| |
@@ -747,7 +747,7 @@
|
| |
|
| |
# Create all the needed paths
|
| |
# we should only need to make bak_dir, cert_dir, config_dir, db_dir, ldif_dir, lock_dir, log_dir, run_dir?
|
| |
- for path in ('backup_dir', 'cert_dir', 'db_dir', 'db_home_dir', 'ldif_dir', 'lock_dir', 'log_dir', 'run_dir'):
|
| |
+ for path in ('backup_dir', 'cert_dir', 'db_dir', 'ldif_dir', 'lock_dir', 'log_dir', 'run_dir'):
|
| |
self.log.debug("ACTION: creating %s", slapd[path])
|
| |
try:
|
| |
os.umask(0o007) # For parent dirs that get created -> sets 770 for perms
|
| |
@@ -868,7 +868,7 @@
|
| |
# Do selinux fixups
|
| |
if general['selinux']:
|
| |
selinux_paths = ('backup_dir', 'cert_dir', 'config_dir', 'db_dir',
|
| |
- 'db_home_dir', 'ldif_dir', 'lock_dir', 'log_dir',
|
| |
+ 'ldif_dir', 'lock_dir', 'log_dir',
|
| |
'run_dir', 'schema_dir', 'tmp_dir')
|
| |
for path in selinux_paths:
|
| |
selinux_restorecon(slapd[path])
|
| |
Bug Description:
There are several issues with using /dec/shm/disrv/ for the db home directory. Containers have issues, and system reboots can cause issues too.
Fix Description:
Using just /dev/shm/slapd-INST solves all the permission issues, but that requires a new selinux label, so for now we will just set the db home directory to the database directory (effectively disabling the change).
https://pagure.io/389-ds-base/issue/49731