From: Zdeněk Šustr Date: Fri, 4 Nov 2011 15:07:46 +0000 (+0000) Subject: Dirty hack. Allow glite user to read certain system files. X-Git-Tag: merge_30_head_take2_dst~75 X-Git-Url: http://scientific.zcu.cz/git/?a=commitdiff_plain;h=b032bd313840df18653e6b4901c62357d0cd9510;p=jra1mw.git Dirty hack. Allow glite user to read certain system files. --- diff --git a/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh b/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh index 644f3e9..7583019 100755 --- a/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh +++ b/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh @@ -88,6 +88,12 @@ else fi fi +#Allow glite user to read certain system files. Talk about dirty hacks. +grep -E "$GLITE_USER.*/bin/cat" /etc/sudoers > /dev/null 2> /dev/null +if [ ! \$? = 0 ]; then + printf "\n$GLITE_USER\tALL=NOPASSWD: /bin/cat /etc/cron.d/glite-lb-purge.cron,/bin/cat /var/log/messages\n\n" >> /etc/sudoers +fi + echo cd > arrange_lb_test_user.sh echo export LBTSTCOLS=\$LBTSTCOLS >> arrange_lb_test_user.sh echo 'export GLITE_MYSQL_ROOT_PASSWORD="[Edited]"' >> arrange_lb_test_user.sh