diff options
author | Ivan Kozik <ivan@ludios.org> | 2022-05-04 16:34:29 +0000 |
---|---|---|
committer | Ivan Kozik <ivan@ludios.org> | 2022-05-05 22:05:18 +0000 |
commit | f18cc2cf02695c9d21d33beb47f2eac7b7d0d079 (patch) | |
tree | a431f168aa50dc763b1cc627d3b5d62a02cbfffd | |
parent | ccf42c7987c00fa594bc64798dc28468003e2b37 (diff) | |
download | nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar.gz nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar.bz2 nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar.lz nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar.xz nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.tar.zst nixpkgs-f18cc2cf02695c9d21d33beb47f2eac7b7d0d079.zip |
nixos/security/wrappers: chown user:group instead of user.group to fix warnings from coreutils 9.1
activating the configuration... setting up /etc... chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.messagebus’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ chown: warning: '.' should be ':': ‘root.root’ reloading user units for root...
-rw-r--r-- | nixos/modules/security/wrappers/default.nix | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/nixos/modules/security/wrappers/default.nix b/nixos/modules/security/wrappers/default.nix index e63f19010de..169ef744262 100644 --- a/nixos/modules/security/wrappers/default.nix +++ b/nixos/modules/security/wrappers/default.nix @@ -98,7 +98,7 @@ let # Prevent races chmod 0000 "$wrapperDir/${program}" - chown ${owner}.${group} "$wrapperDir/${program}" + chown ${owner}:${group} "$wrapperDir/${program}" # Set desired capabilities on the file plus cap_setpcap so # the wrapper program can elevate the capabilities set on @@ -126,7 +126,7 @@ let # Prevent races chmod 0000 "$wrapperDir/${program}" - chown ${owner}.${group} "$wrapperDir/${program}" + chown ${owner}:${group} "$wrapperDir/${program}" chmod "u${if setuid then "+" else "-"}s,g${if setgid then "+" else "-"}s,${permissions}" "$wrapperDir/${program}" ''; |