remove pkexec autodetection

This commit is contained in:
Jaromil 2021-10-21 11:49:54 +02:00
parent e0ba8c5f4d
commit 84ef4bef4b
2 changed files with 7 additions and 9 deletions

View File

@ -279,9 +279,7 @@ modern computers, the value is multiplied by 1 million.
Select a different tool than sudo for privilege escalation.
Alternatives supported so far are: pkexec, doas, sup, sud. For any
alternative to work the executable must be included in the current
PATH. Automatic selection of pkexec is made even without using this
flag in case the executable is found and the polkit daemon is
running. Manual use of this flag overrides any automatic selection.
PATH.
.B
.IP "--sphx-user \fI<username>\fR"
Activate the SPHINX feature for password-authenticated key agreement.
@ -377,9 +375,9 @@ command.
.SH PRIVILEGE ESCALATION
The tomb commandline tool needs to acquire super user rights to
execute most of its operations: so it uses pkexec(1) or sudo(8), while
pinentry(1) is adopted to collect passwords from the user. Tomb
executes as super user only when required.
execute most of its operations: so it uses sudo(8) or other configured
tools, while pinentry(1) is adopted to collect passwords from the
user. Tomb executes as super user only when required.
To be made available on multi user systems, the superuser execution of
the tomb script can be authorized for users without jeopardizing the

6
tomb
View File

@ -884,9 +884,9 @@ _ensure_dependencies() {
path+=(/sbin /usr/sbin) # zsh magic
# use pkexec in place of sudo if found in path and polkitd is running
command -v pkexec 1>/dev/null 2>/dev/null
[[ $? == 0 ]] && ps ax | grep '[p]olkitd' 1>/dev/null 2>/dev/null && {
SUDO=(pkexec) }
# command -v pkexec 1>/dev/null 2>/dev/null
# [[ $? == 0 ]] && ps ax | grep '[p]olkitd' 1>/dev/null 2>/dev/null && {
# SUDO=(pkexec) }
[[ "$SUDO" == "sudo" ]] && {
command -v sudo 1>/dev/null 2>/dev/null ||
_failure "No privilege escalation tool found, not even sudo"