Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dangerous setup command #29

Open
pavlm opened this issue Feb 1, 2021 · 2 comments
Open

Dangerous setup command #29

pavlm opened this issue Feb 1, 2021 · 2 comments

Comments

@pavlm
Copy link

pavlm commented Feb 1, 2021

Host system file permissions easily can be destroyed when system folder mapped to webdav.
This line is dangerous: chown -R www-data:www-data "/var/lib/dav"

@ghost
Copy link

ghost commented Feb 18, 2022

Yes,my debian server's host folder had been changed when i use this docker image.

@jeff47
Copy link

jeff47 commented Apr 23, 2023

Not just dangerous... lazy design that severely limits the utility. I suggest trying sftpgo as a robust alternative that doesn't have this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants