-
Notifications
You must be signed in to change notification settings - Fork 550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: Add mount hook #644
Comments
On Wed, Dec 14, 2016 at 08:16:20PM -0800, Ye Yin wrote:
Mount hook is useful…
Can you give some example use-cases?
As it stands, you're free to setup an external mount namespace any way
you like and then set linux.namespaces[].path for the mount namespace
to join your prepared namespace. The trade-off when landing something
like pre-/post-mount hooks in the spec is whether the use cases it
supports justify the increased complication for everyone else.
|
There maybe lots of use-cases, and I give two examples here: (2)I want to run systemd in container with cgroup enabled in container, when cgroupfs is mounted in container, I want to mkdir There maybe more... |
I don't think this belongs in the spec and should be left out. @mrunalp would know more though |
@hustcat We have been able to use the pre-start hooks to manipulate the mounts as needed. PTAL at oci-systemd-hook. I don't think that we need additional mount hooks. A combination of pre-start hooks and create-start split should cover these use cases if not directly covered by passing the mounts to config.json. |
Mount
inrunc
containPremountCmds
andPostmountCmds
fields.Howerver, there are no corresponding fields in
Mount
ofruntim-spec
.Mount hook is useful, I'd like to add it in
runtime-spec
, such as:The text was updated successfully, but these errors were encountered: