-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nested mounts #548
Comments
Yes, I think the complex combinations of However, we are close to finishing the rework of the whole FS subsystem: #371 After this rework, In fact, you can already try the latest Gramine with the |
wait are you saying this should already work? fs.mounts = [
{ path = "/app/wordpress", uri = "file:/app/wordpress", type="tmpfs"},
{ path = "/app/wordpress/wp-config.php", uri = "file:/app/persisted/wp-config.php", type = "encrypted", key_name = "default" },
] it doesnt for me
|
Do you have the
Also, what is the Gramine version/commit you're running? (You can find it when you enable This feature was merged in Gramine very recently, on 20. April. |
yes key is specified, debug doesnt show more info however, adding it to allowed confusingly makes it work sgx.allowed_files = [
"file:/app/persisted/wp-config.php"
]
is this intentional? i was assuming allowed means unencrypted write, but it actually looks encrypted on the host gramine is git from last week, let me make sure to pull todays head instead. |
Please do. There was a small bug exactly as you describe (adding the file to |
going to close because the new feature does what we need. thanks! |
nesting a protected file inside a tmpfs doesnt work.
writes to the nested protected file do not make it to the host.
background:
the tmpfs is needed here to preload php code into the enclave memory, since we are required to use gramines fs implementation. but the code expects the directory to be persisted, so i tried making individual file exceptions
The text was updated successfully, but these errors were encountered: