<p>Well, IMO again, it's really a distribution's <code>sudo</code> configuration issue.  In no circumstances should applications be left to believe that a directory is the current user's home if it shouldn't be considered as such.  The issue you describe can only happen with a badly configured <code>sudo</code>, or somebody willingly setting some specific environment variable to point in another user's directory, and still have write permission there. Meh.</p>
<p>This said, maybe altering the dialog to suggest where to look could be fine I guess.  Offering to automatically recover seems useless and potentially dangerous to me, given what can actually lead to this situation -- e.g., no reasonable usage.</p>
<blockquote>
<pre><code>2. if the socket is created by Geany running as root then Geany running as user can't delete it.
</code></pre>
</blockquote>
<p>That's not necessarily true: if the user has write permission on the directory containing the file it can delete that file.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">—<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/geany/geany/issues/2102#issuecomment-471333663">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/ABDrJ3ufTcfMmrtO2GkQIklYAT4nVlTfks5vVVYjgaJpZM4bmS_c">mute the thread</a>.<img src="https://github.com/notifications/beacon/ABDrJ-XMCPZp1NIAyWcIzju5TQK06TJOks5vVVYjgaJpZM4bmS_c.gif" height="1" width="1" alt="" /></p>
<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/geany/geany","title":"geany/geany","subtitle":"GitHub repository","main_image_url":"https://github.githubassets.com/images/email/message_cards/header.png","avatar_image_url":"https://github.githubassets.com/images/email/message_cards/avatar.png","action":{"name":"Open in GitHub","url":"https://github.com/geany/geany"}},"updates":{"snippets":[{"icon":"PERSON","message":"@b4n in #2102: Well, IMO again, it's really a distribution's `sudo` configuration issue.  In no circumstances should applications be left to believe that a directory is the current user's home if it shouldn't be considered as such.  The issue you describe can only happen with a badly configured `sudo`, or somebody willingly setting some specific environment variable to point in another user's directory, and still have write permission there. Meh.\r\n\r\nThis said, maybe altering the dialog to suggest where to look could be fine I guess.  Offering to automatically recover seems useless and potentially dangerous to me, given what can actually lead to this situation -- e.g., no reasonable usage.\r\n\r\n\u003e     2. if the socket is created by Geany running as root then Geany running as user can't delete it.\r\n\r\nThat's not necessarily true: if the user has write permission on the directory containing the file it can delete that file."}],"action":{"name":"View Issue","url":"https://github.com/geany/geany/issues/2102#issuecomment-471333663"}}}</script>
<script type="application/ld+json">[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/geany/geany/issues/2102#issuecomment-471333663",
"url": "https://github.com/geany/geany/issues/2102#issuecomment-471333663",
"name": "View Issue"
},
"description": "View this Issue on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
}
]</script>