Closed pierre-labastie closed 5 years ago
name: Bug report about: Create a report to help us improve title: 'BLFS tools: commands run as root instead of as user' labels: bug assignees: ''
Commands without role="root" should be run as user, but sometimes, they are generated inside a sudo -E sh << ROOT_EOF ... ROOT_EOF block.
role="root"
sudo -E sh << ROOT_EOF ... ROOT_EOF
Steps to reproduce the behavior:
make
q
The script should contain:
cd $JH_UNPACKDIR sudo -E sh << ROOT_EOF groupadd -g 51 stunnel useradd -c "stunnel Daemon" -d /var/lib/stunnel \\ -g stunnel -s /bin/false -u 51 stunnel ROOT_EOF sed -i '/LDFLAGS.*static_flag/ s/^/#/' configure
The script contains:
cd $JH_UNPACKDIR sudo -E sh << ROOT_EOF groupadd -g 51 stunnel useradd -c "stunnel Daemon" -d /var/lib/stunnel \\ -g stunnel -s /bin/false -u 51 stunnel sed -i '/LDFLAGS.*static_flag/ s/^/#/' configure ROOT_EOF
Add any other context about the problem here.
This happens because the <screen><userinput> is inside a <note>, but we only use: preceding-sibling::screen[not(@role='nodump') and ./userinput][1][not(@role)], so that are excluded...
<screen><userinput>
<note>
preceding-sibling::screen[not(@role='nodump') and ./userinput][1][not(@role)]
name: Bug report about: Create a report to help us improve title: 'BLFS tools: commands run as root instead of as user' labels: bug assignees: ''
Describe the bug
Commands without
role="root"
should be run as user, but sometimes, they are generated inside asudo -E sh << ROOT_EOF ... ROOT_EOF
block.To Reproduce
Steps to reproduce the behavior:
make
, and select: Post LFS Configuration and Extra Software---> Security ---> [*] stunnel 5.53q
and save configuration. Answer yes to "Are you happy with these settings"Expected behavior
The script should contain:
Observed behavior
The script contains:
Environment Details (please complete the following information):
Additional context
Add any other context about the problem here.