You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 17, 2019. It is now read-only.
I've encountered another annoyance that occurs when a directory in Windows is mapped to a shared folder in virtualbox, and subsequently mounted as a volume in a docker container (though really this issue is at the virtualbox layer; not so much an issue with docker).
The problem is that there is no obvious mapping between UNIX-style file permissions and Windows file permissions. There is some discussion about this in virtualbox's trac. What it ends up doing by default is setting all files in the mounted share folder to have a default mode of 777. Actual attempts to read and/or write these files will aren't necessarily affected by these modes, and will depend on the true permissions of the underlying NTFS filesystem. This is annoying and misleading for a few reasons:
File and directory modes don't necessarily mean what they say they mean. In most applications this isn't a problem so long as errors are properly handled in filesystem operations.
All files are marked as executable by default.
Because the default permissions are so permissive, some software complains about that (particularly when mounted as the user's home directory). I ran into this, for example, because Python won't add '' to sys.path if the home directory's permissions are too permissive, as a safety measure. This breaks a common expectation in Python and also produces an annoying warning when starting Python. Sage also outputs a message about trying to fix the permissions on DOT_SAGE (an action which still fails).
It is possible to change the default permissions with the fmode and dmode mount options for the vboxsf filesystem. I will propose for boot2docker that they consider changing these defaults to something less permissive, like 700. Normally I'd say files shouldn't be executable by default either. However, if we didn't mark files as executable, any attempt to do so after the fact fails. This could be confusing if a user tries to run a file that they expect to be executable. That said it could also be a security hazard, so I have mixed feelings.
The text was updated successfully, but these errors were encountered:
When mounting C:\Users and the like, at least on Windows (I'm not sure if this is the same if the host OS is OSX in which case this might need adjusting) all files are given mode `777`. This is a problem for a few reasons that I listed in sagemath/docker-images#19
Setting `600` for files seems to make sense, since for directories under `/Users`/`C:\Users` most files should be private anyways. I'm split on whether files should be executable or not, but ultimately going with not to be on the safe side.
I've encountered another annoyance that occurs when a directory in Windows is mapped to a shared folder in virtualbox, and subsequently mounted as a volume in a docker container (though really this issue is at the virtualbox layer; not so much an issue with docker).
The problem is that there is no obvious mapping between UNIX-style file permissions and Windows file permissions. There is some discussion about this in virtualbox's trac. What it ends up doing by default is setting all files in the mounted share folder to have a default mode of 777. Actual attempts to read and/or write these files will aren't necessarily affected by these modes, and will depend on the true permissions of the underlying NTFS filesystem. This is annoying and misleading for a few reasons:
''
tosys.path
if the home directory's permissions are too permissive, as a safety measure. This breaks a common expectation in Python and also produces an annoying warning when starting Python. Sage also outputs a message about trying to fix the permissions on DOT_SAGE (an action which still fails).It is possible to change the default permissions with the
fmode
anddmode
mount options for thevboxsf
filesystem. I will propose for boot2docker that they consider changing these defaults to something less permissive, like700
. Normally I'd say files shouldn't be executable by default either. However, if we didn't mark files as executable, any attempt to do so after the fact fails. This could be confusing if a user tries to run a file that they expect to be executable. That said it could also be a security hazard, so I have mixed feelings.The text was updated successfully, but these errors were encountered: