From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE,RDNS_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 Received: (qmail 30331 invoked from network); 13 Mar 2020 10:17:01 -0000 Received-SPF: pass (primenet.com.au: domain of zsh.org designates 203.24.36.2 as permitted sender) receiver=inbox.vuxu.org; client-ip=203.24.36.2 envelope-from= Received: from unknown (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTP; 13 Mar 2020 10:17:01 -0000 Received: (qmail 16411 invoked by alias); 13 Mar 2020 10:16:54 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 45551 Received: (qmail 4014 invoked by uid 1010); 13 Mar 2020 10:16:54 -0000 X-Qmail-Scanner-Diagnostics: from rcpt-expgw.biglobe.ne.jp by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.2/25744. spamassassin: 3.4.2. Clear:RC:0(133.208.98.1):SA:0(-2.6/5.0):. Processed in 0.852147 secs); 13 Mar 2020 10:16:54 -0000 X-Envelope-From: takimoto-j@kba.biglobe.ne.jp X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at spf01.biglobe.ne.jp designates 133.208.98.1 as permitted sender) X-Biglobe-Sender: From: Jun T Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: P01privileged fails on CentOS/Fedora (a simple permission issue) Date: Fri, 13 Mar 2020 19:16:20 +0900 References: <2682CEC4-4890-4363-A5F0-0431CBCF0C97@kba.biglobe.ne.jp> <4563882F-8ACF-4C81-848B-021FE393FBBF@kba.biglobe.ne.jp> <0F4775DE-00AB-49DA-A12C-72E13B60C1F5@dana.is> To: zsh-workers@zsh.org In-Reply-To: <0F4775DE-00AB-49DA-A12C-72E13B60C1F5@dana.is> Message-Id: X-Mailer: Apple Mail (2.3445.104.11) X-Biglobe-Spnum: 9986 > 2020/03/13 3:11, dana wrote: >=20 >=20 > On 11 Mar 2020, at 15:26, Bart Schaefer = wrote: >> What about reading the UID/GID of the directory to assign defaults of >> ZSH_TEST_UNPRIVILEGED_UID and ZSH_TEST_UNPRIVILEGED_GID? >=20 > Thanks. Had to double-check this. >=20 > This will help, if (1) we use the directory owner for the EUID and (2) = we get > rid of anything in the test file that tries to set the test shell's = EUID to > something besides the owner or root. >=20 > Right now, only the very first test (the one that failed for Jun) does = that. I > *think* it's probably fine to eliminate it, since it's a bit redundant = in this > particular case... but it'll break again if we ever try to re-add a = similar > check. With the patch P01 (with sudo) succeeds on Fedora. Personally I feel it's simpler to use relative path, but have no = objection to using UID of ZTST_tesdir. # If you don't like hard-coding the directory name we can pass it from # Test/Makefile.in, via a variable like ZTST_moddir, to ztst.zsh (line = 38) # and use it in P01privileged.ztst.