-
-
Notifications
You must be signed in to change notification settings - Fork 362
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NUT sudo make install
creates paths not chown'ed to run-time user accounts
#1298
Labels
CI
Entries related to continuous integration infrastructure (historically also recipes like Makefiles)
packaging
portability
We want NUT to build and run everywhere possible
service/daemon start/stop
General subject for starting and stopping NUT daemons (drivers, server, monitor); also BG/FG/Debug
Milestone
Comments
jimklimov
added
CI
Entries related to continuous integration infrastructure (historically also recipes like Makefiles)
service/daemon start/stop
General subject for starting and stopping NUT daemons (drivers, server, monitor); also BG/FG/Debug
labels
Feb 15, 2022
This was referenced Feb 15, 2022
jimklimov
added
packaging
portability
We want NUT to build and run everywhere possible
labels
Apr 4, 2024
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 9, 2025
Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 10, 2025
…orkupstools#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
…s like /run /var/run /etc [networkupstools#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
…make install-as-root` [networkupstools#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
…stall" of new files and creation/ownership/restart of new artifacts [networkupstools#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
…stools#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
to jimklimov/nut
that referenced
this issue
Jan 11, 2025
…s#1298] Signed-off-by: Jim Klimov <jimklimov+nut@gmail.com>
jimklimov
added a commit
that referenced
this issue
Jan 15, 2025
Makefile.am, configure.ac, NEWS.adoc: implement `make install-as-root` [#1298]
PR above should solve this, even with service (re)start attempts for a number of platforms. More ideas popped up during that work, delayed to 2.8.4 as it is expected to deal with vanilla/reference packaging recipes - which crosses paths with this issue. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
CI
Entries related to continuous integration infrastructure (historically also recipes like Makefiles)
packaging
portability
We want NUT to build and run everywhere possible
service/daemon start/stop
General subject for starting and stopping NUT daemons (drivers, server, monitor); also BG/FG/Debug
(Related to #1296 and #1297)
Filesystem objects created by plain
make install
remain owned by the user who made them (unprivileged in test installs to a scratch DESTDIR, root in "custom production" builds). NUT daemons are pre-configured to run as an unprivileged account (nobody:nogroup
,nut:nut
, etc.) and corresponding paths get that ownership (andchmod
access constraints) in package metadata - but not in a plain local installation that bypasses packaging, so e.g./var/state/ups
owned byroot:root
(and in fact not created bymake install
) can not house state, pid (#1299) and pipe files for drivers and upsd; the /usr/local/ups/etc is not protected from the world reading it, etc.Proposed solution: add a recipe like
make install-own
(depends oninstall
, and separated to avoid conflicts for existing use-cases in dist, packaging, etc.) that would try to apply ownership+permissions according toconfigure
script choices. Or revise if existinginstall
recipe tries to do the right thing but for some reason fails to (without faulting themake
call)?..The text was updated successfully, but these errors were encountered: