It is some time ago it was fighting with polkit, but as far is I remember you have to make a .policy file to get pkexec to work right
Like this one I use in yumex. https://github.com/timlau/yumex/blob/master/misc/dk.yumex.backend.policy.in It should be installed in /usr/share/polkit-1/actions/ When you can make a rule to bypass the polkit password prompt Tim PS. You can use *cat /var/log/secure | grep polkit * to look for errors On Fri, Oct 25, 2013 at 11:22 AM, Peter Lemenkov <lemen...@gmail.com> wrote: > Hello All! > > I 'm trying to write a polkit rule which allows every member of a > particular group ("ejabberd") to run a specific script > ("/sbin/ejabberdctl" or "/usr/sbin/ejabberdctl"). Other users should > not be even able to run it. This sounds simple, so I quickly wrote > this: > > http://peter.fedorapeople.org/stuff/ejabberdctl.polkit.rules > > I installed it to %{_datadir}/polkit-1/rules.d/51-ejabberdctl.rules, > and added /usr/bin/ejabberdctl which contains just the following: > > ======= > #!/bin/sh > /usr/bin/pkexec /usr/sbin/ejabberdctl "$@" > ======= > > So when user types ejabberdctl it actually runs /usr/sbin/ejabberdctl > under the polkit supervision. Unfortunately people started reporting > about the issues with the other apps: > > * https://bugzilla.redhat.com/show_bug.cgi?id=1009408 > > I can't find what's wrong with the rule above so I'm calling you for > help. Could please someone help me fixing this mess? > -- > With best regards, Peter Lemenkov. > -- > devel mailing list > devel@lists.fedoraproject.org > https://admin.fedoraproject.org/mailman/listinfo/devel > Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
-- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct