-
Notifications
You must be signed in to change notification settings - Fork 557
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IDMapping field for mount point #1143
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -117,6 +117,11 @@ type Mount struct { | |
Source string `json:"source,omitempty"` | ||
// Options are fstab style mount options. | ||
Options []string `json:"options,omitempty"` | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The idmap option is one of the fstab options and that is why we don't need to mention it in any other part of the spec? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I guess it is explicit when a mapping is specified? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh, so we use idmap if a mapping is specified? Makes sense. Thanks! |
||
|
||
// UID/GID mappings used for changing file owners w/o calling chown, fs should support it. | ||
// Every mount point could have its own mapping. | ||
UIDMappings []LinuxIDMapping `json:"uidMappings,omitempty" platform:"linux"` | ||
GIDMappings []LinuxIDMapping `json:"gidMappings,omitempty" platform:"linux"` | ||
AlexeyPerevalov marked this conversation as resolved.
Show resolved
Hide resolved
|
||
} | ||
|
||
// Hook specifies a command that is run at a particular event in the lifecycle of a container | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any specific reason that we don't have this for rootfs?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we don't have other mount options for rootfs.
And practically, it won't be very helpful since overlay doesn't support idmapped mounts on the overlay mount itself (only on the lower layers).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also, the spec currently says the runtime should not modify the rootfs permissions: https://github.com/opencontainers/runtime-spec/blob/main/config-linux.md#user-namespace-mappings