diff options
author | Jakob Unterwurzacher | 2016-06-26 19:18:13 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2016-06-26 19:18:13 +0200 |
commit | 23cc0657f43c21a4f249594a5dcc660b2d5fb77a (patch) | |
tree | 1c98faa5188adcbc05d2ff573842fbac295308f5 /internal/fusefrontend | |
parent | 38767ab5278f6fe62dcf70fc151e8a56cfffcfe4 (diff) |
fusefronted: preserve owner if running as root
If allow_other is set and we run as root, try to give newly created files to
the right user.
Diffstat (limited to 'internal/fusefrontend')
-rw-r--r-- | internal/fusefrontend/args.go | 3 | ||||
-rw-r--r-- | internal/fusefrontend/fs.go | 7 |
2 files changed, 9 insertions, 1 deletions
diff --git a/internal/fusefrontend/args.go b/internal/fusefrontend/args.go index b3fa665..78b9b5b 100644 --- a/internal/fusefrontend/args.go +++ b/internal/fusefrontend/args.go @@ -7,4 +7,7 @@ type Args struct { OpenSSL bool PlaintextNames bool LongNames bool + // Should we chown a file after it has been created? + // This only makes sense if (1) allow_other is set and (2) we run as root. + PreserveOwner bool } diff --git a/internal/fusefrontend/fs.go b/internal/fusefrontend/fs.go index 640c45d..9ae57fa 100644 --- a/internal/fusefrontend/fs.go +++ b/internal/fusefrontend/fs.go @@ -145,7 +145,12 @@ func (fs *FS) Create(path string, flags uint32, mode uint32, context *fuse.Conte return nil, fuse.ToStatus(err) } } - + if fs.args.PreserveOwner { + err = fd.Chown(int(context.Owner.Uid), int(context.Owner.Gid)) + if err != nil { + tlog.Warn.Printf("PreserveOwner: Chown failed: %v", err) + } + } return NewFile(fd, writeOnly, fs.contentEnc) } |