COSFS allows you to mount COS buckets locally and work with the objects in Tencent Cloud COS in the same way as you do with a local file system. COSFS supports the following features:
Built on S3FS, COSFS is only suitable for simple management of mounted files, and does not support some features of a local file system. It cannot replace Cloud Block Storage (CBS) or Cloud File Storage (CFS) for the reason of performance. Please note:
Renameoperation on a file/folder is not atomic.
list directory, COSFS has a limited performance, because remote access to the COS server is required.
cdcommand to switch to another directory and then mount and unmount the files at the mounting point.
Ubuntu, CentOS, SUSE, and macOS.
The compilation and installation of COSFS depend on the software packages such as automake, git, libcurl-devel, libxml2-devel, fuse-devel, make, and openssl-devel. The following describes how to install dependency software on Ubuntu, CentOS, SUSE, and macOS:
sudo apt-get install automake autotools-dev g++ git libcurl4-gnutls-dev libfuse-dev libssl-dev libxml2-dev make pkg-config fuse
sudo yum install automake gcc-c++ git libcurl-devel libxml2-devel fuse-devel make openssl-devel fuse
sudo zypper install gcc-c++ automake make libcurl-devel libxml2-devel openssl-devel pkg-config
brew install automake git curl libxml2 make pkg-config openssl brew cask install osxfuse
You need to download the COSFS source code from GitHub to the specified directory, e.g.
/usr/cosfs in the sample below (It is recommended that you select the directory according to your actual operating environment):
git clone https://github.com/tencentyun/cosfs /usr/cosfs
Open the installation directory, and execute the following command to compile and install COSFS:
cd /usr/cosfs ./autogen.sh ./configure make sudo make install cosfs --version #View the cosfs version number
During the "configure" operation, a message is displayed, which varies with different operating systems:
On a system where the fuse version is earlier than 2.8.4, the following error message is displayed during the "configure" operation:
checking for common_lib_checking... configure: error: Package requirements (fuse >= 2.8.4 libcurl >= 7.0 libxml-2.0 >= 2.6) were not met: Requested 'fuse >= 2.8.4' but version of fuse is 2.8.3
In this case, you need to manually install fuse 2.8.4 or above as shown below:
yum -y remove fuse-devel wget https://github.com/libfuse/libfuse/releases/download/fuse_2_9_4/fuse-2.9.4.tar.gz tar -zxvf fuse-2.9.4.tar.gz cd fuse-2.9.4 ./configure make make install export PKG_CONFIG_PATH=/usr/lib/pkgconfig:/usr/lib64/pkgconfig/:/usr/local/lib/pkgconfig modprobe fuse #Mount the fuse's kernel module echo "/usr/local/lib" >> /etc/ld.so.conf ldconfig #Update the dynamic link library pkg-config --modversion fuse #View the fuse version number. If "2.9.4" is displayed, fuse 2.9.4 is installed successfully.
Install fuse 2.8.4 or above on the SUSE system, as shown below:
During installation, you need to comment out the content of line 222 in the example/fusexmp.c file by using
/*content*/. Otherwise, an error message is displayed when "make" is executed.
zypper remove fuse libfuse2 wget https://github.com/libfuse/libfuse/releases/download/fuse_2_9_4/fuse-2.9.4.tar.gz tar -zxvf fuse-2.9.4.tar.gz cd fuse-2.9.4 ./configure make make install export PKG_CONFIG_PATH=/usr/lib/pkgconfig:/usr/lib64/pkgconfig/:/usr/local/lib/pkgconfig modprobe fuse #Mount the fuse's kernel module echo "/usr/local/lib" >> /etc/ld.so.conf ldconfig #Update the dynamic link library pkg-config --modversion fuse #View the fuse version number. If "2.9.4" is displayed, fuse 2.9.4 is installed successfully.
When the "configure" operation is performed on macOS, the following may be displayed:
configure: error: Package requirements (fuse >= 2.7.3 libcurl >= 7.0 libxml-2.0 >2.6 libcrypto >= 0.9) were not met No package 'libcrypto' found
In this case, you need to set the variable PKG_CONFIG_PATH, so that the pkg-config tool can find openssl. The command is as follows:
brew info openssl export PKG_CONFIG_PATH=/usr/local/opt/openssl/lib/pkgconfig #You may need to modify this command based on the message displayed for the previous command.
In the /etc/passwd-cosfs file, write the bucket name (such as <BucketName-APPID>), and <SecretId> and <SecretKey> for the bucket. The three items are separated with half-width colons (:). In addition, to prevent key leakage, you need to set the permission for the key file to 640. The command used to configure the /etc/passwd-cosfs key file is as follows:
echo <BucketName-APPID>:<SecretId>:<SecretKey> > /etc/passwd-cosfs chmod 640 /etc/passwd-cosfs
Replace <BucketName-APPID>, <SecretId>, and <SecretKey> with the information of your bucket.
For the bucket naming conventions, see Bucket Naming Conventions. Go to Cloud API Key Management in the CAM Console to obtain <SecretId> and <SecretKey>. In addition, you may store the keys in the $HOME/.passwd-cosfs file, or specify a path for the key file using -opasswd_file=[path]. In this case, you need to set the permission for the key file to 600.
echo examplebucket-1250000000:AKIDHTVVaVR6e3:PdkhT9e2rZCfy6 > /etc/passwd-cosfs chmod 640 /etc/passwd-cosfs
After the configuration of key file, mount the bucket to the specified directory using the following command:
cosfs <BucketName-APPID> <MountPoint> -ourl=<CosDomainName> -odbglevel=info -oallow_other
http://cos.<Region>.myqcloud.com(applicable to XML APIs and should not contain the bucket name). <Region> is the region name in short, for example, ap-guangzhou and eu-frankfurt. For more information, see Regions and Endpoints.
mkdir -p /mnt/cosfs cosfs examplebucket-1250000000 /mnt/cosfs -ourl=http://cos.ap-guangzhou.myqcloud.com -odbglevel=info -onoxattr -oallow_other
The mounting command for the COSFS earlier than v1.0.5 is as follows:
cosfs <APPID>:<BucketName> <MountPoint> -ourl=<CosDomainName> -oallow_other
The configuration file for the COSFS earlier than v1.0.5 is in the following format:
Unmount a bucket using the following commands:
fusermount -u /mnt or umount -l /mnt
Specifies the size (in MB) of each part for multipart upload. It is 10 MB by default. A maximum of 10000 parts for a single file are allowed for a multipart upload. If the file size exceeds 100 GB (10 MB * 10000), you need to adjust this parameter accordingly.
Allows other users to access the folder to which the bucket is mounted.
By default, to ensure optimal performance, the COSFS does not clear local cached data after a bucket is unmounted. To enable the COSFS to automatically clear cached data upon its exit, you can add this option during mounting.
Disables getattr/setxattr. For the COSFS earlier than 1.0.9, you cannot set or obtain extended attributes. If the use_xattr option is used during mounting, the files may fail to be copied to the bucket.
Specifies the path for the COSFS key file. You need to set the permission for the key file to 600.
Sets the level of the COSFS log record to “info” (in a production environment) or “dbg” (during debugging).
Removes the permission of a specified type of users to operate files in the mounting destination directory. For example, when -oumask=755, the permission for the mounting destination directory is changed to 022.
Allows the user whose id is [uid] to access all the files in the mounting destination directory without being restricted by the file permission bits.
You can obtain the uid of a user using the id command
id -u username. For example, you can execute
id -u user_00 to obtain the uid of user_00.
For any questions about COSFS, see FAQs about COSFS.