Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#47205 - [filesystem] plugdev group request

Attached to Project: Arch Linux
Opened by Kyle Keen (keenerd) - Saturday, 28 November 2015, 07:33 GMT
Last edited by Jan de Groot (JGC) - Sunday, 29 November 2015, 18:19 GMT
Task Type Feature Request
Category Packages: Core
Status Closed
Assigned To Dave Reisner (falconindy)
S├ębastien Luttringer (seblu)
Architecture All
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:

For whatever reason, many pieces of engineering hardware use the "plugdev" group in their udev permissions configuration. On just my own laptop I have MCU programmers, software defined radios, and a USB oscilloscope that all set their access permissions to plugdev. The group name appears to have been created at Ubuntu, but has since then been accepted as the de facto standard for data acquisition and electronic tools. Several of my packages in [community] ship udev rules that use plugdev, and in the past I've included directions for creating the group locally. However adding plugdev to the default set of groups seems much cleaner.


This task depends upon

Closed by  Jan de Groot (JGC)
Sunday, 29 November 2015, 18:19 GMT
Reason for closing:  Won't implement
Comment by Jan de Groot (JGC) - Sunday, 29 November 2015, 10:19 GMT
Plugdev is an obsolete group to give members of that group full access to removable devices. Permissions on such devices are granted by logind using ACLs these days, so there's no need for plugdev. Any package shipping such rules should be considered buggy.
Comment by Dave Reisner (falconindy) - Sunday, 29 November 2015, 14:52 GMT
Agreed -- fix the rules. You can use TAG+="uaccess" to grant at-seat permissions to the device (implemented with ACLs).

Loading...