summaryrefslogtreecommitdiffstats
path: root/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf
diff options
context:
space:
mode:
authorHumble Devassy Chirammal <humble.devassy@gmail.com>2017-02-28 12:23:31 +0530
committerGitHub <noreply@github.com>2017-02-28 12:23:31 +0530
commitf373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b (patch)
tree54bb7bd060f293cac38a06d95d13458ce5e0abb0 /gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf
parentba821d903d34ebf5014a647d92d9e0b2acd0c6a3 (diff)
parent7439918490cdc697b7f2804ef84319b6e77327e7 (diff)
downloadgluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.gz
gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.bz2
gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.xz
gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.zip
Merge pull request #29 from SaravanaStorageNetwork/master
Adding gluster-object to gluster docker hub
Diffstat (limited to 'gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf')
-rw-r--r--gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf24
1 files changed, 24 insertions, 0 deletions
diff --git a/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf b/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf
new file mode 100644
index 0000000..31a5e6f
--- /dev/null
+++ b/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf
@@ -0,0 +1,24 @@
+[DEFAULT]
+#
+# IP address of a node in the GlusterFS server cluster hosting the
+# volumes to be served via Swift API.
+mount_ip = localhost
+
+# Performance optimization parameter. When turned off, the filesystem will
+# see a reduced number of stat calls, resulting in substantially faster
+# response time for GET and HEAD container requests on containers with large
+# numbers of objects, at the expense of an accurate count of combined bytes
+# used by all objects in the container. For most installations "off" works
+# fine.
+accurate_size_in_listing = off
+
+# In older versions of gluster-swift, metadata stored as xattrs of dirs/files
+# were serialized using PICKLE format. The PICKLE format is vulnerable to
+# exploits in deployments where a user has access to backend filesystem over
+# FUSE/SMB. Deserializing pickled metadata can result in malicious code being
+# executed if an attacker has stored malicious code as xattr from filesystem
+# interface. Although, new metadata is always serialized using JSON format,
+# existing metadata already stored in PICKLE format are loaded by default.
+# You can turn this option to 'off' once you have migrated all your metadata
+# from PICKLE format to JSON format using gluster-swift-migrate-metadata tool.
+read_pickled_metadata = on