ports/sysutils/catfish/files/patch-catfish_CatfishWindow.py
Guido Falsi 148a54de25 - Update catfish to 1.4.10
- Upstream removed gksu support, escalation now provided by polkit
  and/or sudo
- Install man page in correct location and compress it
- Silence some portlint warnings

Extra pathces provided by Olivier Duchateau <duchateau.olivier@gmail.com>
2019-09-13 15:46:26 +00:00

28 lines
1.3 KiB
Python

--- catfish/CatfishWindow.py.orig 2019-07-27 11:21:22 UTC
+++ catfish/CatfishWindow.py
@@ -22,6 +22,7 @@ import logging
import mimetypes
import os
import subprocess
+import sys
import time
from locale import gettext as _
from shutil import copy2, rmtree
@@ -738,9 +739,15 @@ class CatfishWindow(Window):
self.update_index_unlock.set_sensitive(False)
if SudoDialog.prefer_pkexec():
- self.updatedb_process = SudoDialog.env_spawn('pkexec updatedb', 1)
+ if sys.platform.startswith('linux'):
+ self.updatedb_process = SudoDialog.env_spawn('pkexec updatedb', 1)
+ elif 'bsd' in sys.platform or sys.platform.startswith('dragonfly'):
+ self.updatedb_process = SudoDialog.env_spawn('pkexec /usr/libexec/locate.updatedb', 1)
else:
- self.updatedb_process = SudoDialog.env_spawn('sudo updatedb', 1)
+ if sys.platform.startswith('linux'):
+ self.updatedb_process = SudoDialog.env_spawn('sudo updatedb', 1)
+ elif 'bsd' in sys.platform or sys.platform.startswith('dragonfly'):
+ self.updatedb_process = SudoDialog.env_spawn('sudo /usr/libexec/locate.updatedb', 1)
try:
# Check for password prompt or program exit.
self.updatedb_process.expect(".*ssword.*")