From b032bd313840df18653e6b4901c62357d0cd9510 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Zden=C4=9Bk=20=C5=A0ustr?= Date: Fri, 4 Nov 2011 15:07:46 +0000 Subject: [PATCH] Dirty hack. Allow glite user to read certain system files. --- org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh b/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh index 644f3e9..7583019 100755 --- a/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh +++ b/org.glite.testsuites.ctb/LB/tests/lb-common-testbeds.sh @@ -88,6 +88,12 @@ else fi fi +#Allow glite user to read certain system files. Talk about dirty hacks. +grep -E "$GLITE_USER.*/bin/cat" /etc/sudoers > /dev/null 2> /dev/null +if [ ! \$? = 0 ]; then + printf "\n$GLITE_USER\tALL=NOPASSWD: /bin/cat /etc/cron.d/glite-lb-purge.cron,/bin/cat /var/log/messages\n\n" >> /etc/sudoers +fi + echo cd > arrange_lb_test_user.sh echo export LBTSTCOLS=\$LBTSTCOLS >> arrange_lb_test_user.sh echo 'export GLITE_MYSQL_ROOT_PASSWORD="[Edited]"' >> arrange_lb_test_user.sh -- 1.8.2.3