我正在尝试运行一个 cron 作业,但不是以 root 身份运行。
在用户上下文中([电子邮件保护]),以下是 crontab 和 cron.log 的输出:
crontab -l 的输出
# Edit this file to introduce tasks to be run by cron.
#
# Each task to run has to be defined through a single line
# indicating with different fields when the task will be run
# and what command to run for the task
#
# To define the time you can provide concrete values for
# minute (m), hour (h), day of month (dom), month (mon),
# and day of week (dow) or use '*' in these fields (for 'any').#
# Notice that tasks will be started based on the cron's system
# daemon's notion of time and timezones.
#
# Output of the crontab jobs (including errors) is sent through
# email to the user the crontab file belongs to (unless redirected).
#
# For example, you can run a backup of all your user accounts
# at 5 a.m every week with:
# 0 5 * * 1 tar -zcf /var/backups/home.tgz /home/
#
# For more information see the manual pages of crontab(5) and cron(8)
#
# m h dom mon dow command
*/1 * * * * whoami
/var/log/cron.log 的输出(最后 10 行)
Nov 27 04:24:28 tor-car-rclone CRON[1865]: Permission denied
Nov 27 04:25:01 tor-car-rclone CRON[1870]: Permission denied
Nov 27 04:25:25 tor-car-rclone crontab[1871]: ([email protected]) LIST ([email protected])
Nov 27 04:26:01 tor-car-rclone CRON[1875]: Permission denied
Nov 27 04:27:01 tor-car-rclone CRON[1877]: Permission denied
Nov 27 04:28:01 tor-car-rclone CRON[1879]: Permission denied
Nov 27 04:29:01 tor-car-rclone CRON[1884]: Permission denied
Nov 27 04:30:01 tor-car-rclone CRON[1887]: Permission denied
Nov 27 04:31:01 tor-car-rclone CRON[1889]: Permission denied
Nov 27 04:32:01 tor-car-rclone CRON[1894]: Permission denied
这显然是一个权限问题,但我不确定需要在哪里分配权限。
答案1
因此该问题与 GPO 有关,因为该盒子已加入 AD 域。
按照https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1572908,以下修复了它:
编辑/etc/sssd/sssd.conf
添加ad_gpo_access_control = permissive
到[domain/corp.contoso.com]
部分。
完整示例/etc/sssd/sssd.conf
[sssd]
domains = corp.contoso.com
config_file_version = 2
services = nss, pam
[domain/corp.contoso.com]
ad_domain = corp.contoso.com
krb5_realm = CORP.CONTOSO.com
realmd_tags = manages-system joined-with-adcli
cache_credentials = True
id_provider = ad
krb5_store_password_if_offline = True
default_shell = /bin/bash
ldap_id_mapping = True
use_fully_qualified_names = True
fallback_homedir = /home/%d/%u
access_provider = ad
ad_gpo_access_control = permissive