@@ -87,6 +87,7 @@ tags, and then generate with `hack/update-toc.sh`.
87
87
- [ Story 1] ( #story-1 )
88
88
- [ Story 2] ( #story-2 )
89
89
- [ Story 3] ( #story-3 )
90
+ - [ Story 4] ( #story-4 )
90
91
- [ Notes/Constraints/Caveats (Optional)] ( #notesconstraintscaveats-optional )
91
92
- [ Vocabulary: OCI Images, Artifacts, and Objects] ( #vocabulary-oci-images-artifacts-and-objects )
92
93
- [ Risks and Mitigations] ( #risks-and-mitigations )
@@ -268,9 +269,7 @@ to support this source type. Key design aspects include:
268
269
- API changes to introduce the new ` VolumeSource ` type.
269
270
- Modifications to the Kubelet to handle mounting OCI images and artifacts.
270
271
- Handling image pull secrets and registry authentication.
271
- - Reuse existing logic from ConfigMaps for:
272
- - Determining the file location on the host filesystem.
273
- - Handling updates to the OCI image or artifact, similar to how ConfigMaps update mounted files.
272
+ - Reuse existing logic from ConfigMaps to determining the file location on the host filesystem.
274
273
275
274
The following code snippet illustrates the proposed API change:
276
275
@@ -356,7 +355,7 @@ message ImageSpec {
356
355
// …
357
356
358
357
// Absolute local path where the image/artifacts should be mounted to.
359
- string mount_path = 20;
358
+ string mountpoint = 20;
360
359
}
361
360
` ` `
362
361
@@ -366,14 +365,15 @@ plugin as part of the existing [volume manager](https://github.com/kubernetes/ku
366
365
367
366
# ### Container Runtimes
368
367
369
- Container runtimes need to support the new `mount_path ` field, otherwise the
370
- feature cannot be used. The kubelet will verify if the mount path actually
368
+ Container runtimes need to support the new `mountpoint ` field, otherwise the
369
+ feature cannot be used. The kubelet will verify if the `mountpoint` actually
371
370
exists on disk to check the feature availability, because Protobuf will strip
372
371
the field in a backwards compatible way for older runtimes. Pods using the new
373
372
` VolumeSource` combined with a not supported container runtime version will fail
374
373
to run on the node.
375
374
376
- For security reasons, volume mounts should be done using the [`noexec`] flag.
375
+ For security reasons, volume mounts should set the [`noexec`] and `ro`
376
+ (read-only) options by default.
377
377
378
378
# ## Test Plan
379
379
0 commit comments