"> 309 <primary sortas="b-gparted_polkit">gparted_polkit</primary> 310 </indexterm> 311 </listitem> 312 </varlistentry> 313 340 314 </variablelist> 341 315
Note:
See TracChangeset
for help on using the changeset viewer.