Local Users and Permissions
On the VMs, we created an OS user and group called
quarkcat
to control the necessary functions behind the website. The Apache and Tomcat directories, for example, are owned by
quarkcat:quarkcat
instead of the typical Ubuntu users
www-data
and
tomcat
.
You may or may not wish to create a
quarkcat
user in your local environment and copy this arrangement. If you do, having things like Tomcat and Apache owned by a user other than you or the standard users may limit your ability to use this software for anything else, and in fact it isn't necessary to have a
quarkcat
in a local development environment.
Access to Tomcat
If you don't use a
quarkcat
, you'll need to adjust some permissions. While deploying, data is written to the Tomcat data directory, meaning that whoever executes the
deploy-from-svn
script must have write permissions there (in particular, to the
tomcat/webapps/
directory).
On Fedora 23, my solution was to create a new group containing both my primary user and
tomcat
, giving group ownership of
tomcat/webapps/
to that group, and enabling write permissions for the group. This lets
tomcat
retain ownership and group ownership of its own folders, while allowing me to write to
webapps/
when I execute
deploy-from-svn
as myself.
Script execution
If you received files as an archive (
.tar
, say), the archiving process can sometimes mess with file ownership and permissions. Make sure that the scripts
deploy-from-svn
and
internal-deploy-from-svn
are executable by the owner (the owner will be either you or
quarkcat
, depending on how you want to set it up).
-- Main.JoelG - 2016-07-19