debian: fix installing qubes-guid as suid#168
Conversation
This is how it works on Fedora, so mirror the behavior in Debian package too. Technically it might be possible to avoid the suid, by adjusting at least log dir permissions, and probably few more. But that's separate change, unbreak Debian for now. Use postinst script instead of packaging with desired permissions already, because the qubes group doesn't exist at the package build time. QubesOS/qubes-issues#8841
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025080616-4.3&flavor=templates Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025061004-4.3&flavor=update
Failed tests10 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/142375#dependencies 9 fixed
Unstable testsDetailsPerformance TestsPerformance degradation:No issues Remaining performance tests:No remaining performance tests |
This is how it works on Fedora, so mirror the behavior in Debian package
too.
Technically it might be possible to avoid the suid, by adjusting at
least log dir permissions, and probably few more. But that's separate
change, unbreak Debian for now.
Use postinst script instead of packaging with desired permissions
already, because the qubes group doesn't exist at the package build
time.
QubesOS/qubes-issues#8841