have not tried it on my pc (mac OS - since it required some settings adjustments that I did not follow), but I did managed to mount it via other docker container in kubernetes (using the same command mentioned above). In order to accomplish that I had to add the securityContext.privileged: true seetings into the manifest + I know the container is ran as root user.
Im my case I’m using gcsfuse instead of s3fs, now the error message is the same fuse: device not found, try 'modprobe fuse' first
I am able to mount GCS buckets in other containers, and as @Nativ_Issac mentions, I believe the issue is that we need to add the securityContext.privileged: true settings into the singleuser manifest
Currently, in the Helm Chart values.yaml we have keys that manage other security options of the user’s pod, like singleuser.allowPrivilegeEscalation and singleuser.uid, that will be reflected on securityContext.allowPrivilegeEscalation and securityContext.runAsUser respectively.
I can’t find a similar key for setting the value of securityContext.privileged
@manics , do you know how to set this value via values.yaml or some other method?
This seem will let the container run as privileged, causing a major security violation: Pod Security Standards | Kubernetes
Privileged Containers Privileged Pods disable most security mechanisms and must be disallowed. Restricted Fields
spec.containers[*].securityContext.privileged
I am wondering if jupyterhub has some build-in mechanism to ensure the security for the privileged single user pod.
We are facing same issue, but our security standard won’t allow privileged container running.