Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Permissions of mounted /data folder get set to PUID and PGID and all other permissions removed #367

Closed
1 task done
rottenkumquat opened this issue Sep 20, 2023 · 8 comments

Comments

@rottenkumquat
Copy link

Is there an existing issue for this?

  • I have searched the existing issues

Current Behavior

Permissions for the share mounted as /data are set to the permissions of the configured PUID and PGID. All other users and groups get removed.

Expected Behavior

Leave permissions alone?

Steps To Reproduce

..

Environment

- OS: Synology DMS 7.2
- How docker service was installed: Container Manager

CPU architecture

x86-64

Docker creation

Container Manager

Container logs

..
@github-actions
Copy link

Thanks for opening your first issue here! Be sure to follow the relevant issue templates, or risk having this issue marked as invalid.

@j0nnymoe
Copy link
Member

Permissions of that mount need to be set to the same uid/gid that nextcloud is running as so it can manage those files. Nextcloud is designed to work like this and ideally you shouldn't just be directly accessing that folder.

@rottenkumquat
Copy link
Author

That is fine and all. But what justification is there for removing other permissions I set there?

@j0nnymoe
Copy link
Member

The files need to be owned by the user of the container. Realistically you shouldn't be changing anything inside that folder anyways. If you -must-, just make your user have the same group as you're running for the container.

@rottenkumquat
Copy link
Author

Funny you should say that, because ownership is not changed.

@thespad
Copy link
Member

thespad commented Sep 21, 2023

You're running on Synology which means it applies its own ACLs over the filesystem, which are impossible for us to see or modify from inside the container. Setting the raw Linux permissions will reset the ACLs and there's not a clean solution to that. However, we only chown the root of /data so any folders under that can have ACLs set without being affected.

@LinuxServer-CI
Copy link
Collaborator

This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions.

@drizuid drizuid closed this as not planned Won't fix, can't repro, duplicate, stale Nov 18, 2023
Copy link

This issue is locked due to inactivity

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Dec 19, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
Archived in project
Development

No branches or pull requests

5 participants