-
Notifications
You must be signed in to change notification settings - Fork 119
docs/users-and-groups: expand on static users and systemd-sysusers #1261
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
cc @keszybz |
5b5c5a1
to
dd376c4
Compare
These directives will adjust the access mode, user and group ownership and the SELinux security context as | ||
stated on the doc linked above. | ||
|
||
For example, if we need a on "/var/lib/my_file.conf" to be part of the tss group but owned by root |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Typo here "a on"
Co-authored-by: Colin Walters <walters@verbum.org> Signed-off-by: Colin Walters <walters@verbum.org> Signed-off-by: Joseph Marrero Corchado <jmarrero@redhat.com>
I was later to the review, but here are some comments anyway:
I don't know when this was written, but nowadays it's quite wrong. There are multiple other mechanisms to pass credentials other than SMBIOS.
With https://fedoraproject.org/wiki/Changes/RPMSuportForSystemdSysusers, this is now not true for
We recommend the file to be named after the package. So this probably should be
Using sysusers.d doesn't really matter or solve anything. systemd-sysusers intentionally implements the same allocation policy, dynamic by default, as the scriptlets specified in the Fedora Packaging Guidelines.
Extra ".conf" here. We wouldn't have a config file in -- The big problem with this text is that it doesn't explain the problem adequately, and it doesn't offer a solution that people can select&paste into their own stuff. After doing packaging for a while, I know that if you offer people a menu of low-level options like this, most people will just ignore it, and a few will use it in very creative ways. I think that there needs to be a simple recipe like "If you have this situation, do this, and otherwise, if this, then that, otherwise something else.". Using tmpfiles to set file ownership during boot is a useful workaround, but it has caveats. One is that systemd-tmpfiles is called during not-too-early boot, so the service that wants to use the files cannot start too early. This shouldn't be a issue for most services though, but might be worth mentioning. Second, bigger, issue is that for this to work reliably the file must be owned by |
https://docs.fedoraproject.org/en-US/bootc/authentication/ links to this page instead of copying the info, so we should be OK. This doc is 99% Colin's modifications.