Summary: | portage.py(mergeme) failes to change permission/ownership of a directory ${ROOT}/dir if ${IMAGE}/dir has different ownership/permissions. | ||
---|---|---|---|
Product: | Portage Development | Reporter: | Daniel Black (RETIRED) <dragonheart> |
Component: | Core | Assignee: | Portage team <dev-portage> |
Status: | RESOLVED WONTFIX | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=607430 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Daniel Black (RETIRED)
![]() I don't think this is something portage can legitimately do. Portage shouldn't modify your directory permissions. More food for reconsideration: A version bumped ebuild will not be able to change the permissions on a directory even if the directory was created by a previous ebuild with different ownership/permissions? This introduces an inconsistency with the way portage handles directories different from files. If an ebuild creates a file, and the file exists in the ${ROOT} directory, it will be overwriten regardless of its permissions/ownership. How is a directory different? So to legitimately update the directory you would need to emerge -C the previous version and reemerge the update to get the correct permissions directories? If a security fix requires a permission/ownership change on a directory, is a "emerge security" going to be able to fix it (without using pkg_postinst? the permissions shouldnt get changed by an incoming ebuild ... the problem is that, how is portage to know which permissions are the correct set ? some users like to tweak permissions on their dirs; they'd get pissed if portage kept turning around and resetting them on them ... so yes, the only real way to work around bum initial permissions is to have pkg_postinst do it up for you :/ |