Home
last modified time | relevance | path

Searched refs:rootIDs (Results 1 – 25 of 188) sorted by relevance

12345678

/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go135 rootIDs := daemon.idMappings.RootPair()
142 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
150 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
182 rootIDs := daemon.idMappings.RootPair()
222 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
266 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
281 rootIDs := daemon.idMappings.RootPair()
288 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
292 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
307 rootIDs := daemon.idMappings.RootPair()
[all …]
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go134 rootIDs := daemon.idMappings.RootPair()
141 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
149 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
171 rootIDs := daemon.idMappings.RootPair()
173 if err := idtools.MkdirAllAndChown(localMountPath, 0700, rootIDs); err != nil {
188 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
207 if err := idtools.MkdirAllAndChown(filepath.Dir(fPath), 0700, rootIDs); err != nil {
232 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
256 rootIDs := daemon.idMappings.RootPair()
258 if err := idtools.MkdirAllAndChown(localPath, 0700, rootIDs); err != nil {
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go134 rootIDs := daemon.idMappings.RootPair()
141 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
149 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
171 rootIDs := daemon.idMappings.RootPair()
173 if err := idtools.MkdirAllAndChown(localMountPath, 0700, rootIDs); err != nil {
188 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
207 if err := idtools.MkdirAllAndChown(filepath.Dir(fPath), 0700, rootIDs); err != nil {
232 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
256 rootIDs := daemon.idMappings.RootPair()
258 if err := idtools.MkdirAllAndChown(localPath, 0700, rootIDs); err != nil {
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go135 rootIDs := daemon.idMapping.RootPair()
142 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
150 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
182 rootIDs := daemon.idMapping.RootPair()
222 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
273 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
288 rootIDs := daemon.idMapping.RootPair()
295 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
299 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
314 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go135 rootIDs := daemon.idMapping.RootPair()
142 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
150 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
182 rootIDs := daemon.idMapping.RootPair()
222 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
266 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
281 rootIDs := daemon.idMapping.RootPair()
288 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
292 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
307 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go135 rootIDs := daemon.idMapping.RootPair()
142 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
150 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
182 rootIDs := daemon.idMapping.RootPair()
222 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
273 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
288 rootIDs := daemon.idMapping.RootPair()
295 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
299 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
314 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go136 rootIDs := daemon.idMapping.RootPair()
143 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
151 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
183 rootIDs := daemon.idMapping.RootPair()
223 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
274 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
289 rootIDs := daemon.idMapping.RootPair()
296 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
300 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
315 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go136 rootIDs := daemon.idMapping.RootPair()
143 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
151 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
183 rootIDs := daemon.idMapping.RootPair()
223 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
274 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
289 rootIDs := daemon.idMapping.RootPair()
296 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
300 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
315 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/daemon/
H A Dcontainer_operations_unix.go136 rootIDs := daemon.idMapping.RootPair()
143 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
151 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
183 rootIDs := daemon.idMapping.RootPair()
223 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
274 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
289 rootIDs := daemon.idMapping.RootPair()
296 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
300 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
315 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/daemon/
