Having an issue with permissions on privileged containers (haven't even started with unprivileged yet).
I have a CT made with the bind mount
/rpool/storage is a zfs mount on the host and folders/files are owned as root by default. Inside the containers exist different users, such as a samba user or other service user. Even being unprivileged, they can't create files.
This is mostly expected since they're owned by root. Changing it to nobody:nogroup didn't resolve it.
From my understanding for unprivileged containers: "the container takes the subuid and subgid ranges for root and mapping them to UIDs/GIDs inside the container". This appears to be working okay as long as the service inside the CT is using root. What about non-root users in the CT?
So my setup question would be: How could I have multiple different users from different containers be able to write to the mount /rpool/storage zfs directory on the host?
I have a CT made with the bind mount
Code:
mp0: /rpool/storage,mp=/storage
/rpool/storage is a zfs mount on the host and folders/files are owned as root by default. Inside the containers exist different users, such as a samba user or other service user. Even being unprivileged, they can't create files.
Code:
touch: cannot touch 'test': Permission denied
This is mostly expected since they're owned by root. Changing it to nobody:nogroup didn't resolve it.
From my understanding for unprivileged containers: "the container takes the subuid and subgid ranges for root and mapping them to UIDs/GIDs inside the container". This appears to be working okay as long as the service inside the CT is using root. What about non-root users in the CT?
So my setup question would be: How could I have multiple different users from different containers be able to write to the mount /rpool/storage zfs directory on the host?
Last edited: