-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow user certain tasks #89
Comments
Virt-manager:
Add Polkit rule:
Now it works. I actually dont know the polkit details, maybe the first codeblock is not needed. I can try to redo the changes and see if it works just with Polkit, as just the first changes didnt work. |
Polkit changes for allowing to open Luks drives (KDE team will fix the unnessecary password prompt)
I cant believe it works! The current rules only apply to wheel users, but I think this is also the norm. Non-sudoers should maybe not be allowed to do these tasks, I dont know children or something? It doesnt feel like a good protection, for example having secret stuff in a VM or on a LUKS drive, and the only thing hindering your child or anyone from accessing it is the sudoers password. |
sddm themes:
|
what about the mounting of luks drives? |
i have another drive that is encrypted. When you save the password in KWallet (password manager) mounting should work automatically, but it does not because polkit wants authentification for udisks2. This can be turned to "always yes" |
Lets collect tasks where you shouldnt need sudo for here:
Virt-manager because virtualization should be an easy tool on this System.
Mounting LUKS drives requires sudo too, which can be avoided
Adding this script makes future mods easier:
The text was updated successfully, but these errors were encountered: