From owner-freebsd-ports@freebsd.org Sat Mar 3 05:07:01 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 74E1EF40CB2 for ; Sat, 3 Mar 2018 05:07:01 +0000 (UTC) (envelope-from lists@opsec.eu) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0E75C6DF33 for ; Sat, 3 Mar 2018 05:07:01 +0000 (UTC) (envelope-from lists@opsec.eu) Received: from pi by home.opsec.eu with local (Exim 4.89 (FreeBSD)) (envelope-from ) id 1erzNm-000B3u-43; Sat, 03 Mar 2018 06:06:54 +0100 Date: Sat, 3 Mar 2018 06:06:54 +0100 From: Kurt Jaeger To: Eugene Grosbein Cc: Ash Gokhale , josh@tcbug.org, Diane Bruce , freebsd-ports@freebsd.org Subject: Re: net/viamillipede seeks commiter Message-ID: <20180303050654.GB32429@home.opsec.eu> References: <20180303044839.GA32429@home.opsec.eu> <5A9A2A97.5090401@grosbein.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5A9A2A97.5090401@grosbein.net> X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 Mar 2018 05:07:01 -0000 Hi! > > .include [...] > > install: /wrkdirs/usr/ports/net/viamillipede/work/stage/usr/local/bin/viamillipede: chown/chgrp: Operation not permitted > > Can you try to use a different approach and test it using poudriere ? > Isn't it just a bug of poudriere's approach? There is nothing > wrong in just using bsd.prog.mk. The plan behind poudriere is to build under an unprivileged account. That plan is unlikely to change, I guess 8-) I think it is a very good idea to try to limit the usage of 'run as root', so maybe it's bsd.prog.mk that needs some hook to allow unprivileged installs ? -- pi@opsec.eu +49 171 3101372 2 years to go !