Skip to content

Commit 3ab97c7

Browse files
committed
NFS-Related Technical Corrections to charts/docker-mailserver/README.md
- Corrects wrong assumption of fsGroup not being applied to root - More accurately reflects why fsGroup isn't usable - Provides more cases in how NFS could work with changes to the chart's container image
1 parent 45cfd27 commit 3ab97c7

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

charts/docker-mailserver/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -220,13 +220,13 @@ The DMS chart is currently not tested for replication, high availability. If sub
220220

221221
#### NFS
222222

223-
Docker Mailserver (the container) currently assumes that local posix-based storage (e.g. local or hostPath fs drivers) is used, and doesn't fully work with standard writable NFS shares (tested against NFS 4.2). Using fsGroup in the pod's securityContext won't help in this case as the container's root nor any other user seems to get it applied as a supplementary group.
223+
Docker Mailserver (the container) currently assumes that local posix-based storage (e.g. local or hostPath fs drivers) is used, and doesn't fully work with standard writable NFS shares (tested against NFS 4.2). Using fsGroup in the pod's securityContext won't help in part due to the supplementary group only being applied to root, rather the users that need their directories created.
224224

225225
The current alternative is to apply the `no_root_squash` flag to any backing NFS shares, as well as ensure root ownership initially. If you do not know the caveats of [using the no_root_squash flag](https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/security_guide/s2-server-nfs-noroot) and/or cannot properly mitigate the potential risk from using it, **consider not using NFS shares as backing storage at this time**.
226226

227-
The reason `no_root_squash` is currently required is due to how DMS does initial fs setup. The container currently utilizes a lot of post-init directory creation and ownership changing done as root.
227+
The reason `no_root_squash` is currently required is due to how DMS does initial fs setup. The container currently utilizes a lot of post-init directory creation with full ownership changes by root.
228228

229-
DMS does not use techniques such as permissive initial directory creation that is locked down after various service users have made their respectively-owned subdirectories.
229+
DMS utilizes neither group-only chown as nfsnobody/root, fsGroup applied to all persistence-needing users, nor permissive directory structures during initialization. This prevents any NFS-friendly method of creating directory structures owned by varying users.
230230

231231
Quirks from the generic section also apply to NFS-backed PersistentVolumes.
232232

0 commit comments

Comments
 (0)