-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Write access to config directory by web server should not be required, should it? #14030
Comments
Hi, This is indeed a check that should not be done unless for some commands that may requires to update DB configuration. As a workaround, you can comment this line: glpi/inc/system/variables.class.php Line 52 in 7a19ca0
I already encountered this behaviour but forgot to handle it. Removing write right to web server on this directory once GLPI is installed/updated is a good idea to enforce GLPI security, so this case is legitimate and should be handled correctly. |
OK, I just fixed and tested it on our instance. |
Hi there ! For all we know, this was still not fixed in GLPI 10.0.9 (see #15424 submitted by my colleague last month) |
Fixed by #15772 |
Code of Conduct
Is there an existing issue for this?
Version
9.5.12
Bug description
Hi,
Since we upgraded to 9.5 we have a problem due to the fact that our 'config'
directory is not writable by the HTTP server process (www-data user on our
Debian server).
So far, putting aside the warning on the system configuration page, this only
impacts us when we update the user list from our LDAP directory using the
ldap:sync command. This command used to be run from a cron job as
su -s /bin/sh -c "/usr/bin/php /usr/local/share/glpi/bin/console ldap:sync ..." www-data
but now this fails with the stack trace in the next section.Of course running this CLI command as root does the trick but this is
unfortunate since it changes ownership of some sessions file to root and
requires an additional chmod on the files directory.
I know this is a 9.5 issue but I had an (admittedly quick) glance at the 10.0
code and it looks as if this behaviour is still present.
Would it be possible to lower this requirement down so that it only emits a
notice and does not block execution of commands immune to this restriction, at
least.
If this is not possible I think that this requirement should be prominently
advertised and its motivations clearly exposed since it looks as if it goes
against all best practices.
By the way, if I recall correctly, it once used to be a recommendation of GLPI
install doc to restrict write access to the config directory.
Relevant log output
Page URL
No response
Steps To reproduce
What to do:
What is expected:
What happens:
Your GLPI setup information
No response
Anything else?
No response
The text was updated successfully, but these errors were encountered: