diff options
author | Martin Whitaker <mageia@martin-whitaker.me.uk> | 2019-06-21 21:47:37 +0100 |
---|---|---|
committer | Martin Whitaker <mageia@martin-whitaker.me.uk> | 2019-06-21 22:02:44 +0100 |
commit | f8c0d00fa23a094173dbe17ef4644f860f871f20 (patch) | |
tree | 6775d8a64fdb02c0504982a7b0817cdf4725ada1 /urpm/media.pm | |
parent | 3d029f70096cefbba5836b49d5fde9bb613999cf (diff) | |
download | urpmi-f8c0d00fa23a094173dbe17ef4644f860f871f20.tar urpmi-f8c0d00fa23a094173dbe17ef4644f860f871f20.tar.gz urpmi-f8c0d00fa23a094173dbe17ef4644f860f871f20.tar.bz2 urpmi-f8c0d00fa23a094173dbe17ef4644f860f871f20.tar.xz urpmi-f8c0d00fa23a094173dbe17ef4644f860f871f20.zip |
Ensure urpmi config and cache files are world-readable (mga#24636)
This is needed to allow mgaapplet and urpm* commands run as a
normal user to work when run from a gdm-x-session, which sets
the umask to 027.
See also mga#9386 and mga#22262. We should perhaps take notice
of the msec security level.
Diffstat (limited to 'urpm/media.pm')
-rw-r--r-- | urpm/media.pm | 16 |
1 files changed, 12 insertions, 4 deletions
diff --git a/urpm/media.pm b/urpm/media.pm index cadfc173..52575ff0 100644 --- a/urpm/media.pm +++ b/urpm/media.pm @@ -551,12 +551,14 @@ sub write_urpmi_cfg { }; remove_passwords_and_write_private_netrc($urpm, $config); - # urpmi.cfg must be world-readable, else mgaapplet won't be able to read it - # as it is executed from the user session. We enforce umask here in the case - # where the msec security level is set to 'secure' (which means umask 077). - umask 0022; + #- urpmi.cfg must be world-readable, else mgaapplet and urpm* commands run as + #- a normal user won't be able to read it. We enforce umask here in the case + #- where the msec security level is set to 'secure' (which means umask 077) + #- or where we are run from a gdm-x-session (mga#24636) + my $old_umask = umask 0022; urpm::cfg::dump_config($urpm->{config}, $config) or $urpm->{fatal}(6, N("unable to write config file [%s]", $urpm->{config})); + umask $old_umask; $urpm->{log}(N("wrote config file [%s]", $urpm->{config})); @@ -972,12 +974,18 @@ sub add_medium { $medium->{$_} = $options{$_} if exists $options{$_}; } + #- The medium files must be world-readable, else mgaapplet and urpm* commands run + #- as a normal user won't be able to read them. We enforce umask here in the case + #- where the msec security level is set to 'secure' (which means umask 077) or + #- where we are run from a gdm-x-session (mga#24636) + my $old_umask = umask 0022; #- those files must not be there (cf mdvbz#36267) _clean_statedir_medium_files($urpm, $medium); if (!($options{virtual} && _local_file($medium)) && !$urpm->{urpmi_root}) { # with --urpmi-root, we do not use statedir_media_info_file to allow compatibility with older urpmi mkdir statedir_media_info_dir($urpm, $medium), 0755; } + umask $old_umask; if ($options{virtual}) { $medium->{virtual} = 1; |