Vouch Request: Fix custom VCT mount issue (#967) #971
kon-angelo
started this conversation in
Vouch Request
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'd like to fix the issue where custom volumeClaimTemplates are created but never mounted in sandbox pods (issue #967).
Root Cause
In
crates/openshell-driver-kubernetes/src/driver.rs, theapply_workspace_persistence()function (lines 1129-1131) bundles two concerns into an all-or-nothing decision:/sandboxvolumeMount to the agent containerWhen users provide custom VCTs via
platform_config, theinject_workspace = falseflag causes BOTH the mount and the seeding to be skipped. This means:volumeMountentries are added to the agent container (lines 1073-1082)Additionally, providing ANY custom VCT completely disables the default workspace persistence — users lose the
/sandboxmount with no way to restore it.Fix
Split
apply_workspace_persistence()into two independent functions:apply_workspace_mount(): Always adds the volumeMount at/sandbox(for both default and user VCTs)apply_workspace_seeding(): Only adds the init container for the default workspace VCT (not for user VCTs, since users bring their own storage)This ensures user-provided VCTs are mounted and accessible, while avoiding unnecessary seeding of user-managed storage.
Verification
I have:
sandbox_to_k8s_spec()andsandbox_template_to_k8s()indriver.rsworkspace_persistence_skipped_when_inject_workspace_falseat line 1912, which validates the absence)967-fix-vct-mountwith commit16063baeI can explain every line of the change and how it interacts with the Kubernetes driver, SAG controller, and pod spec generation.
Related
967-fix-vct-mount16063bae"fix(driver-kubernetes): mount user-provided VCTs at /sandbox without seeding"Beta Was this translation helpful? Give feedback.
All reactions