At Thu, 23 May 2019 00:58:44 -0400 [email protected] wrote: > > On Wed, 22 May 2019 14:11:39 -0700 (PDT), "Mark A. Yoder" > <[email protected]> declaimed the > following: > > >If you run > > > >*sudo visudo* > > > >The add the following to the end. > > > >debian ALL=(ALL) NOPASSWD: /path/to/command/to/start.sh > > > > > >you can use *sudo* without giving a password. I think then your ExecStart > >can be > > > >ExecStart=sudo /usr/bin/scriptname.s > > > > Why does all this seem to be a potential security leak? <G> > > What is wrong with adding an entry in root's crontab using the @reboot > specification for when to run the job? > > A Raspberry-Pi example, but should carry over to Beaglebone just as > well. > https://www.raspberrypi-spy.co.uk/2013/07/running-a-python-script-at-boot-using-cron/
It also begs the question: why is root access needed, *exactly*. If you are using GPIO, you just need to be in the GPIO group. -- Robert Heller -- 978-544-6933 Deepwoods Software -- Custom Software Services http://www.deepsoft.com/ -- Linux Administration Services [email protected] -- Webhosting Services -- For more options, visit http://beagleboard.org/discuss --- You received this message because you are subscribed to the Google Groups "BeagleBoard" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/beagleboard/20190523053716.AF0DA26C0010%40sharky3.deepsoft.com. For more options, visit https://groups.google.com/d/optout.
