Just a correction of what I stated earlier...

----- Original Message -----
> From: "Csaba Henk" <ch...@redhat.com>
> To: "OpenStack Development Mailing List (not for usage questions)" 
> <openstack-dev@lists.openstack.org>
> Sent: Thursday, July 9, 2015 3:13:29 PM
> Subject: Re: [openstack-dev] [manila] share dismantling policies
...
> Sure, Manila cannot force the users to unmount the volume, but it *can*
> render the mount unusable (ending up in a state whereby all system calls
> to the mount fail). That's what generic driver -- and any driver with
> kNFS as export mechanism -- does (disruptive access control). However, as
> we found out, a user mount with glusterfs_native will remain usable after
> access to share is revoked (non-disruptive access control). So ATM there is
> no
> uniformity in access control disruptiveness across the drivers.

With respect to gluster_native: "a user mount with glusterfs_native will remain
usable after access to share is revoked" is not true. glusterfs_native
does comply with the access deny requirements as laid down by Ben in
another mail of this thread[1]. The correct statement is: we were experimenting
with some optimizations for glusterfs_native through which we ended up with a
modification that had the effect of leaving user mounts with glusterfs_native
usable after access to share was revoked.

TL;DR: glusterfs_native is OK.

[1] http://lists.openstack.org/pipermail/openstack-dev/2015-July/069109.html

Csaba

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to