coredump,journal: do not do ACL magic for processes of dynamic UIDs
Dynamic UIDs should be treated like system users in this regard.
This commit is contained in:
parent
ece877d434
commit
4e72397b00
|
@ -165,7 +165,7 @@ static int fix_acl(int fd, uid_t uid) {
|
||||||
|
|
||||||
assert(fd >= 0);
|
assert(fd >= 0);
|
||||||
|
|
||||||
if (uid_is_system(uid))
|
if (uid_is_system(uid) || uid_is_dynamic(uid))
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
/* Make sure normal users can read (but not write or delete)
|
/* Make sure normal users can read (but not write or delete)
|
||||||
|
|
|
@ -248,7 +248,7 @@ static void server_add_acls(JournalFile *f, uid_t uid) {
|
||||||
assert(f);
|
assert(f);
|
||||||
|
|
||||||
#if HAVE_ACL
|
#if HAVE_ACL
|
||||||
if (uid_is_system(uid))
|
if (uid_is_system(uid) || uid_is_dynamic(uid))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
r = add_acls_for_user(f->fd, uid);
|
r = add_acls_for_user(f->fd, uid);
|
||||||
|
|
Loading…
Reference in a new issue