-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce a way to set file properties recursively (e.g. SetFileProperty --recursive
)
#26
Comments
What's I'm also using EFI boot with the ESP mounted on |
It's rather owned by |
I think an But, unfortunately, can't. Edit It does respect SetFileProperty /var/lib/bluetooth mode 700
SetFileProperty /var/lib/colord group colord
SetFileProperty /var/lib/colord owner colord
SetFileProperty /var/lib/libvirt/qemu/channel group kvm
SetFileProperty /var/lib/libvirt/qemu/channel owner nobody
SetFileProperty /var/lib/libvirt/qemu/ram group kvm
SetFileProperty /var/lib/libvirt/qemu/ram owner nobody
SetFileProperty /var/lib/libvirt/qemu group kvm
SetFileProperty /var/lib/libvirt/qemu owner nobody
SetFileProperty /var/lib/unifi/data group unifi
SetFileProperty /var/lib/unifi/data owner unifi
SetFileProperty /var/lib/unifi/run group unifi
SetFileProperty /var/lib/unifi/run owner unifi
SetFileProperty /var/lib/unifi/work group unifi
SetFileProperty /var/lib/unifi/work owner unifi
SetFileProperty /var/log/journal group systemd-journal
SetFileProperty /var/log/unifi group unifi
SetFileProperty /var/log/unifi owner unifi All are created when installing or using corresponding software, and I trust them to be able to set their own permissions correctly, but would still like to keep some configs located deeper in some of these. |
I don't disagree, but
Unless that's on a filesystem that doesn't support UNIX permissions (like FAT32), that looks like a problem better solved elsewhere. The permission flags 777 are potentially dangerous, as they allow any process running under any user to modify those files, and change the behavior of software invoking those node modules, potentially causing a privilege elevation.
Those look right. Any idea why they deviate from the packaged directory properties on your system, and any reason not to delete those lines from your configuration and allow One reason I've encountered (rarely) is that two packages sometimes include the same directory path, but with different permissions. In this case, ignoring it (or keeping the latter's value in your configuration) is necessary. One might be inclined to say that it is a bug in one of the packages, as the resulting filesystem will then depend on the order in which they are installed. |
Thanks for the reply!
This is out of my hands, unfortunately: npm/npm#9359 However, I went ahead and reinstalled
Looked into
I'm going to do that. I'm using Another
Though I feel like this is deviating a bit from the main topic. Where can we discuss this, if you don't mind? Doesn't feel like worth filing a new issue (yet). |
Something's not right.
It sounds like in this case, the files were initially installed by pacman, then upgraded by npm? In any case, running programming languages' package managers as root is often not recommended for this very reason: they conflict with the distribution's package manager. If the program is needed by the root user or multiple system users, it should be packaged appropriately as a distro package; for single users, they're better off installed under the user's home directory (see e.g. here for npm).
I think it's worth reporting this to packages which wrongly create globally writable objects on the filesystem.
I agree, sounds strange. Might be worth looking at the
That looks like it's created by tmpfiles. Maybe at some point aconfmgr will learn to read systemd's tmpfiles (as a plugin or such), but for now they have to be repeated in the configuration.
I haven't thought about setting up / adopting a medium for open-ended discussion yet. I suppose we could use Reddit or the Arch Linux forums, or create an IRC channel. |
Your suggestion sounds good to me! Assertion is definitely better that just outright ignoring (AKA sweeping under the rug). Say, |
That doesn't sound necessary to me; the entire configuration is already, in a way, asserting that the system has a certain state. You know that the assertion no longer holds when |
Ah, right, the "There are changes, proceed?" applies to properties too. Sorry, haven't run an |
SetFileProperty --recursive
)
So, what's the current take on this?
|
Fun. Is it the systemd maintainers' consensus that ESP |
With ESP typically being formatted as vfat, it basically requires a I also tried to hack some solutions like |
That is a pickle. It might be worth asking the Arch folks if they were thinking about making files in packages (that have files under |
The directory
/boot
is often formatted vfat. Thus, lots of files are detected having wrong permissions with a recommendation:SetFileProperty /boot/cmdline.txt mode 755
It would be nice to be able to mark the whole mount point
/boot
to disregard file permissions at all. ConsiderIgnorePermissionsPath '/boot/*'
The text was updated successfully, but these errors were encountered: