From: Neal Kreitzinger <nkreitzinger@gmail.com>
To: "René Scharfe" <rene.scharfe@lsrfire.ath.cx>
Cc: Jeff King <peff@peff.net>, Neal Kreitzinger <neal@rsss.com>,
git@vger.kernel.org
Subject: Re: git-archive and tar options
Date: Wed, 20 Jul 2011 21:13:08 -0500 [thread overview]
Message-ID: <4E278B34.70300@gmail.com> (raw)
In-Reply-To: <4E25C54D.2070007@lsrfire.ath.cx>
On 7/19/2011 12:56 PM, René Scharfe wrote:
> Am 19.07.2011 02:12, schrieb Neal Kreitzinger:
>> On 7/18/2011 3:50 PM, René Scharfe wrote:
>>> Am 18.07.2011 20:13, schrieb Neal Kreitzinger:
>>>> However, the permissions also need to change to 777 and tar --mode would
>>>> not effect this in combination with --catenation or -x. Is there a way
>>>> I can change the permissions without having to untar->chmod->retar, and
>>>> without having to use a non-bare repo as an intermediary?
>>> You can use the configuration setting tar.umask to affect the
>>> permissions of the archive entries. Set it to 0 to pass the permission
>>> bits from the repo unchanged.
>>>
>> The permissions in my repo are 775 and 664 and I want to change them to
>> 777.
> Git doesn't store all permission bits. If a file is marked as
> executable then you get 777, otherwise 666 -- minus the umask, which is
> 0002 by default. So in order to achive rwx permissions for all in the
> archive, you need to A) mark the files as executable in the repository
> and B) set tar.umask to 0 to get allow the world to write.
>
> However, what's the reason for requiring this lack of access control?
> Why o+w?
tar.umask worked. Thank you for explaining how the permissions work in
this context. I now see that 775 and 664 would work for the apache
component and for executing our binaries. Thanks for pointing this
out. However, another element of our application is a proprietary
runtime that runs on top of linux and runs our core binaries. This
allows us to store our binaries in git and deploy them directly on the
customer server from git (via git-archive). That runtime needs o+w in
order to update the 'last run date' in the binary which is critical to
our troubleshooting in the field. o+w is needed because the user's
runtime instance runs with user permissions when executed from a linux
command line terminal and our users are not setup in the same group as
the binaries. Therefore, with tar.umask = 0000 I can deploy 777 and 666
permissions and everything will work.
I suppose I could write a script to change the tar.umask entry to 0000
only when running git-archive for the binary portion, and use tar.umask
0002 when extracting the other portions. I could also change our setup
to put the users and the runmodules in the same group and use tar.umask
0002 across the board. These would be more correct than the chmod 777
shotgun that we currently use to blast away our permissions problems.
git-archive is a "quick" solution to our immediate deployment needs.
Eventually, I plan on using git on the source and target machines as the
core mechanism to "promote to production" (ie. deploy to customer
servers). It looks like others are using git for deployment also. In
my previous shops which used other VCS's on minicomputers and
mainframes, "promote to production" meant the universal run path for all
users (and especially for productional data transactions) on that
central machine. In my current shop (my first linux shop) we have
multiple concurrent versions of production on a multitude of
productional machines and even concurrently on an individual
productional machine in some cases. The main reason we chose git is
because it is the only VCS that can handle this.
v/r,
neal
next prev parent reply other threads:[~2011-07-21 2:13 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-07-13 23:34 git-archive and tar options Neal Kreitzinger
2011-07-14 1:56 ` Jeff King
2011-07-14 17:16 ` René Scharfe
2011-07-14 17:27 ` Jeff King
2011-07-14 17:45 ` René Scharfe
2011-07-14 18:18 ` Jeff King
2011-07-14 19:12 ` Jakub Narebski
2011-07-14 21:23 ` Junio C Hamano
2011-07-14 21:25 ` Jeff King
2011-07-14 23:30 ` Junio C Hamano
2011-07-15 20:59 ` René Scharfe
2011-07-18 19:31 ` Neal Kreitzinger
2011-07-18 20:50 ` René Scharfe
2011-07-14 21:38 ` Jakub Narebski
2011-07-18 18:13 ` Neal Kreitzinger
2011-07-18 20:50 ` René Scharfe
2011-07-19 0:12 ` Neal Kreitzinger
2011-07-19 17:56 ` René Scharfe
2011-07-21 2:13 ` Neal Kreitzinger [this message]
2011-07-21 16:59 ` Neal Kreitzinger
2011-07-14 17:48 ` Andreas Schwab
2011-07-19 20:10 ` Sylvain Rabot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4E278B34.70300@gmail.com \
--to=nkreitzinger@gmail.com \
--cc=git@vger.kernel.org \
--cc=neal@rsss.com \
--cc=peff@peff.net \
--cc=rene.scharfe@lsrfire.ath.cx \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).