-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't try to set permissions recursively on cache+staging directory #10900
Don't try to set permissions recursively on cache+staging directory #10900
Conversation
This should avoid permissions problems when the user creating the directory and the user creating the content are different (when containers images are saved by root for instances, because the user can't use the container runtime).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@VannTen lgtm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: floryut, mzaian, VannTen The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…ubernetes-sigs#10900) This should avoid permissions problems when the user creating the directory and the user creating the content are different (when containers images are saved by root for instances, because the user can't use the container runtime).
…ubernetes-sigs#10900) This should avoid permissions problems when the user creating the directory and the user creating the content are different (when containers images are saved by root for instances, because the user can't use the container runtime).
What type of PR is this?
/kind bug
What this PR does / why we need it:
This should avoid permissions problems when the user creating the
directory and the user creating the content are different (when
containers images are saved by root for instances, because the user
can't use the container runtime).
Which issue(s) this PR fixes:
Fixes #10051
Special notes for your reviewer:
We should probably also fix the "user selection" in the download role which looks a bit bad. But that should already workaround the permissions issue linked above.
If you're aware of adverse effects of doing this, please tell ^.
Does this PR introduce a user-facing change?: