Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support provisioned storage with incorrect permissions #541

Merged
merged 2 commits into from
Jan 31, 2018

Conversation

cam72cam
Copy link
Contributor

I ran into an issue when trying to get this to work with a NFS server which I did not have direct control over (EFS). As part of the PersistentVolumeClaim, there is no easy way to set the UID and GID of the created directory.on the networked FS.

My only concern with this chown is that some user out there might be running jupyterhub in an odd configuration where $NB_USER is not supposed to have these exact permissions on the storage. I think this is quite unlikely, but it is worth mentioning.

I chronicled my experiences with working around this issue and setting up z2jh on EFS in jupyterhub/zero-to-jupyterhub-k8s#421 with @yuvipanda.

I ran into an issue when trying to get this to work with a NFS server which I did not have direct control over (EFS).  As part of the PersistentVolumeClaim, there is no easy way to set the UID and GID of the created directory.on the networked FS.

My only concern with this chown is that some user out there might be running jupyterhub in an odd configuration where $NB_USER is not supposed to have these exact permissions on the storage.  I think this is quite unlikely, but it is worth mentioning. 

I chronicled my experiences with working around this issue and setting up z2jh on EFS in jupyterhub/zero-to-jupyterhub-k8s#421 with @yuvipanda.
@minrk
Copy link
Member

minrk commented Jan 31, 2018

Changing permissions is known to cause problems for mounted volumes. Perhaps more appropriate is to do this if and only if the chosen user+group combo cannot write in their home directory. Or more simply, gate it behind an off-by-default flag, e.g CHOWN_HOME.

@cam72cam
Copy link
Contributor Author

@minrk I took your suggestion and added a commit to gate it behind $CHOWN_HOME

@minrk
Copy link
Member

minrk commented Jan 31, 2018

Thanks!

@minrk minrk merged commit 29b68cd into jupyter:master Jan 31, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants