sandcastle-ng

Scripts for the deployment of Sandcastle (GNU Taler)
Log | Files | Refs | README

commit 85d9a81665793ef0d4bd8b47b804e8bba1db5a17
parent 82f3d3a38f4afdc28eaa6f856ff02cb85790c8d4
Author: Florian Dold <florian@dold.me>
Date:   Tue,  3 Sep 2024 22:26:40 +0200

permissions

Diffstat:
Mscripts/demo/setup-sandcastle.sh | 6+++++-
1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/scripts/demo/setup-sandcastle.sh b/scripts/demo/setup-sandcastle.sh @@ -133,13 +133,17 @@ lift_dir /etc/taler etc-challenger lift_dir /var/lib/postgresql var-lib-postgresql persist_exchange_key /var/lib/taler/exchange-offline exchange-offline -# We need to adjust permissions, as the container might have different user and group +# We need to adjust file ownership, as the container might have different user and group # IDs than the volume. That can happen when the packages in the container are installed # in a different order. chown taler-exchange-offline:taler-exchange-offline /talerdata_persistent/exchange-offline chown --recursive taler-exchange-offline:taler-exchange-offline /var/lib/taler/exchange-offline/* +chown --recursive taler-exchange-secmod-cs:taler-exchange-secmod /var/lib/taler/exchange-secmod-cs +chown --recursive taler-exchange-secmod-rsa:taler-exchange-secmod /var/lib/taler/exchange-secmod-rsa +chown --recursive taler-exchange-secmod-eddsa:taler-exchange-secmod /var/lib/taler/exchange-secmod-eddsa + # FIXME: More permissions to adjust! # Usage: get_credential_pw COMPONENT/ACCOUNT