Skip to content

Enable unprivileged FUSE mounts #364

@mogul

Description

@mogul

Proposed Change

As an app developer
I want to mount FUSE filesystems from within my app instance without any special privileges
So that I can fill gaps using existing FUSE solutions.

  • Disk capacity is a limiting factor for many jobs that might otherwise run well in CF. Given the efs-volume-release is mothballed, and nfs-volume-release is tricky to operate, operator support for persistent or large filesystems may not be available.
  • App developers might have various network block/blob or other file storage options available to them via FUSE, but (previously!) they had no ability to use them because FUSE required CAP_SYS_ADMIN, which garden-runc explicitly strips.
  • This situation has changed! See below.

Acceptance criteria

Scenario:
Given I have deployed an application
And the application includes sshfs
And I have started a shell inside the container (eg via cf ssh)
When I run unshare -c --keep-caps -m
And I run mkdir dirname; sshfs user@host:dirname dirname (for an available user@host)
Then the command succeeds
And I see the content of user@host:dirname under dirname.

Related links

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Inbox

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions