-
Notifications
You must be signed in to change notification settings - Fork 27
A possible alternative abstraction for permissions #377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
c34ce23
to
20d3b33
Compare
I've given this a bit of a test in https://github.com/continuouspipe/dockerfiles/tree/feature/use-abstracted-permissions with a few fixes for syntax but composer wasn't able to install. |
c7a3382
to
bb2ded4
Compare
Assumes for facl/stickybit that all users are umask 0002 It doesn't have the performance improvements of #332 yet, though I'm unsure if that's possible with setfacl
bb2ded4
to
0ecb594
Compare
Results from an experiment in a magento2 image, where we have
Then inside the container built from the image:
We could run another pass at setfacl upon container startup perhaps? |
Stickybit fares a lot better and is persisted between image layers, though we'd need to be even more careful who we create directories and files as. The umask for root/build/www-data is 0022, which means that any files created by root/www-data will not let the group we've declared (buildwww-data) write to it. This is probably okay as the existing
EDIT: This is also happening on the master branch, it's just the chmod+chown at the end of do_magento2_build hides this issue.
|
Assumes for setfacl/stickybit that all users are umask 0002
It doesn't have the performance improvements of #332 yet, though I'm unsure if that's possible with setfacl