From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.io/gmane.comp.sysutils.supervision.general/637 Path: main.gmane.org!not-for-mail From: Charles Duffy Newsgroups: gmane.comp.sysutils.supervision.general Subject: Re: Invoking runsvctrl as non-root Date: Tue, 30 Nov 2004 21:03:21 -0600 Message-ID: References: <1101863206.3060.236.camel@localhost.localdomain> NNTP-Posting-Host: deer.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-Trace: sea.gmane.org 1101871833 20407 80.91.229.6 (1 Dec 2004 03:30:33 GMT) X-Complaints-To: usenet@sea.gmane.org NNTP-Posting-Date: Wed, 1 Dec 2004 03:30:33 +0000 (UTC) Original-X-From: supervision-return-876-gcsg-supervision=m.gmane.org@list.skarnet.org Wed Dec 01 04:30:29 2004 Return-path: Original-Received: from antah.skarnet.org ([212.85.147.14] ident=qmailr) by deer.gmane.org with smtp (Exim 3.35 #1 (Debian)) id 1CZLCG-0000TE-00 for ; Wed, 01 Dec 2004 04:30:29 +0100 Original-Received: (qmail 12931 invoked by uid 76); 1 Dec 2004 03:30:49 -0000 Mailing-List: contact supervision-help@list.skarnet.org; run by ezmlm List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Archive: Original-Received: (qmail 12925 invoked from network); 1 Dec 2004 03:30:49 -0000 X-Injected-Via-Gmane: http://gmane.org/ Original-To: supervision@list.skarnet.org Original-Lines: 12 Original-X-Complaints-To: usenet@sea.gmane.org X-Gmane-NNTP-Posting-Host: user-0ccss7l.cable.mindspring.com User-Agent: Pan/0.14.2.91 (As She Crawled Across the Table (Debian GNU/Linux)) Original-Sender: news Xref: main.gmane.org gmane.comp.sysutils.supervision.general:637 X-Report-Spam: http://spam.gmane.org/gmane.comp.sysutils.supervision.general:637 On Tue, 30 Nov 2004 17:06:46 -0800, Anthony Baker wrote: > I'm running into a permissions issue trying to invoke runsvctrl as a > non-root user As the message implies, you need to give some permissions to the user you want to allow runsvctrl and runsvstat -- most particularly, write access to the socket ./supervise/control and read access to ./supervise/ok and ./supervise/status. As an aside, I find that this sort of thing is easier if you have POSIX ACLs available.