Skip to content

Commit 77fd1de

Browse files
committed
Address reviewer comments
1 parent 2512f5d commit 77fd1de

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

content/en/docs/concepts/storage/projected-volumes.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -71,14 +71,17 @@ A container using a projected volume source as a [`subPath`](/docs/concepts/stor
7171
volume mount will not receive updates for those volume sources.
7272
{{< /note >}}
7373

74-
### serviceAccountToken and securityContext
74+
## SecurityContext interactions
7575

7676
The [proposal](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/2451-service-account-token-volumes#proposal) for file permission handling in projected service account volume enhancement introduced the projected files having the the correct owner permissions set.
7777

78-
#### Linux
78+
### Linux
79+
80+
In Linux pods that have a projected volume and `RunAsUser` set in the Pod
81+
[`SecurityContext`](/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context),
82+
the projected files have the correct ownership set including container user
83+
ownership.
7984

80-
In some cases, Kubernetes applies a security optimization for the contents of `serviceAccountToken`
81-
volumes.
8285
When all containers in a pod have the same `runAsUser` set in their
8386
[`PodSecurityContext`](/docs/reference/kubernetes-api/workload-resources/pod-v1/#security-context)
8487
or container
@@ -96,7 +99,7 @@ all other containers in the Pod have the same `runAsUser`, ephemeral
9699
containers must use the same `runAsUser` to be able to read the token.
97100
{{< /note >}}
98101

99-
#### Windows
102+
### Windows
100103

101104
In Windows pods that have a projected volume and `RunAsUsername` set in the
102105
Pod `SecurityContext`, the ownership is not enforced due to the way user

0 commit comments

Comments
 (0)