Ahh, so you are using NVM storage. The refind 0.10.3 package doinst() script doesn't detect NVM storage, so it was not able to pass the correct disk and partition infomation to efibootmgr.
Its all coming back to me now.
Ahh, so you are using NVM storage. The refind 0.10.3 package doinst() script doesn't detect NVM storage, so it was not able to pass the correct disk and partition infomation to efibootmgr.
Code: Select all
rich[~]$ geany
No protocol specified
Geany: cannot open display
rich[~]$ firefox
No protocol specified
Error: cannot open display: :1.0
rich[~]$ transmission-gtk
No protocol specified
(transmission-gtk:4022): Gtk-WARNING **: 15:05:29.207: cannot open display: :3.0
rich[~]$ l3afpad
No protocol specified
l3afpad: Cannot open display:
Code: Select all
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE policyconfig PUBLIC
"-//freedesktop//DTD PolicyKit Policy Configuration 1.0//EN"
"http://www.freedesktop.org/standards/PolicyKit/1.0/policyconfig.dtd">
<policyconfig>
<vendor>salixos.org</vendor>
<vendor_url>https://salixos.org</vendor_url>
<icon_name>updatedb</icon_name>
<action id="org.salixos.updatedb">
<description>Run updatedb as root</description>
<description xml:lang="sv">Kör updatedb som root</description>
<message>Authentication is required to run updatedb</message>
<message xml:lang="sv">Autentisering krävs för att köra updatedb</message>
<defaults>
<allow_any>no</allow_any>
<allow_inactive>no</allow_inactive>
<allow_active>auth_admin</allow_active>
</defaults>
<annotate key="org.freedesktop.policykit.exec.path">/usr/bin/updatedb</annotate>
<annotate key="org.freedesktop.policykit.exec.allow_gui">true</annotate>
</action>
</policyconfig>
Code: Select all
/* Allow users in wheel group to run updatedb without authentication */
polkit.addRule(function(action, subject) {
if (action.id == "org.salixos.updatedb" &&
subject.isInGroup("wheel")) {
return polkit.Result.YES;
}
});
Code: Select all
/* Allow members of the wheel group to execute any actions
* without password authentication, similar to "sudo NOPASSWD:"
*/
polkit.addRule(function(action, subject) {
if (subject.isInGroup("wheel")) {
return polkit.Result.YES;
}
});
/* Allow members of the polkitd group to execute any actions
* without password authentication, similar to "sudo NOPASSWD:"
*/
polkit.addRule(function(action, subject) {
if (subject.isInGroup("polkitd")) {
return polkit.Result.YES;
}
});
The second, third user etc they are simple users. A simple user cannot run any app require admin privileges. Which it is right.ibka wrote:For me the wheel group works because i am the only user, but if there are more users and they are not in the wheel group then maybe another group could be used.
Well, that didn't solve the gtkhostsetup on my computer.djemos wrote: ↑18. Apr 2022, 11:46 Solution also for catfish is 49-nopasswd_global.rules file, taken from slackel. This file also included in salixlive xfce 14.2.1 iso in the past.
Just create 49-nopasswd_global.rules adding two rules (both needed tested on salix64-15.0-alpha2)
and copy it to /etc/polkit-1/rules.d/Edit: This also solves the problem with gtkhostsetup.Code: Select all
/* Allow members of the wheel group to execute any actions * without password authentication, similar to "sudo NOPASSWD:" */ polkit.addRule(function(action, subject) { if (subject.isInGroup("wheel")) { return polkit.Result.YES; } }); /* Allow members of the polkitd group to execute any actions * without password authentication, similar to "sudo NOPASSWD:" */ polkit.addRule(function(action, subject) { if (subject.isInGroup("polkitd")) { return polkit.Result.YES; } });