2015-08-15 03:41:49 +00:00
s3fs
====
s3fs allows Linux and Mac OS X to mount an S3 bucket via FUSE.
2016-05-29 02:40:58 +00:00
s3fs preserves the native object format for files, allowing use of other tools like [s3cmd ](http://s3tools.org/s3cmd ).
[![Build Status ](https://travis-ci.org/s3fs-fuse/s3fs-fuse.svg?branch=master )](https://travis-ci.org/s3fs-fuse/s3fs-fuse)
2015-08-15 03:41:49 +00:00
Features
--------
* large subset of POSIX including reading/writing files, directories, symlinks, mode, uid/gid, and extended attributes
* compatible with Amazon S3, Google Cloud Storage, and other S3-based object stores
* large files via multi-part upload
* renames via server-side copy
* optional server-side encryption
* data integrity via MD5 hashes
* in-memory metadata caching
* local disk data caching
* user-specified regions, including Amazon GovCloud
* authenticate via v2 or v4 signatures
Installation
------------
2017-05-22 17:04:55 +00:00
* On Linux, ensure you have all the dependencies:
2015-08-15 03:41:49 +00:00
On Ubuntu 14.04:
```
2017-08-01 00:20:46 +00:00
sudo apt-get install automake autotools-dev fuse g++ git libcurl4-gnutls-dev libfuse-dev libssl-dev libxml2-dev make pkg-config
2015-08-15 03:41:49 +00:00
```
On CentOS 7:
```
2016-07-08 13:41:01 +00:00
sudo yum install automake fuse fuse-devel gcc-c++ git libcurl-devel libxml2-devel make openssl-devel
2015-08-15 03:41:49 +00:00
```
2017-05-22 17:04:55 +00:00
Then compile from master via the following commands:
2015-08-15 03:41:49 +00:00
```
git clone https://github.com/s3fs-fuse/s3fs-fuse.git
cd s3fs-fuse
./autogen.sh
./configure
make
sudo make install
```
2017-05-22 17:04:55 +00:00
* On Mac OS X, install via [Homebrew ](http://brew.sh/ ):
```ShellSession
2017-09-13 01:58:19 +00:00
$ brew cask install osxfuse
2017-05-22 17:04:55 +00:00
$ brew install s3fs
```
2015-08-15 03:41:49 +00:00
Examples
--------
2017-09-13 01:44:17 +00:00
Enter your S3 identity and credential in a file `/path/to/passwd` and set
owner-only permissions:
2015-08-15 03:41:49 +00:00
```
echo MYIDENTITY:MYCREDENTIAL > /path/to/passwd
2015-09-05 07:08:07 +00:00
chmod 600 /path/to/passwd
```
2015-08-15 03:41:49 +00:00
Run s3fs with an existing bucket `mybucket` and directory `/path/to/mountpoint` :
```
s3fs mybucket /path/to/mountpoint -o passwd_file=/path/to/passwd
```
2017-09-13 01:09:56 +00:00
If you use s3fs with a non-Amazon S3 implementation, specify the URL and
path-style requests:
```
s3fs mybucket /path/to/mountpoint -o passwd_file=/path/to/passwd -o url=http://url.to.s3/ -o use_path_request_style
```
2015-08-15 03:41:49 +00:00
If you encounter any errors, enable debug output:
```
s3fs mybucket /path/to/mountpoint -o passwd_file=/path/to/passwd -d -d -f -o f2 -o curldbg
```
2015-09-07 15:05:02 +00:00
You can also mount on boot by entering the following line to `/etc/fstab` :
2015-08-15 03:41:49 +00:00
```
2016-01-24 05:34:28 +00:00
s3fs#mybucket /path/to/mountpoint fuse _netdev,allow_other 0 0
2017-09-13 01:44:17 +00:00
```
2016-01-24 05:34:28 +00:00
or
2017-09-13 01:44:17 +00:00
```
2016-01-24 05:34:28 +00:00
mybucket /path/to/mountpoint fuse.s3fs _netdev,allow_other 0 0
2015-08-15 03:41:49 +00:00
```
2016-01-19 04:22:55 +00:00
Note: You may also want to create the global credential file first
```
echo MYIDENTITY:MYCREDENTIAL > /etc/passwd-s3fs
2016-07-14 15:55:03 +00:00
chmod 600 /etc/passwd-s3fs
2016-01-19 04:22:55 +00:00
```
2016-01-19 05:06:10 +00:00
Note2: You may also need to make sure `netfs` service is start on boot
2016-01-19 04:22:55 +00:00
2015-08-15 03:41:49 +00:00
Limitations
-----------
Generally S3 cannot offer the same performance or semantics as a local file system. More specifically:
* random writes or appends to files require rewriting the entire file
* metadata operations such as listing directories have poor performance due to network latency
2017-01-15 08:23:55 +00:00
* [eventual consistency ](https://en.wikipedia.org/wiki/Eventual_consistency ) can temporarily yield stale data([Amazon S3 Data Consistency Model](http://docs.aws.amazon.com/AmazonS3/latest/dev/Introduction.html#ConsistencyModel))
2015-09-01 20:09:44 +00:00
* no atomic renames of files or directories
2015-08-15 03:41:49 +00:00
* no coordination between multiple clients mounting the same bucket
* no hard links
References
----------
2016-01-08 00:13:59 +00:00
* [goofys ](https://github.com/kahing/goofys ) - similar to s3fs but has better performance and less POSIX compatibility
2015-08-15 03:41:49 +00:00
* [s3backer ](https://github.com/archiecobbs/s3backer ) - mount an S3 bucket as a single file
* [s3fs-python ](https://fedorahosted.org/s3fs/ ) - an older and less complete implementation written in Python
* [S3Proxy ](https://github.com/andrewgaul/s3proxy ) - combine with s3fs to mount EMC Atmos, Microsoft Azure, and OpenStack Swift buckets
* [s3ql ](https://bitbucket.org/nikratio/s3ql/ ) - similar to s3fs but uses its own object format
* [YAS3FS ](https://github.com/danilop/yas3fs ) - similar to s3fs but uses SNS to allow multiple clients to mount a bucket
2015-11-26 12:31:03 +00:00
Frequently Asked Questions
--------------------------
2016-01-19 04:22:55 +00:00
* [FAQ wiki page ](https://github.com/s3fs-fuse/s3fs-fuse/wiki/FAQ )
2015-11-26 12:31:03 +00:00
2015-08-15 03:41:49 +00:00
License
-------
Copyright (C) 2010 Randy Rizun < rrizun @ gmail . com >
Licensed under the GNU GPL version 2