-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixup update framework permissions #123
Conversation
Signed-off-by: Ettore Di Giacinto <edigiacinto@suse.com>
blargh still fails..locally didn't!?! |
can reproduce:
💩 weird, becuase it seems to have the proper perms??
|
goddammit,
once given +x attributes, then you can list and add those files to git ¬_¬ I wonder if the package is broken? |
yep, comes from the packages. I guess oem should have at least x permissions for the user/group so we can list files on it |
perm wise that looks good, ideally we want only root to be able to look at those, which is inline with the perms that are coming from the package.. it is so annoying that as root you can add them that easily :D |
No, it's wrong. It a dir doesn't have the execute permission for at least the user, then you can't ls its contents, can you? Compare it with the /system dir that gets extracted, that has the proper perms so you can list whatever is in there. So if you want to access the files on a directory, no matter if those files are 777, you won't get to access them if the dir they are in doesn't have the execute perm. So I'm guessing git is trying to list them and failing to do so, hence the failure to create a pr. Adding the +x perm to this dir before the PR is a must. |
Damn, sorry for the text block, writing from a phone sucks lol |
yeap I see this, but, on the other hand this is completely acceptable from a system perspective. Do we want users beside root to list those content? I'm just not sure if adding +x here is the correct thing to do |
mmm Indeed we do set it explictly https://github.com/rancher-sandbox/cOS-toolkit/blob/cfd2845f33ee089fa6f74d5313f2959679f06d63/packages/cloud-config/build.yaml#L12 |
so it looks like imho, the whole thing should have been:
but on the spec I just see |
Yep that seems right, I mean if we got read perms to the sir, we should have permission to enter IMHO, then file permissions should make sure that only owner or owner+group can read them |
Otherwise fails for the permissions while committing changes
Signed-off-by: Ettore Di Giacinto edigiacinto@suse.com