summaryrefslogtreecommitdiffstats
path: root/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf
diff options
context:
space:
mode:
authorSaravanakumar <sarumuga@redhat.com>2017-06-29 17:58:56 +0530
committerSaravanakumar <sarumuga@redhat.com>2017-06-29 18:03:40 +0530
commit3e33c9640d2b4b2d15a21483c34bb48845fce7bf (patch)
tree740a0189b03506e48447b993d88a1149253e3ea4 /gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf
parent8e29c3a6f749837e694a6cb031b8740935a62dc3 (diff)
downloadgluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.gz
gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.bz2
gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.tar.xz
gluster-3e33c9640d2b4b2d15a21483c34bb48845fce7bf.zip
rename docker-gluster-swift as docker-gluster-s3 and the top
level directory gluster-object as gluster-s3object Update README and test scripts to reflect name change. Signed-off-by: Saravanakumar <sarumuga@redhat.com>
Diffstat (limited to 'gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf')
-rw-r--r--gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf24
1 files changed, 24 insertions, 0 deletions
diff --git a/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf
new file mode 100644
index 0000000..31a5e6f
--- /dev/null
+++ b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf
@@ -0,0 +1,24 @@
+[DEFAULT]
+#
+# IP address of a node in the GlusterFS server cluster hosting the
+# volumes to be served via Swift API.
+mount_ip = localhost
+
+# Performance optimization parameter. When turned off, the filesystem will
+# see a reduced number of stat calls, resulting in substantially faster
+# response time for GET and HEAD container requests on containers with large
+# numbers of objects, at the expense of an accurate count of combined bytes
+# used by all objects in the container. For most installations "off" works
+# fine.
+accurate_size_in_listing = off
+
+# In older versions of gluster-swift, metadata stored as xattrs of dirs/files
+# were serialized using PICKLE format. The PICKLE format is vulnerable to
+# exploits in deployments where a user has access to backend filesystem over
+# FUSE/SMB. Deserializing pickled metadata can result in malicious code being
+# executed if an attacker has stored malicious code as xattr from filesystem
+# interface. Although, new metadata is always serialized using JSON format,
+# existing metadata already stored in PICKLE format are loaded by default.
+# You can turn this option to 'off' once you have migrated all your metadata
+# from PICKLE format to JSON format using gluster-swift-migrate-metadata tool.
+read_pickled_metadata = on