nginx/setup-odk.sh: make file executable#840
Conversation
This change brings consistency: all other executables in files/** are marked executable in git rather than chmod'd in dockerfiles.
|
I'm still of the opinion that it's better to define exactly the permissions you want and expect using mechanisms that are made for that exact purpose (eg Git is unsuitable for that purpose; it only tracks executability, which is honored, or not, depending on the git client configuration and the OS, and the resulting user, group and others permissions are sensitive to the umask at clone time, which also makes for bugs such as this one. I don't see any downsides to being explicit about intent and mechanism and desired outcome by putting a couple of |
I think the obvious downside is that it's more code to read, and could be considered noise if you weren't aware/concerned about environments with So I suggest merging this PR now to standardise executable flag handling across the repo. This could be followed up with another PR to add a test to CI which fails without |
This change brings consistency: all other executables in `files/**` are marked executable in git rather than `chmod`'d in `.dockerfile` files. The `chmod` call was originally introduced in getodk#676 without discussion. There is a wider debate whether git can be trusted to manage file permissions, touched on at getodk#830 (comment)
This change brings consistency: all other executables in
files/**are marked executable in git rather thanchmod'd in.dockerfilefiles.The
chmodcall was originally introduced in #676 without discussion.There is a wider debate whether git can be trusted to manage file permissions, touched on at #830 (comment)