diff options
author | Humble Devassy Chirammal <humble.devassy@gmail.com> | 2017-07-31 09:01:36 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-07-31 09:01:36 +0000 |
commit | 4757dd977452d15baae91d46a7895cd3d5b7863e (patch) | |
tree | e31b5ae33e2ce5d38e223469c21cc65642bbcd85 /gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf | |
parent | 83a8491e2b25b45da06df8fe1f12136d94584ce3 (diff) | |
parent | d9b358382a3dbc6fd2f6c12bffb1c8fcd6c49a2f (diff) | |
download | gluster-4757dd977452d15baae91d46a7895cd3d5b7863e.tar.gz gluster-4757dd977452d15baae91d46a7895cd3d5b7863e.tar.bz2 gluster-4757dd977452d15baae91d46a7895cd3d5b7863e.tar.xz gluster-4757dd977452d15baae91d46a7895cd3d5b7863e.zip |
Merge pull request #48 from SaravanaStorageNetwork/renamed_s3
Rename docker-gluster-swift
Diffstat (limited to 'gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf')
-rw-r--r-- | gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf new file mode 100644 index 0000000..31a5e6f --- /dev/null +++ b/gluster-s3object/CentOS/docker-gluster-s3/etc/swift/fs.conf @@ -0,0 +1,24 @@ +[DEFAULT] +# +# IP address of a node in the GlusterFS server cluster hosting the +# volumes to be served via Swift API. +mount_ip = localhost + +# Performance optimization parameter. When turned off, the filesystem will +# see a reduced number of stat calls, resulting in substantially faster +# response time for GET and HEAD container requests on containers with large +# numbers of objects, at the expense of an accurate count of combined bytes +# used by all objects in the container. For most installations "off" works +# fine. +accurate_size_in_listing = off + +# In older versions of gluster-swift, metadata stored as xattrs of dirs/files +# were serialized using PICKLE format. The PICKLE format is vulnerable to +# exploits in deployments where a user has access to backend filesystem over +# FUSE/SMB. Deserializing pickled metadata can result in malicious code being +# executed if an attacker has stored malicious code as xattr from filesystem +# interface. Although, new metadata is always serialized using JSON format, +# existing metadata already stored in PICKLE format are loaded by default. +# You can turn this option to 'off' once you have migrated all your metadata +# from PICKLE format to JSON format using gluster-swift-migrate-metadata tool. +read_pickled_metadata = on |