diff options
author | Saravanakumar <sarumuga@redhat.com> | 2017-06-29 17:58:56 +0530 |
---|---|---|
committer | Saravanakumar <sarumuga@redhat.com> | 2017-06-29 18:03:40 +0530 |
commit | 3e33c9640d2b4b2d15a21483c34bb48845fce7bf (patch) | |
tree | 740a0189b03506e48447b993d88a1149253e3ea4 /gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf | |
parent | 8e29c3a6f749837e694a6cb031b8740935a62dc3 (diff) | |
download | gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.gz gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.bz2 gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.xz gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.zip |
rename docker-gluster-swift as docker-gluster-s3 and the top
level directory gluster-object as gluster-s3object
Update README and test scripts to reflect name change.
Signed-off-by: Saravanakumar <sarumuga@redhat.com>
Diffstat (limited to 'gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf')
-rw-r--r-- | gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf new file mode 100644 index 0000000..31a5e6f --- /dev/null +++ b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf @@ -0,0 +1,24 @@ +[DEFAULT] +# +# IP address of a node in the GlusterFS server cluster hosting the +# volumes to be served via Swift API. +mount_ip = localhost + +# Performance optimization parameter. When turned off, the filesystem will +# see a reduced number of stat calls, resulting in substantially faster +# response time for GET and HEAD container requests on containers with large +# numbers of objects, at the expense of an accurate count of combined bytes +# used by all objects in the container. For most installations "off" works +# fine. +accurate_size_in_listing = off + +# In older versions of gluster-swift, metadata stored as xattrs of dirs/files +# were serialized using PICKLE format. The PICKLE format is vulnerable to +# exploits in deployments where a user has access to backend filesystem over +# FUSE/SMB. Deserializing pickled metadata can result in malicious code being +# executed if an attacker has stored malicious code as xattr from filesystem +# interface. Although, new metadata is always serialized using JSON format, +# existing metadata already stored in PICKLE format are loaded by default. +# You can turn this option to 'off' once you have migrated all your metadata +# from PICKLE format to JSON format using gluster-swift-migrate-metadata tool. +read_pickled_metadata = on |