-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Closed as not planned
Labels
feature requestRequesting a new featureRequesting a new featurep3-nice-to-haveIt should be done this or next sprintIt should be done this or next sprint
Description
This is not a problem I perceived directly, but got as feedback from the data science team.
Let's say someone on the team mistakenly ran dvc repro with sudo, generating output files that have strict read permissions. This person then pushes the hashes to git remote and the files to dvc remote. Now the rest of the team can't reproduce the pipeline without sudoeing out the wrong permissions first. To prevent this from happening, it would be cool if DVC issued a warning for files being pushed with weird permissions.
pared and efiop
Metadata
Metadata
Assignees
Labels
feature requestRequesting a new featureRequesting a new featurep3-nice-to-haveIt should be done this or next sprintIt should be done this or next sprint