diff --git a/README b/README index 87e28e03..6a123f97 100644 --- a/README +++ b/README @@ -270,15 +270,18 @@ system. These commands include: {filemanager} - used in attempt data rescue to display discovered file systems. (e.g., nautilus, pcmanfm) hal-lock - used to prevent automounting of file systems - gksudo - used to acquire root privileges in gparted shell + pkexec - used to acquire root privileges in gparted shell script wrapper, but only if available when gparted source is configured - gksu - alternatively used to acquire root privileges in + gksudo - alternatively used to acquire root privileges in gparted shell script wrapper, second choice if available when gparted source is configured - kdesudo - alternatively used to acquire root privileges in + gksu - alternatively used to acquire root privileges in gparted shell script wrapper, third choice if available when gparted source is configured + kdesudo - alternatively used to acquire root privileges in + gparted shell script wrapper, fourth choice if + available when gparted source is configured xdg-su - alternatively used to acquire root privileges in gparted shell script wrapper, last choice if available when gparted source is configured diff --git a/configure.ac b/configure.ac index 61046c75..0b4f74d8 100644 --- a/configure.ac +++ b/configure.ac @@ -21,9 +21,17 @@ PKG_CHECK_EXISTS dnl====================== -dnl checks for other programs +dnl Find graphical privilege escalation program dnl====================== -AC_CHECK_PROGS([GKSUPROG], [gksudo gksu kdesudo "xdg-su -c"], []) +AC_CHECK_PROGS([GKSUPROG], [pkexec gksudo gksu kdesudo "xdg-su -c"], []) + +if test "x$GKSUPROG" = 'xpkexec'; then + AC_MSG_CHECKING([how to run pkexec]) + if pkexec --help 2>&1 | grep -q -- --disable-internal-agent; then + GKSUPROG="$GKSUPROG --disable-internal-agent" + fi + AC_MSG_RESULT([$GKSUPROG]) +fi dnl======================