[Bugs] [Bug 1368012] gluster fails to propagate permissions on the root of a gluster export when adding bricks

bugzilla at redhat.com bugzilla at redhat.com
Mon Sep 12 04:57:07 UTC 2016


--- Comment #7 from Worker Ant <bugzilla-bot at gluster.org> ---
COMMIT: http://review.gluster.org/15195 committed in master by Raghavendra G
(rgowdapp at redhat.com) 
commit 801cd07a4c6ec65ff930b2ae6bb5e405ccd03334
Author: Susant Palai <spalai at redhat.com>
Date:   Wed Aug 17 15:10:04 2016 +0530

    cluster/dht: heal root permission post add-brick

    Post add-brick event the new brick will have permission of 755
    by default. If the root directory permission was other than 755,
    that does not get healed to the new brick leading to permission

    For choosing source of attr heal we can trust the subvols which
    have layouts with latest ctime(as part of missing directory heal,
    we heal the proper attr). In case none of the subvols have layout,
    return ESTALE to retrigger a fresh lookup.

    Note: This patch heals the permission of the root directories only.
    Since, permission healing of directory is not straight forward and
    required intrusive fix, those are not addressed here.

    Change-Id: If894e3895d070d46b62d2452e52c1eaafcf56c29
    BUG: 1368012
    Signed-off-by: Susant Palai <spalai at redhat.com>
    Reviewed-on: http://review.gluster.org/15195
    Smoke: Gluster Build System <jenkins at build.gluster.org>
    CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
    NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
    Reviewed-by: Raghavendra G <rgowdapp at redhat.com>

You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=SxWRo5lhlf&a=cc_unsubscribe

More information about the Bugs mailing list