This is not a problem I perceived directly, but got as feedback from the data science team.
Let's say someone on the team mistakenly ran dvc repro with sudo, generating output files that have strict read permissions. This person then pushes the hashes to git remote and the files to dvc remote. Now the rest of the team can't reproduce the pipeline without sudoeing out the wrong permissions first. To prevent this from happening, it would be cool if DVC issued a warning for files being pushed with weird permissions.
This is not a problem I perceived directly, but got as feedback from the data science team.
Let's say someone on the team mistakenly ran
dvc reprowithsudo, generating output files that have strict read permissions. This person then pushes the hashes to git remote and the files to dvc remote. Now the rest of the team can't reproduce the pipeline without sudoeing out the wrong permissions first. To prevent this from happening, it would be cool if DVC issued a warning for files being pushed with weird permissions.