1 |
Well, it was more of a theoretical "sure". And anyway, you seem to have missed |
2 |
the "can chroot" part of my reply. Normal users cannot chroot under "normal" |
3 |
setups. Also, your user would need to be able to create arbitrary bind mounts. |
4 |
|
5 |
Currently, the check that generates that error just checks the current UID and |
6 |
bombs if it's anything other than 0 (root). I'm sure if somebody (how about |
7 |
you?) contributed code to query the kernel for certain abilities (like |
8 |
chrooting), the catalyst developers would be more than happy to add it in to |
9 |
allow non-root catalyst use where the user has the necessary abilities. |
10 |
|
11 |
Caleb Cushing wrote: |
12 |
> I had access to what I think are all the files and directories needed. |
13 |
> I put everything in custom locations. that I could write to. but |
14 |
> catalyst complained I needed to be root. and it was catalyst not a |
15 |
> permission error. |
16 |
> |
17 |
> !!! catalyst: This script requires root privileges to operate |
18 |
> |
19 |
> On 11/27/06, Andrew Gaffney <agaffney@g.o> wrote: |
20 |
>> As long as you run it as a user that has access to all the files/dirs |
21 |
>> that |
22 |
>> catalyst touches *and* can chroot (probably only doable through |
23 |
>> selinux and |
24 |
>> friends), sure :P |
25 |
>> |
26 |
>> Caleb Cushing wrote: |
27 |
>> > can catalyst be run without root access? |
28 |
|
29 |
-- |
30 |
Andrew Gaffney http://dev.gentoo.org/~agaffney/ |
31 |
Gentoo Linux Developer Installer Project |
32 |
Today's lesson in political correctness: "Go asphyxiate on a phallus" |
33 |
-- |
34 |
gentoo-catalyst@g.o mailing list |