Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable unprivileged FUSE mounts #364

Open
mogul opened this issue Dec 2, 2024 · 0 comments
Open

Enable unprivileged FUSE mounts #364

mogul opened this issue Dec 2, 2024 · 0 comments
Assignees

Comments

@mogul
Copy link

mogul commented Dec 2, 2024

Proposed Change

As an app developer
I want to mount FUSE filesystems from within my app instance without any special privileges
So that I can fill gaps using existing FUSE solutions.

  • Disk capacity is a limiting factor for many jobs that might otherwise run well in CF. Given the efs-volume-release is mothballed, and nfs-volume-release is tricky to operate, operator support for persistent or large filesystems may not be available.
  • App developers might have various network block/blob or other file storage options available to them via FUSE, but (previously!) they had no ability to use them because FUSE required CAP_SYS_ADMIN, which garden-runc explicitly strips.
  • This situation has changed! See below.

Acceptance criteria

Scenario:
Given I have deployed an application
And the application includes sshfs
And I have started a shell inside the container (eg via cf ssh)
When I run unshare -c --keep-caps -m
And I run mkdir dirname; sshfs user@host:dirname dirname (for an available user@host)
Then the command succeeds
And I see the content of user@host:dirname under dirname.

Related links

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

2 participants