-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
/run/secrets.d/ generations not accessible to "keys" group #415
Comments
Interesting. For me the permissions look differently:
You actually no longer need the keys group for the most part. You can give users/groups read-access to a secret without them being part in the secret group. They just cannot list the directory otherwise. |
Updated documentation: 9de50ec |
Indeed. The permissions of the folder become similar to yours after a system reboot. |
@Mic92, I finally understood what happens here. This is actually not resolved by a server restart. My configuration is using the Is this an issue with |
IMHO the bug is there in users.ldap; that snippet should run in a subshell to not leak umask to other activation snippets. |
The documentation recommends to add users that need to access secrets to also belong to the
keys
group. I believe the reason for this is that the parent folders to the actual secret are owned byroot:keys
.In my case it seems that
/run/secrets.d
is indeed accessible toroot
user and thekeys
group, but any generations inside thesecrets.d
folder are chmod'ed only to allowroot
owner access, notkeys
group:when I would actually expect
I cannot fix this permanently, only one-off but any further rebuild would reset permissions for the next generation
The text was updated successfully, but these errors were encountered: