[18:09] I want to know how you'd tell PolicyKit not to ask users in the sudo group for any passwors [18:09] passwords when I do something that requires root priviledges [18:10] tails@tails-Inspiron-3582:/mnt/myusb$ id -Gn|grep -oe '\' [18:10] sudo [18:10] tails@tails-Inspiron-3582:/mnt/myusb$ cat /etc/os-release [18:10] NAME="Ubuntu" [18:10] VERSION="20.04 LTS (Focal Fossa)" [18:11] and here's my policykit : http://dpaste.com/2CK3Z6M [18:17] would anything be wrong with my policykit file? what else do I need to change? [18:34] ScaredySquirrel: I wonder if a rule would help? see https://wiki.archlinux.org/index.php/Polkit#Authorization_rules [18:37] TJ-: I don't know how to use globs [18:39] if(action.id =~ "org.debian.apt.*" && subject.isInGroup("sudo")) { return polkit.Result.YES; } [18:43] I don't think the glob * is required [18:45] but why? [18:45] there's this nopasswd global rules thingy but then firefox would laugh and auto authenticate [18:46] it doesn't use polkit so no...not the case [18:46] there would have to be a huge hole in there to make it launch a little program that uses polkit and dbus and then that would happen [18:46] because it doesn't care in this case [18:46] about what little dbus handle the app uses [18:49] so that nopasswd global rules is telling it to ignore the action [18:49] If it is the polkit user agent pormpting for the password then you should be able to use a polkit rule to handle it [18:50] wait does polkit at least put a dialog up with Authenticate and click there and it just goes ahead and elevates to root? [18:51] at least if you put nopasswd global rule in? [18:52] i mean in that case [18:52] for a global rule I'd expect no prompt [18:52] I'm on about the current situation before making any changes [18:53] As rules are written in Javascript you'd need to create a RegExp object and then call .test(...) on it [18:53] about the Current situation it says Authenticate I click there and it asks for a password when I have no password set [18:54] asks for the password of a user where that user has no password? [18:54] yes [18:55] that user is is sudo with NOPASSWD in sudoers for his sudo group so he needs no password for that [18:55] well that makes sense, it's not polkit's fault the invoking user has no password [18:56] however policykit has its no password policy [18:56] where only policykit asks for and requires a password when it has no password [18:56] ScaredySquirrel: but polkit doesn't use sudo/sudoers, it is entirely separate. All it does do is observe which group(s) a user should be in [18:57] It used to be the adm group [18:57] mhm its seperate so what to do to apply the same nopasswd policy to polkit for users in the sudo group? [18:58] and i take in mind its not sudo so its not the same system [18:58] polkit will not use the same policy as sudo [18:58] i just want similar [18:59] As I understood it, you only want no-password to apply to a sub-set of calls, not for everthing a user might try to do [18:59] unless policykit always forces you to use the Authenticate dialog [19:00] if an app can just take over and press Authenticate for you that's not what I want [19:00] the link I provided earlier gives good examples of various scenarios, https://wiki.archlinux.org/index.php/Polkit#For_specific_actions