Skip to content

Access Control

FlexFS provides multiple layers of access control that work together to protect data and enforce security policies.

FlexFS is a fully POSIX-compliant filesystem and enforces standard Unix file permissions (owner, group, other with read/write/execute bits). All permission checks are performed on the mount client based on the calling process’s UID and GID.

Root squashing maps uid=0 and gid=0 to a specified non-root user, preventing root users on mount clients from having root-level access to the filesystem.

On the mount client:

Terminal window
mount.flexfs start my-volume /mnt/data --rootSquash

By default, root is mapped to uid=65534 / gid=65534 (the nobody user). You can customize the mapping:

Terminal window
mount.flexfs start my-volume /mnt/data \
--rootSquash \
--rootSquashUID 1000 \
--rootSquashGID 1000

Root squashing can also be set as a volume-level flag via configure.flexfs, in which case it applies to all mounts of that volume.

FlexFS supports POSIX.1e extended access control lists (ACLs), which allow fine-grained per-user and per-group permissions beyond the standard owner/group/other model.

On the mount client:

Terminal window
mount.flexfs start my-volume /mnt/data --acl

Or as a volume-level flag via configure.flexfs.

Once enabled, use standard Linux ACL tools:

Terminal window
# Set an ACL
setfacl -m u:alice:rwx /mnt/data/project
# View ACLs
getfacl /mnt/data/project
# Remove an ACL
setfacl -x u:alice /mnt/data/project

Extended attributes are enabled with the --xAttr flag:

Terminal window
mount.flexfs start my-volume /mnt/data --xAttr

Xattrs are automatically enabled when ACLs or root squashing are active.

The umask controls the default permissions for newly created files and directories. FlexFS supports overriding the process umask at the mount level:

Terminal window
mount.flexfs start my-volume /mnt/data --umask 0027

This sets newly created files to 0640 and directories to 0750 regardless of the creating process’s umask. Umask can also be configured as a volume-level setting.

Several access control settings can be enforced at the volume level via configure.flexfs. When set on the volume, they apply to all mounts regardless of the mount client’s flags:

Volume flagEffect
roRead-only — no writes permitted
noatimeDo not update access times
noexecPrevent execution of files
nosuidDisable SUID/SGID special permissions
aclEnable extended ACLs
rootsquashEnable root squashing
xattrEnable extended attributes

These flags are set during volume creation or update in configure.flexfs and override mount-client options.

Volume tokens can be scoped to a specific subdirectory within a volume. When a mount path is set on a token, the mount client only has access to that subdirectory and its contents — the rest of the volume is not visible.

This provides subdirectory isolation without creating separate volumes:

Volume: shared-data
Token A (mount path: /team-alpha) -> sees only /team-alpha/*
Token B (mount path: /team-beta) -> sees only /team-beta/*
Token C (mount path: /) -> sees entire volume

Mount path scoping is configured when creating or updating a volume token in configure.flexfs. The mount client automatically mounts at the scoped path.

In addition to mount path scoping, each volume token can carry its own set of mount flags (e.g., ro, noExec). These flags are merged with the volume-level flags, providing token-level access control.

LayerScopeConfigured via
POSIX permissionsPer-file/directoryStandard Unix tools (chmod, chown)
Extended ACLsPer-file/directorysetfacl / getfacl
Root squashingPer-mount or per-volume--rootSquash flag or volume flag
UmaskPer-mount or per-volume--umask flag or volume setting
Volume flagsPer-volumeconfigure.flexfs
Token mount pathsPer-tokenconfigure.flexfs
Token flagsPer-tokenconfigure.flexfs