diff options
author | Humble Devassy Chirammal <humble.devassy@gmail.com> | 2017-02-28 12:23:31 +0530 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-02-28 12:23:31 +0530 |
commit | f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b (patch) | |
tree | 54bb7bd060f293cac38a06d95d13458ce5e0abb0 /gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf | |
parent | ba821d903d34ebf5014a647d92d9e0b2acd0c6a3 (diff) | |
parent | 7439918490cdc697b7f2804ef84319b6e77327e7 (diff) | |
download | gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.gz gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.bz2 gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.tar.xz gluster-f373f3a9c78a6fdd8b1bd3c1f8688a3d837e367b.zip |
Merge pull request #29 from SaravanaStorageNetwork/master
Adding gluster-object to gluster docker hub
Diffstat (limited to 'gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf')
-rw-r--r-- | gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf b/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf new file mode 100644 index 0000000..31a5e6f --- /dev/null +++ b/gluster-object/CentOS/docker-gluster-swift/etc/swift/fs.conf @@ -0,0 +1,24 @@ +[DEFAULT] +# +# IP address of a node in the GlusterFS server cluster hosting the +# volumes to be served via Swift API. +mount_ip = localhost + +# Performance optimization parameter. When turned off, the filesystem will +# see a reduced number of stat calls, resulting in substantially faster +# response time for GET and HEAD container requests on containers with large +# numbers of objects, at the expense of an accurate count of combined bytes +# used by all objects in the container. For most installations "off" works +# fine. +accurate_size_in_listing = off + +# In older versions of gluster-swift, metadata stored as xattrs of dirs/files +# were serialized using PICKLE format. The PICKLE format is vulnerable to +# exploits in deployments where a user has access to backend filesystem over +# FUSE/SMB. Deserializing pickled metadata can result in malicious code being +# executed if an attacker has stored malicious code as xattr from filesystem +# interface. Although, new metadata is always serialized using JSON format, +# existing metadata already stored in PICKLE format are loaded by default. +# You can turn this option to 'off' once you have migrated all your metadata +# from PICKLE format to JSON format using gluster-swift-migrate-metadata tool. +read_pickled_metadata = on |