-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add +t (sticky bit) to default omero_server_datadir_managedrepo_mode #32
base: master
Are you sure you want to change the base?
Conversation
Re the Ansible 2.4 minimal requirement, this might be the moment to start planning what it would involve across the board. Step 1 might be to come back to ome/ome-ansible-molecule#10 and review our Ansible ecosystem. |
The biggest barrier is rewriting the molecule tests for molecule 2.x, all the roles used by the IDR (which should cover most of our galaxy roles) work fine with Ansible 2.4. |
It might be worth for checking if there are any complications when it comes to deleting files, particularly for e.g. in-place imports or any situation where the user performing the deletion is not the owner of the directory with the sticky bit, and/or the owner of the content to be deleted in this directory. |
It's a plausible change but probably also requires opinion from @joshmoore as I'm really not sure. |
So this is a point of confusion for me. I would actually say that the deletion only matters in the sense whether or not I understand that we constantly worry about who can do this and that diractly manipulating the ManagedRepo dir, but I think I have proven that this is safe already. Where am I making a mistake in my musing above ? |
So here are my assumptions when I look at this:
i.e. this is safe but doesn't necessarily enable much. We'd need to see how to have the next few levels of directories created in the same fashion. I haven't thought through cases where |
I have started on a testing matrix as encouraged by @manics . Please let me know if you find that testing sufficient. @joshmoore Seeing the columns L and M of this testing matrix, does it not disprove your assumption about non-propagation of perms into lower level dirs ?
|
Yes, but now I have something a bit worrying. See the cell P5 in https://docs.google.com/spreadsheets/d/1m27kar8CzCFJEyvQprkvsANUQrmC9b5TYMzacYD9b98/edit#gid=0 |
@pwalczysko : I agree with your spreadsheet that there is at least one other dimension to consider: fresh repo vs. re-used repo. |
Analysing the situation with @manics and @mtbc we concluded that the problem noticed in the cell P5 in https://docs.google.com/spreadsheets/d/1m27kar8CzCFJEyvQprkvsANUQrmC9b5TYMzacYD9b98/edit#gid=0 is an OMERO Bug which is not specific to this setup, but to any in-place import setup. |
After a discussion with @pwalczysko over ome/omero-documentation#1873 we realised the current outreach playbook has the
+t
permission on the managed repo: https://github.com/openmicroscopy/prod-playbooks/blob/51ddfa88c52248e2affa4300eb73df488be99efd/training-server.yml#L218It sounds like this may be a good idea but could do with some input from @rleigh-codelibre @mtbc
Note this requires Ansible 2.4 so travis will fail with
bad symbolic permission for mode: +t
, though we can discuss this change as part of https://trello.com/c/SsE1sGqR/184-in-place-import-doc-is-unclear