blob: 6121c1d8535f0db4e8459c0f401626321212792c (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
|
--- catfish/CatfishWindow.py.orig 2019-07-27 11:21:22 UTC
+++ catfish/CatfishWindow.py
@@ -22,6 +22,7 @@ import logging
import mimetypes
import os
import subprocess
+import sys
import time
from locale import gettext as _
from shutil import copy2, rmtree
@@ -738,9 +739,15 @@ class CatfishWindow(Window):
self.update_index_unlock.set_sensitive(False)
if SudoDialog.prefer_pkexec():
- self.updatedb_process = SudoDialog.env_spawn('pkexec updatedb', 1)
+ if sys.platform.startswith('linux'):
+ self.updatedb_process = SudoDialog.env_spawn('pkexec updatedb', 1)
+ elif 'bsd' in sys.platform or sys.platform.startswith('dragonfly'):
+ self.updatedb_process = SudoDialog.env_spawn('pkexec /usr/libexec/locate.updatedb', 1)
else:
- self.updatedb_process = SudoDialog.env_spawn('sudo updatedb', 1)
+ if sys.platform.startswith('linux'):
+ self.updatedb_process = SudoDialog.env_spawn('sudo updatedb', 1)
+ elif 'bsd' in sys.platform or sys.platform.startswith('dragonfly'):
+ self.updatedb_process = SudoDialog.env_spawn('sudo /usr/libexec/locate.updatedb', 1)
try:
# Check for password prompt or program exit.
self.updatedb_process.expect(".*ssword.*")
|