summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorKlemens Nanni <klemens@posteo.de>2020-11-22 23:42:02 +0100
committerAndreas Rammhold <andreas@rammhold.de>2020-12-16 03:40:29 +0100
commit8833983f261c6afa0361465f31c4dbc39c45b386 (patch)
treeefab8ed7006a9c87c0fedc521d3be5acf6de363b /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent5d5e970ce04933576957dfbf99cb7d4c1802c60d (diff)
nixos/users-groups: createHome: Ensure HOME permissions, fix description
configuration.nix(1) states users.extraUsers.<name>.createHome [...] If [...] the home directory already exists but is not owned by the user, directory owner and group will be changed to match the user. i.e. ownership would change only if the user mismatched; the code however ignores the owner, it is sufficient to enable `createHome`: if ($u->{createHome}) { make_path($u->{home}, { mode => 0700 }) if ! -e $u->{home}; chown $u->{uid}, $u->{gid}, $u->{home}; } Furthermore, permissions are ignored on already existing directories and therefore may allow others to read private data eventually. Given that createHome already acts as switch to not only create but effectively own the home directory, manage permissions in the same manner to ensure the intended default and cover all primary attributes. Avoid yet another configuration option to have administrators make a clear and simple choice between securely managing home directories and optionally defering management to own code (taking care of custom location, ownership, mode, extended attributes, etc.). While here, simplify and thereby fix misleading documentation.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions