-
-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ohmyzsh complains about insecure directories #3
Comments
Hello @fdellwing! Thank you for reporting this. |
I can only assume, that the method that uploads ohmyzsh to the remote server, preserves the original UID/GID from the local files. I do connect from a non priviledges shell with a default Ubuntu user (1000:1000) to a default Debian 9 root session (0:0). |
Nope, the files will be created on the host with uid/gid of the user who connect to. Ordinarily if you have local user
Because we have the first case with this let's solve it locally. Put |
The |
I switched to another method to use zsh remotely. Closing this. |
@fdellwing could you please share this method? |
I'm using a remotely installed zsh with
set in my ssh config. A lot more work to setup on remote side, but works much better for my needs. |
Local OS (where xxh is installed): Kubuntu 18.04
Destination host OS: Debian 9
xxh version: 0.8.5
xxh-plugins installed: xxh-plugin-zsh-ohmyzsh
Steps to Reproduce
xxh +s zsh icinga2
with another uid as the user you will connect to.You should either set
ZSH_DISABLE_COMPFIX
to true before loading the shell or (better) make sure the folders and files are owned by the user you connect to.For community:
⬇️ Please click the 👍 reaction instead of leaving a
+1
or 👍 commentThe text was updated successfully, but these errors were encountered: