You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As an app developer
I want to mount FUSE filesystems from within my app instance without any special privileges
So that I can fill gaps using existing FUSE solutions.
Disk capacity is a limiting factor for many jobs that might otherwise run well in CF. Given the efs-volume-release is mothballed, and nfs-volume-release is tricky to operate, operator support for persistent or large filesystems may not be available.
App developers might have various network block/blob or other file storage options available to them via FUSE, but (previously!) they had no ability to use them because FUSE required CAP_SYS_ADMIN, which garden-runc explicitly strips.
This situation has changed! See below.
Acceptance criteria
Scenario:
Given I have deployed an application
And the application includes sshfs
And I have started a shell inside the container (eg via cf ssh)
When I run unshare -c --keep-caps -m
And I run mkdir dirname; sshfs user@host:dirname dirname (for an available user@host)
Then the command succeeds
And I see the content of user@host:dirname under dirname.
Proposed Change
As an app developer
I want to mount FUSE filesystems from within my app instance without any special privileges
So that I can fill gaps using existing FUSE solutions.
efs-volume-release
is mothballed, andnfs-volume-release
is tricky to operate, operator support for persistent or large filesystems may not be available.CAP_SYS_ADMIN
, which garden-runc explicitly strips.Acceptance criteria
Scenario:
Given I have deployed an application
And the application includes
sshfs
And I have started a shell inside the container (eg via
cf ssh
)When I run
unshare -c --keep-caps -m
And I run
mkdir dirname; sshfs user@host:dirname dirname
(for an availableuser@host
)Then the command succeeds
And I see the content of
user@host:dirname
underdirname
.Related links
CAP_SYS_ADMIN
.--privileged
or--cap-add SYS_ADMIN
./dev/fuse
available in containers, so I suspect that enabling this may just be a case of the seccomp profile provided to runC growing the additions forclone
,mount
,umount
,umount2
, andunshare
.The text was updated successfully, but these errors were encountered: