mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-12-23 05:20:19 +00:00
07b05616a0
Bumps [k8s.io/kubernetes](https://github.com/kubernetes/kubernetes) from 1.26.2 to 1.27.2. - [Release notes](https://github.com/kubernetes/kubernetes/releases) - [Commits](https://github.com/kubernetes/kubernetes/compare/v1.26.2...v1.27.2) --- updated-dependencies: - dependency-name: k8s.io/kubernetes dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
211 lines
6.5 KiB
Go
211 lines
6.5 KiB
Go
//go:build linux
|
|
// +build linux
|
|
|
|
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package volume
|
|
|
|
import (
|
|
"path/filepath"
|
|
"syscall"
|
|
|
|
"os"
|
|
"time"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kubernetes/pkg/volume/util/types"
|
|
)
|
|
|
|
const (
|
|
rwMask = os.FileMode(0660)
|
|
roMask = os.FileMode(0440)
|
|
execMask = os.FileMode(0110)
|
|
)
|
|
|
|
// SetVolumeOwnership modifies the given volume to be owned by
|
|
// fsGroup, and sets SetGid so that newly created files are owned by
|
|
// fsGroup. If fsGroup is nil nothing is done.
|
|
func SetVolumeOwnership(mounter Mounter, dir string, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy, completeFunc func(types.CompleteFuncParam)) error {
|
|
if fsGroup == nil {
|
|
return nil
|
|
}
|
|
|
|
timer := time.AfterFunc(30*time.Second, func() {
|
|
klog.Warningf("Setting volume ownership for %s and fsGroup set. If the volume has a lot of files then setting volume ownership could be slow, see https://github.com/kubernetes/kubernetes/issues/69699", dir)
|
|
})
|
|
defer timer.Stop()
|
|
|
|
if skipPermissionChange(mounter, dir, fsGroup, fsGroupChangePolicy) {
|
|
klog.V(3).InfoS("Skipping permission and ownership change for volume", "path", dir)
|
|
return nil
|
|
}
|
|
|
|
err := walkDeep(dir, func(path string, info os.FileInfo, err error) error {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return changeFilePermission(path, fsGroup, mounter.GetAttributes().ReadOnly, info)
|
|
})
|
|
if completeFunc != nil {
|
|
completeFunc(types.CompleteFuncParam{
|
|
Err: &err,
|
|
})
|
|
}
|
|
return err
|
|
}
|
|
|
|
func changeFilePermission(filename string, fsGroup *int64, readonly bool, info os.FileInfo) error {
|
|
err := os.Lchown(filename, -1, int(*fsGroup))
|
|
if err != nil {
|
|
klog.ErrorS(err, "Lchown failed", "path", filename)
|
|
}
|
|
|
|
// chmod passes through to the underlying file for symlinks.
|
|
// Symlinks have a mode of 777 but this really doesn't mean anything.
|
|
// The permissions of the underlying file are what matter.
|
|
// However, if one reads the mode of a symlink then chmods the symlink
|
|
// with that mode, it changes the mode of the underlying file, overridden
|
|
// the defaultMode and permissions initialized by the volume plugin, which
|
|
// is not what we want; thus, we skip chmod for symlinks.
