[Bugs] [Bug 764245] [FEAT] glusterfs requires CAP_SYS_ADMIN capability for "trusted" extended attributes - container unfriendly

bugzilla at redhat.com bugzilla at redhat.com
Sun Nov 9 11:17:10 UTC 2014


https://bugzilla.redhat.com/show_bug.cgi?id=764245

Niels de Vos <ndevos at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Keywords|                            |Triaged
             Status|ASSIGNED                    |NEW
            Version|3.1.2                       |mainline
           Assignee|vbellur at redhat.com          |bugs at gluster.org
            Summary|[FEAT] glusterfs requires   |[FEAT] glusterfs requires
                   |CAP_SYS_ADMIN capability    |CAP_SYS_ADMIN capability
                   |for "trusted" extended      |for "trusted" extended
                   |attributes - virtualization |attributes - container
                   |unfriendly                  |unfriendly



--- Comment #3 from Niels de Vos <ndevos at redhat.com> ---
Using containers to host bricks requires writing the "trusted.*" xattrs to the
underlaying filesystem. The brick processes need to have the CAP_SYS_ADMIN
capability (see: man 7 capabilities). Containers are expected to have little
privileges, and grating CAP_SYS_ADMIN to a container is frowned upon.

Proposed solution:
- instead of using "trusted.*" xattrs on the bricks, use "user.*" xattrs

Implementation details/notes/ideas:
- provide a volume or mount option to specify that "user.*" should be used
- it is impractical (and would hurt compatibility) when all the xattrs would be
  replaced by "user.*" throughout the whole sources. It would be simpler and
more
  compatible to have the posix-xlator handle the volume/mount option. A
fallback
  on checking for the other xattr prefix would be more efficient there too.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


More information about the Bugs mailing list