Skip to content

Commit

Permalink
proposal for projected service account volume file permission handling
Browse files Browse the repository at this point in the history
  • Loading branch information
zshihang committed Mar 6, 2020
1 parent a61531f commit d95ecf9
Showing 1 changed file with 12 additions and 2 deletions.
14 changes: 12 additions & 2 deletions keps/sig-storage/20180515-svcacct-token-volumes.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,18 @@ authors:
- "@smarterclayton"
- "@liggitt"
- "@mikedanese"
- "@zshihang"
owning-sig: sig-storage
participating-sigs:
- sig-auth
reviewers:
- TBD
- "@mikedanese"
- "@liggitt"
approvers:
- TBD
editor: "@zshihang"
creation-date: 2018-05-15
last-updated: 2020-03-04
last-updated: 2020-03-05
status: implemented
see-also:
- "https://github.com/kubernetes/community/blob/master/contributors/design-proposals/storage/svcacct-token-volume-source.md"
Expand Down Expand Up @@ -160,6 +162,14 @@ sources:
audience: ca.istio.io
```
### File Permission
The owner of projected service account volume will be set to the user ID of the
first container in the pod with mode 0600; if there are containers with
different user IDs in the pod, `fsGroup` in the `PodSecurityContext` must be
provided and the ownership will also be granted to the provided `fsGroup`.


### Alternatives

1. Instead of implementing a service account token volume projection, we could
Expand Down

0 comments on commit d95ecf9

Please sign in to comment.