These parent directories "/", "/root", "/root/downloads" should give the execute(x) permission to 'www-data' or 'nobody'. i.e.
but it seem not only the direct parent need to be given XX5 but all the chain
for example
example
└── sub1
└── sub2
└── static
it seem you need to set allow others to read and execute 5
all the parents example, sub1, sub2
Why is that !?? I've found it so akward and unsecure !
is there a workaround ?
Probably a bit of a TL:DR of the other answer, but the short answer is: the execute bit has a different meaning for directories - it allows you to keep going down the filesystem tree (open a file or another directory in the directory). The read bit only allows you to see the names of the files in the directory (and maybe some other metadata), but you cannot open them without x bit.
Fun fact, it makes sense to have a directory with --x or -wx permissions - you can access the files inside if you already know their names.
The execute bit on directories allows for traversal of the directory (i.e. allows you to cd in), while the read bit allows for listing the directory contents (e.g. ls).
Indeed setting execute perm on example, sub1, sub2, static
The program/user have now access to the directory.
In order words all the parents directory need at least execute in order to have access in the targeted directory...
Now I gave 751 for static. Meaning than others (here nginx) cannot list the files within. But never the less it works
the static files are appearing when requested (HTTP) but forbidding nginx to list the directory is changing something ? (performance/security)