763d839261
This implements chown support on Windows. Built-in accounts as well as accounts included in the SAM database of the container are supported. NOTE: IDPair is now named Identity and IDMappings is now named IdentityMapping. The following are valid examples: ADD --chown=Guest . <some directory> COPY --chown=Administrator . <some directory> COPY --chown=Guests . <some directory> COPY --chown=ContainerUser . <some directory> On Windows an owner is only granted the permission to read the security descriptor and read/write the discretionary access control list. This fix also grants read/write and execute permissions to the owner. Signed-off-by: Salahuddin Khan <salah@docker.com>
27 lines
716 B
Go
27 lines
716 B
Go
// +build !windows
|
|
|
|
package daemon // import "github.com/docker/docker/daemon"
|
|
|
|
import (
|
|
"github.com/docker/docker/container"
|
|
"github.com/docker/docker/pkg/archive"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
)
|
|
|
|
func (daemon *Daemon) tarCopyOptions(container *container.Container, noOverwriteDirNonDir bool) (*archive.TarOptions, error) {
|
|
if container.Config.User == "" {
|
|
return daemon.defaultTarCopyOptions(noOverwriteDirNonDir), nil
|
|
}
|
|
|
|
user, err := idtools.LookupUser(container.Config.User)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
identity := idtools.Identity{UID: user.Uid, GID: user.Gid}
|
|
|
|
return &archive.TarOptions{
|
|
NoOverwriteDirNonDir: noOverwriteDirNonDir,
|
|
ChownOpts: &identity,
|
|
}, nil
|
|
}
|