-
Notifications
You must be signed in to change notification settings - Fork 261
(bug) fix permissions problems with pregen cache access #1018
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: grokspawn The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Codecov Report
@@ Coverage Diff @@
## master #1018 +/- ##
==========================================
- Coverage 51.67% 51.66% -0.01%
==========================================
Files 102 102
Lines 9153 9164 +11
==========================================
+ Hits 4730 4735 +5
- Misses 3515 3521 +6
Partials 908 908
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
|
/hold @joelanford asked if we can umask+0750/0640 with effect in a cluster, so ima test |
f26bab0 to
0e15026
Compare
|
/hold cancel |
|
Yeah I was wondering same, are any lesser RWX for any of the Group and Other perms possible. |
|
This does mean that if a non-owner encounters a stale cache, they'll fail instead of repopulating the cache because they won't be able to delete the existing stale files. IMO, that's reasonable though. Outcome is "file/dir owner is responsible for making sure cache is not stale". |
|
As there was previously a 'user is root' implicit aspect in the past (which has been replaced with never-be-root-if-you-can-help-it), there appears to be a 'group is root' implicit aspect presently which allows If/when that changes, this will also need to change. |
|
Oh joy! Looks like we get to experience the fun of using a windows-specific source code file to do something different than |
c314dbf to
d50f149
Compare
Signed-off-by: Jordan <jordan@nimblewidget.com>
d50f149 to
84ffb88
Compare
|
/hold in case you agree with my nit |
|
/lgtm |
Signed-off-by: Jordan <jordan@nimblewidget.com>
f8e190b to
e21be48
Compare
|
/lgtm |
|
/hold cancel |
Signed-off-by: Jordan jordan@nimblewidget.com
Description of the change:
create
opm servecache artifacts to serve for any uid by generating as 0777 (dirs) / 0666 (files).Several options were evaluated, and we landed on a combo of relaxing the umask during cache generation coupled with updated permission of created artifacts to provide world read-/write-ability.
To build a candidate opm replacement image, !!IN LINUX!! do
Then create the catalog image:
mkdir -p /tmp/ctest cd /tmp/ctest mkdir catalog [path-to-opm] generate dockerfile catalogand finally, edit the
FROMline in thecatalog.Dockerfileto point to the pushed tag for the opm replacement image.Motivation for the change:
c.f. OCPBUGS-650.
Cache generation code was creating for uid 1001 and permissions of 0700 (dirs) / 0600 (files), so later deployment in a pod would fail unless uid matched.
Reviewer Checklist
/docs