-
Notifications
You must be signed in to change notification settings - Fork 489
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Current path symlink #496
Comments
@d4be4st ping |
@luckyraul How does ftp relate to mina? |
Problem is not in the FTP, it is in the new way of creating symlink for the current folder mina 0.3 use a relative path in the symlink for the current Ftp client in our case can't resolve absolute paths because of a chroot enviroment. |
In my case, it hinders obtaining Let's Encrypt certificates for LXC containers. I could run:
But |
What would you do about all other linked paths? For example the stuff that ends up in Or are you only interested in |
If you are only interested in
Override releases path. One caveat here is that you need to wrap all tasks that use
|
I see no advantage to absolute symlinks over relative ones. I asked about it on Stack Overflow, but the best I could get is that absolute symlinks are easier to create. So I think it's best to switch to relative symlinks by default. |
I've started to update our deploy script from 0.3 to 1.x and have noticed that now the current symlink use a global path. In 0.3 it was a relative.
It breaks FTP clients connection through the current folder.
The text was updated successfully, but these errors were encountered: