mirror of
https://github.com/opencontainers/runtime-spec.git
synced 2026-02-05 09:45:57 +01:00
IDMapping field for mount point
Signed-off-by: Alexey Perevalov <alexey.perevalov@huawei.com> Co-authored-by: Giuseppe Scrivano <giuseppe@scrivano.org>
This commit is contained in:
committed by
Alexey Perevalov
parent
6969a0a09a
commit
9d1130dc3b
@@ -101,6 +101,11 @@ For POSIX platforms the `mounts` structure has the following fields:
|
||||
* **`type`** (string, OPTIONAL) The type of the filesystem to be mounted.
|
||||
* Linux: filesystem types supported by the kernel as listed in */proc/filesystems* (e.g., "minix", "ext2", "ext3", "jfs", "xfs", "reiserfs", "msdos", "proc", "nfs", "iso9660"). For bind mounts (when `options` include either `bind` or `rbind`), the type is a dummy, often "none" (not listed in */proc/filesystems*).
|
||||
* Solaris: corresponds to "type" of the fs resource in [zonecfg(1M)][zonecfg.1m].
|
||||
* **`uidMappings`** (array of type LinuxIDMapping, OPTIONAL) The mapping to convert UIDs from the source file system to the destination mount point.\
|
||||
The format is the same as [user namespace mappings](config-linux.md#user-namespace-mappings).
|
||||
* **`gidMappings`** (array of type LinuxIDMapping, OPTIONAL) The mapping to convert GIDs from the source file system to the destination mount point.
|
||||
For more details see `uidMappings`.
|
||||
|
||||
|
||||
### Example (Linux)
|
||||
|
||||
|
||||
@@ -141,6 +141,18 @@
|
||||
},
|
||||
"type": {
|
||||
"type": "string"
|
||||
},
|
||||
"uidMappings": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "#/definitions/IDMapping"
|
||||
}
|
||||
},
|
||||
"gidMappings": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"$ref": "#/definitions/IDMapping"
|
||||
}
|
||||
}
|
||||
},
|
||||
"required": [
|
||||
|
||||
@@ -117,6 +117,11 @@ type Mount struct {
|
||||
Source string `json:"source,omitempty"`
|
||||
// Options are fstab style mount options.
|
||||
Options []string `json:"options,omitempty"`
|
||||
|
||||
// UID/GID mappings used for changing file owners w/o calling chown, fs should support it.
|
||||
// Every mount point could have its own mapping.
|
||||
UIDMappings []LinuxIDMapping `json:"uidMappings,omitempty" platform:"linux"`
|
||||
GIDMappings []LinuxIDMapping `json:"gidMappings,omitempty" platform:"linux"`
|
||||
}
|
||||
|
||||
// Hook specifies a command that is run at a particular event in the lifecycle of a container
|
||||
|
||||
Reference in New Issue
Block a user