mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			94 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// +build linux
 | 
						|
 | 
						|
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package volume
 | 
						|
 | 
						|
import (
 | 
						|
	"path/filepath"
 | 
						|
	"syscall"
 | 
						|
 | 
						|
	"os"
 | 
						|
 | 
						|
	"k8s.io/klog"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	rwMask   = os.FileMode(0660)
 | 
						|
	roMask   = os.FileMode(0440)
 | 
						|
	execMask = os.FileMode(0110)
 | 
						|
)
 | 
						|
 | 
						|
// SetVolumeOwnership modifies the given volume to be owned by
 | 
						|
// fsGroup, and sets SetGid so that newly created files are owned by
 | 
						|
// fsGroup. If fsGroup is nil nothing is done.
 | 
						|
func SetVolumeOwnership(mounter Mounter, fsGroup *int64) error {
 | 
						|
 | 
						|
	if fsGroup == nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	return filepath.Walk(mounter.GetPath(), func(path string, info os.FileInfo, err error) error {
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		// chown and chmod pass through to the underlying file for symlinks.
 | 
						|
		// Symlinks have a mode of 777 but this really doesn't mean anything.
 | 
						|
		// The permissions of the underlying file are what matter.
 | 
						|
		// However, if one reads the mode of a symlink then chmods the symlink
 | 
						|
		// with that mode, it changes the mode of the underlying file, overridden
 | 
						|
		// the defaultMode and permissions initialized by the volume plugin, which
 | 
						|
		// is not what we want; thus, we skip chown/chmod for symlinks.
 | 
						|
		if info.Mode()&os.ModeSymlink != 0 {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		stat, ok := info.Sys().(*syscall.Stat_t)
 | 
						|
		if !ok {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		if stat == nil {
 | 
						|
			klog.Errorf("Got nil stat_t for path %v while setting ownership of volume", path)
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
 | 
						|
		err = os.Chown(path, int(stat.Uid), int(*fsGroup))
 | 
						|
		if err != nil {
 | 
						|
			klog.Errorf("Chown failed on %v: %v", path, err)
 | 
						|
		}
 | 
						|
 | 
						|
		mask := rwMask
 | 
						|
		if mounter.GetAttributes().ReadOnly {
 | 
						|
			mask = roMask
 | 
						|
		}
 | 
						|
 | 
						|
		if info.IsDir() {
 | 
						|
			mask |= os.ModeSetgid
 | 
						|
			mask |= execMask
 | 
						|
		}
 | 
						|
 | 
						|
		err = os.Chmod(path, info.Mode()|mask)
 | 
						|
		if err != nil {
 | 
						|
			klog.Errorf("Chmod failed on %v: %v", path, err)
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	})
 | 
						|
}
 |