Return-Path: Delivered-To: apmail-repository-archive@www.apache.org Received: (qmail 78152 invoked from network); 23 Aug 2007 09:54:07 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 23 Aug 2007 09:54:06 -0000 Received: (qmail 32109 invoked by uid 500); 23 Aug 2007 09:54:03 -0000 Delivered-To: apmail-repository-archive@apache.org Received: (qmail 32000 invoked by uid 500); 23 Aug 2007 09:54:03 -0000 Mailing-List: contact repository-help@apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: Reply-To: repository@apache.org List-Id: Delivered-To: mailing list repository@apache.org Received: (qmail 31989 invoked by uid 99); 23 Aug 2007 09:54:03 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 23 Aug 2007 02:54:03 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of carlossg@gmail.com designates 64.233.166.178 as permitted sender) Received: from [64.233.166.178] (HELO py-out-1112.google.com) (64.233.166.178) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 23 Aug 2007 09:54:02 +0000 Received: by py-out-1112.google.com with SMTP id y63so827851pyg for ; Thu, 23 Aug 2007 02:53:41 -0700 (PDT) DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=Srrp1mCSC5FoseUdcb2o+T/7OKkONijGtNb+3TM6wNekEGqlDgFEI5S7fixzu6A1EU3GJPKxGuJjgaydaLf1qttFY80rZPCYqfzyXotKj8H7jalZL2O6uJ4vVrqSwHLymGlr5ax2I3n5yCrMvnyoQ3v+DyPa/ahKUVH7Uhq4Cwg= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=Xoj5glLHeC6tezUnPTQbMHuxmZfgG3/Jh+MSMkOvzFhTFCvtcSWNdQiBbFoYMZlApUIFx9Nw8CeAOdmu3xbMYMLhGEmR7siU4LYCUwIPf6ZEHW+txNp7kHBpqEhIUGonFQHwfjHeSdJanTWOYh/93Gh1mDmLswmptv7jATB4gHI= Received: by 10.65.151.6 with SMTP id d6mr2884842qbo.1187862820766; Thu, 23 Aug 2007 02:53:40 -0700 (PDT) Received: by 10.65.15.10 with HTTP; Thu, 23 Aug 2007 02:53:40 -0700 (PDT) Message-ID: <1a5b6c410708230253s44f96aa7mefec4e91860acd65@mail.gmail.com> Date: Thu, 23 Aug 2007 11:53:40 +0200 From: "Carlos Sanchez" Sender: carlossg@gmail.com To: repository@apache.org Subject: Re: fix-permissions.sh and sudo Cc: "Infrastructure Apache" In-Reply-To: <5a75db780708221445m7d1c99e5u4ce6717559a3ed8b@mail.gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <1a5b6c410708221224v4e1b5c8fgc72a42931299c1c2@mail.gmail.com> <5a75db780708221445m7d1c99e5u4ce6717559a3ed8b@mail.gmail.com> X-Google-Sender-Auth: 9d207899abd67432 X-Virus-Checked: Checked by ClamAV on apache.org it's users misconfiguration of their deployment settings in maven On 8/22/07, Luciano Resende wrote: > Stepping back a little, what's the cause for the problem that requires > us to have the fix-permission.sh in place ? Is this a maven bug or a > maven misconfiguration, that does not set the right permissions when > artifacts are deployed ? > > On 8/22/07, Carlos Sanchez wrote: > > why then not just add it to cron? > > > > On 8/22/07, David Blevins wrote: > > > I'm not sure if this is the right list for this, so feel free to move > > > it to one or the other. > > > > > > I think we should sudo enable the fix-permission.sh[1] script as > > > running this script is something a monkey could do, so why not have > > > the monkey trying to deploy something do that work. It pains me to > > > have to bug Joe or someone else root enabled to do such trival things. > > > > > > I'm willing to put some work into this and am asking for feedback. > > > Namely, who should be able to run this script and on which parts of > > > the snapshot repo? > > > > > > IMHO, anyone should be able to run it on any part of the snapshot > > > repo and we can just leave it on people's honor to stick to areas > > > they know. Alone those lines we could simply cripple the script so > > > it can't run on org/apache preventing any mistakes -- not that there > > > would be any real consequences to those mistakes. > > > > > > Most people just move the offending directory aside and deploy their > > > stuff anyway when they find something a peer had deployed with > > > default perms which do not allow anyone else but them to write. Of > > > course then someone with root has to go and clean up the "backed up" > > > directory and as well the project looses any previously deployed snaps. > > > > > > Seems if we sudo enabled the fix-permissions.sh we could allow people > > > to do what they are already doing, but more appropriately and without > > > bugging a root. > > > > > > Thoughts? > > > > > > -David > > > > > > [1] /www/people.apache.org/repo/m2-snapshot-repository/fix- > > > permissions.sh > > > > > > > > > > > > > > > > > > > > > -- > > I could give you my word as a Spaniard. > > No good. I've known too many Spaniards. > > -- The Princess Bride > > > > > -- > Luciano Resende > Apache Tuscany Committer > http://people.apache.org/~lresende > http://lresende.blogspot.com/ > -- I could give you my word as a Spaniard. No good. I've known too many Spaniards. -- The Princess Bride