From 96eece8abbb9c06f0b91f37e718ac9e337a3f714 Mon Sep 17 00:00:00 2001 From: Kotresh HR Date: Mon, 10 Jul 2017 10:31:27 -0400 Subject: posix/gfid2path: Block access to gfid2path xattr via mount gfid2path xattr is an internal xattr and should not be allowed to modify by other applications via gluster mount. This patch blocks the same. Updates: #139 Change-Id: Id2cb29797ee1bd77e0e0d2203a47469fd7203355 Signed-off-by: Kotresh HR Reviewed-on: https://review.gluster.org/17744 Smoke: Gluster Build System Reviewed-by: Prashanth Pai Reviewed-by: Raghavendra Bhat Reviewed-by: Aravinda VK CentOS-regression: Gluster Build System --- tests/volume.rc | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'tests/volume.rc') diff --git a/tests/volume.rc b/tests/volume.rc index 935382b8531..402bb9dbf19 100644 --- a/tests/volume.rc +++ b/tests/volume.rc @@ -359,6 +359,12 @@ function get_text_xattr { getfattr -h -d -m. -e text $path 2>/dev/null | grep -a $key | cut -f2 -d'=' } +function get_xattr_key { + local key=$1 + local path=$2 + getfattr -h -d -m. -e text $path 2>/dev/null | grep -a $key | cut -f1 -d'=' +} + function gf_check_file_opened_in_brick { vol=$1 host=$2 -- cgit