Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NAS-114945 / 22.02.1 / Expand warning for shell modifications #8322

Merged
merged 4 commits into from Feb 21, 2022

Conversation

anodos325
Copy link
Contributor

"CLI" is now ambiguous because it refers to the TrueNAS CLI (which
is a supported way of making changes).

@anodos325 anodos325 requested review from a team and Mrt134 February 21, 2022 14:42
@anodos325 anodos325 added the jira label Feb 21, 2022
@bugclerk
Copy link
Contributor

@bugclerk bugclerk changed the title Expand warning for shell modifications NAS-114945 / 22.02.1 / Expand warning for shell modifications Feb 21, 2022
"CLI" is now ambiguous because it refers to the TrueNAS CLI (which
is a supported way of making changes).
@yocalebo
Copy link
Contributor

retest this please

supported and may result in breaking the TrueNAS appliance.
Warning: the supported mechanisms for making configuration changes
are the TrueNAS WebUI, CLI, and API exclusively. ALL OTHERS ARE
NOT SUPPORTED AND WILL RESULT IN UNEXPECTED BEHAVIOR AND MAY

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm partial to "undefined" behavior instead of "unexpected".

@stephendt
Copy link

stephendt commented Feb 22, 2022

Should probably specifically mention that the usage of package managers for updates is likely to break their system, just in case someone wants to configure automatic updates via Cron or something.

@anodos325
Copy link
Contributor Author

Should probably specifically mention that the usage of package managers for updates is likely to break their system, just in case someone wants to configure automatic updates via Cron or something.

Currently, we are protected from this by having apt-related binaries being non-executable (balancing act between allowing people to make informed decisions and helping avoid foot-shooting). We could probably make same with package management tools in Core.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
6 participants