H A Dcontainer_operations_unix.go136 rootIDs := daemon.idMapping.RootPair()
143 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
151 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
183 rootIDs := daemon.idMapping.RootPair()
223 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
274 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
289 rootIDs := daemon.idMapping.RootPair()
296 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
300 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
315 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/daemon/
H A Dcontainer_operations_unix.go135 rootIDs := daemon.idMapping.RootPair()
142 if err := idtools.MkdirAllAndChown(shmPath, 0700, rootIDs); err != nil {
150 if err := os.Chown(shmPath, rootIDs.UID, rootIDs.GID); err != nil {
182 rootIDs := daemon.idMapping.RootPair()
222 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
266 if err := os.Chown(fPath, rootIDs.UID+uid, rootIDs.GID+gid); err != nil {
281 rootIDs := daemon.idMapping.RootPair()
288 if err := idtools.MkdirAllAndChown(dir, 0700, rootIDs); err != nil {
292 tmpfsOwnership := fmt.Sprintf("uid=%d,gid=%d", rootIDs.UID, rootIDs.GID)
307 rootIDs := daemon.idMapping.RootPair()
[all …]
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/daemon/initlayer/
H A Dsetup_unix.go20 func Setup(initLayerFs containerfs.ContainerFS, rootIDs idtools.IDPair) error {
45 …tools.MkdirAllAndChownNew(filepath.Join(initLayer, filepath.Dir(pth)), 0755, rootIDs); err != nil {
50 … if err := idtools.MkdirAllAndChownNew(filepath.Join(initLayer, pth), 0755, rootIDs); err != nil {
58 f.Chown(rootIDs.UID, rootIDs.GID)
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/daemon/initlayer/
H A Dsetup_unix.go20 func Setup(initLayerFs containerfs.ContainerFS, rootIDs idtools.IDPair) error {
45 …tools.MkdirAllAndChownNew(filepath.Join(initLayer, filepath.Dir(pth)), 0755, rootIDs); err != nil {
50 … if err := idtools.MkdirAllAndChownNew(filepath.Join(initLayer, pth), 0755, rootIDs); err != nil {
58 f.Chown(rootIDs.UID, rootIDs.GID)
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/initlayer/
H A Dsetup_unix.go20 func Setup(initLayerFs containerfs.ContainerFS, rootIDs idtools.IDPair) error {
45 …tools.MkdirAllAndChownNew(filepath.Join(initLayer, filepath.Dir(pth)), 0755, rootIDs); err != nil {
50 … if err := idtools.MkdirAllAndChownNew(filepath.Join(initLayer, pth), 0755, rootIDs); err != nil {
58 f.Chown(rootIDs.UID, rootIDs.GID)
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go33 rootIDs := d.idMapping.RootPair()
34 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
108 rootIDs := d.idMapping.RootPair()
109 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
112 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go33 rootIDs := d.idMappings.RootPair()
34 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
110 rootIDs := d.idMappings.RootPair()
111 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
114 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go33 rootIDs := d.idMappings.RootPair()
34 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
110 rootIDs := d.idMappings.RootPair()
111 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
114 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go33 rootIDs := d.idMappings.RootPair()
34 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
108 rootIDs := d.idMappings.RootPair()
109 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
112 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/daemon/graphdriver/vfs/
H A Ddriver.go33 rootIDs := d.idMapping.RootPair()
34 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
108 rootIDs := d.idMapping.RootPair()
109 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
112 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/builder/dockerfile/
H A Dcopy_unix.go13 func fixPermissions(source, destination string, rootIDs idtools.IDPair, overrideSkip bool) error {
42 return os.Lchown(fullpath, rootIDs.UID, rootIDs.GID)
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/builder/dockerfile/
H A Dcopy_unix.go13 func fixPermissions(source, destination string, rootIDs idtools.IDPair, overrideSkip bool) error {
42 return os.Lchown(fullpath, rootIDs.UID, rootIDs.GID)
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/builder/dockerfile/
H A Dcopy_unix.go13 func fixPermissions(source, destination string, rootIDs idtools.IDPair, overrideSkip bool) error {
42 return os.Lchown(fullpath, rootIDs.UID, rootIDs.GID)
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/daemon/graphdriver/vfs/
H A Ddriver.go41 rootIDs := d.idMapping.RootPair()
42 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
143 rootIDs := d.idMapping.RootPair()
144 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
147 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go41 rootIDs := d.idMapping.RootPair()
42 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
143 rootIDs := d.idMapping.RootPair()
144 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
147 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/daemon/graphdriver/vfs/
H A Ddriver.go41 rootIDs := d.idMapping.RootPair()
42 if err := idtools.MkdirAllAndChown(home, 0700, rootIDs); err != nil {
143 rootIDs := d.idMapping.RootPair()
144 if err := idtools.MkdirAllAndChown(filepath.Dir(dir), 0700, rootIDs); err != nil {
147 if err := idtools.MkdirAndChown(dir, 0755, rootIDs); err != nil {

12345678