no debian policykit. it was installed with hardy. it was just an upgrade from up-to-date gutsy to hardy. but there's lots of weird stuff with the upgrade, which (like with the upgrade to gutsy from feisty before) doesn't update many config settings, the menu bar, etc. and there seems no way to get a "standard config".
my user was not in the admin group. in fact, no user was. instead, it was in the "adm" group. i added it to the admin group. but
i'm not quite sure what's changed, since i've been trying many things, but although the PolicyKit.conf file looks the same (no "admin" line) now things that need a password to "unlock" seem to be working (network-admin and users-admin, for instance, and time change). i.e. "unlock" doesn't freeze and return with an error. i can't figure out why. these also work the same way for another user i created that's _not_ in the admin group.
adding the <define_admin_auth> line to PolicyKit.conf seems to make no difference either way.
also, running users-admin or network-admin with sudo still has a greyed-out "Unlock" button and gives the error " ** (users-admin:11074): CRITICAL **: Unable to lookup session information for process '11074'" (i.e. it can't look up session info for itself!). however, since PolicyKit inexplicably now prompts for the password instead of freezing when i press unlock after running the command without sudo, there's no need to run it with sudo.
the difference between the previous output is only because i went and revoked all permissions i'd explicitly granted to my user "rishab" so there are a few more "obtainable" items.
i think there must be a problem with how PolicyKit is set up to check console activity, since the external USB drive installation was always authorised for the active console. hal detects the device fine, just doesn't auto-mount:
no debian policykit. it was installed with hardy. it was just an upgrade from up-to-date gutsy to hardy. but there's lots of weird stuff with the upgrade, which (like with the upgrade to gutsy from feisty before) doesn't update many config settings, the menu bar, etc. and there seems no way to get a "standard config".
my user was not in the admin group. in fact, no user was. instead, it was in the "adm" group. i added it to the admin group. but
i'm not quite sure what's changed, since i've been trying many things, but although the PolicyKit.conf file looks the same (no "admin" line) now things that need a password to "unlock" seem to be working (network-admin and users-admin, for instance, and time change). i.e. "unlock" doesn't freeze and return with an error. i can't figure out why. these also work the same way for another user i created that's _not_ in the admin group.
adding the <define_admin_auth> line to PolicyKit.conf seems to make no difference either way.
also, running users-admin or network-admin with sudo still has a greyed-out "Unlock" button and gives the error " ** (users- admin:11074) : CRITICAL **: Unable to lookup session information for process '11074'" (i.e. it can't look up session info for itself!). however, since PolicyKit inexplicably now prompts for the password instead of freezing when i press unlock after running the command without sudo, there's no need to run it with sudo.
$ polkit-auth --show-obtainable .systemtoolsbac kends.set .systemtoolsbac kends.self. set clockapplet. mechanism. settimezone clockapplet. mechanism. settime clockapplet. mechanism. configurehwcloc k .policykit. read .policykit. revoke .policykit. grant .policykit. modify- defaults .hal.power- management. shutdown- multiple- sessions .hal.power- management. reboot- multiple- sessions .hal.storage. mount-fixed .hal.storage. unmount- others .hal.storage. crypto- setup-fixed
org.freedesktop
org.freedesktop
org.gnome.
org.gnome.
org.gnome.
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
org.freedesktop
the difference between the previous output is only because i went and revoked all permissions i'd explicitly granted to my user "rishab" so there are a few more "obtainable" items.
i think there must be a problem with how PolicyKit is set up to check console activity, since the external USB drive installation was always authorised for the active console. hal detects the device fine, just doesn't auto-mount:
$ hal-device
0: udi = '/org/freedeskt op/Hal/ devices/ volume_ uuid_D207_ 0B13' partition. type = '0x06' (string) partition. label = '' (string) partition. uuid = '' (string) partition. flags = { 'boot' } (string list) hotplug_ type = 3 (0x3) (int) op.Hal. Device. Volume. method_ names = { 'Mount', 'Unmount', 'Eject' } (string list) op.Hal. Device. Volume. method_ signatures = { 'ssas', 'as', 'as' } (string list) op/Hal/ devices/ volume_ uuid_D207_ 0B13' (string) op.Hal. Device. Volume. method_ argnames = { 'mount_point fstype extra_options', 'extra_options', 'extra_options' } (string list) op.Hal. Device. Volume. method_ execpaths = { 'hal-storage- mount', 'hal-storage- unmount' , 'hal-storage-eject' } (string list) mount.valid_ options = { 'ro', 'sync', 'dirsync', 'noatime', 'nodiratime', 'noexec', 'quiet', 'remount', 'exec', 'utf8', 'shortname=', 'codepage=', 'iocharset=', 'umask=', 'dmask=', 'fmask=', 'uid=', 'flush' } (string list)
volume.
volume.
volume.
volume.
volume.ignore = false (bool)
linux.
storage.model = '' (string)
org.freedeskt
info.product = 'PKBACK# 001' (string)
org.freedeskt
info.capabilities = { 'volume', 'block' } (string list)
info.udi = '/org/freedeskt
org.freedeskt
info.category = 'volume' (string)
org.freedeskt
volume.
[...]
thanks,
-rishab