|
|
if info.Mode()&os.ModeSymlink != 0 {
|
|
return nil
|
|
}
|
|
|
|
mask := rwMask
|
|
if readonly {
|
|
mask = roMask
|
|
}
|
|
|
|
if info.IsDir() {
|
|
mask |= os.ModeSetgid
|
|
mask |= execMask
|
|
}
|
|
|
|
err = os.Chmod(filename, info.Mode()|mask)
|
|
if err != nil {
|
|
klog.ErrorS(err, "chmod failed", "path", filename)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func skipPermissionChange(mounter Mounter, dir string, fsGroup *int64, fsGroupChangePolicy *v1.PodFSGroupChangePolicy) bool {
|
|
if fsGroupChangePolicy == nil || *fsGroupChangePolicy != v1.FSGroupChangeOnRootMismatch {
|
|
klog.V(4).InfoS("Perform recursive ownership change for directory", "path", dir)
|
|
return false
|
|
}
|
|
return !requiresPermissionChange(dir, fsGroup, mounter.GetAttributes().ReadOnly)
|
|
}
|
|
|
|
func requiresPermissionChange(rootDir string, fsGroup *int64, readonly bool) bool {
|
|
fsInfo, err := os.Stat(rootDir)
|
|
if err != nil {
|
|
klog.ErrorS(err, "Performing recursive ownership change on rootDir because reading permissions of root volume failed", "path", rootDir)
|
|
return true
|
|
}
|
|
stat, ok := fsInfo.Sys().(*syscall.Stat_t)
|
|
if !ok || stat == nil {
|
|
klog.ErrorS(nil, "Performing recursive ownership change on rootDir because reading permissions of root volume failed", "path", rootDir)
|
|
return true
|
|
}
|
|
|
|
if int(stat.Gid) != int(*fsGroup) {
|
|
klog.V(4).InfoS("Expected group ownership of volume did not match with Gid", "path", rootDir, "GID", stat.Gid)
|
|
return true
|
|
}
|
|
unixPerms := rwMask
|
|
|
|
if readonly {
|
|
unixPerms = roMask
|
|
}
|
|
|
|
// if rootDir is not a directory then we should apply permission change anyways
|
|
if !fsInfo.IsDir() {
|
|
return true
|
|
}
|
|
unixPerms |= execMask
|
|
filePerm := fsInfo.Mode().Perm()
|
|
|
|
// We need to check if actual permissions of root directory is a superset of permissions required by unixPerms.
|
|
// This is done by checking if permission bits expected in unixPerms is set in actual permissions of the directory.
|
|
// We use bitwise AND operation to check set bits. For example:
|
|
// unixPerms: 770, filePerms: 775 : 770&775 = 770 (perms on directory is a superset)
|
|
// unixPerms: 770, filePerms: 770 : 770&770 = 770 (perms on directory is a superset)
|
|
// unixPerms: 770, filePerms: 750 : 770&750 = 750 (perms on directory is NOT a superset)
|
|
// We also need to check if setgid bits are set in permissions of the directory.
|
|
if (unixPerms&filePerm != unixPerms) || (fsInfo.Mode()&os.ModeSetgid == 0) {
|
|
klog.V(4).InfoS("Performing recursive ownership change on rootDir because of mismatching mode", "path", rootDir)
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
// readDirNames reads the directory named by dirname and returns
|
|
// a list of directory entries.
|
|
// We are not using filepath.readDirNames because we do not want to sort files found in a directory before changing
|
|
// permissions for performance reasons.
|
|
func readDirNames(dirname string) ([]string, error) {
|
|
f, err := os.Open(dirname)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
names, err := f.Readdirnames(-1)
|
|
f.Close()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return names, nil
|
|
}
|
|
|
|
// walkDeep can be used to traverse directories and has two minor differences
|
|
// from filepath.Walk:
|
|
// - List of files/dirs is not sorted for performance reasons
|
|
// - callback walkFunc is invoked on root directory after visiting children dirs and files
|
|
func walkDeep(root string, walkFunc filepath.WalkFunc) error {
|
|
info, err := os.Lstat(root)
|
|
if err != nil {
|
|
return walkFunc(root, nil, err)
|
|
}
|
|
return walk(root, info, walkFunc)
|
|
}
|
|
|
|
func walk(path string, info os.FileInfo, walkFunc filepath.WalkFunc) error {
|
|
if !info.IsDir() {
|
|
return walkFunc(path, info, nil)
|
|
}
|
|
names, err := readDirNames(path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, name := range names {
|
|
filename := filepath.Join(path, name)
|
|
fileInfo, err := os.Lstat(filename)
|
|
if err != nil {
|
|
if err := walkFunc(filename, fileInfo, err); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
err = walk(filename, fileInfo, walkFunc)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return walkFunc(path, info, nil)
|
|
}
|