Bug 1086097
| Summary: | [RFE] Allow the usage of the wildcard character '*' to the options "nfs.rpc-auth-allow" and "nfs.rpc-auth-reject" | |||
|---|---|---|---|---|
| Product: | [Community] GlusterFS | Reporter: | Poornima G <pgurusid> | |
| Component: | nfs | Assignee: | Niels de Vos <ndevos> | |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | ||
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | mainline | CC: | agunn, asrivast, bugs, gluster-bugs, joe.lin, pgurusid, shaines, ssaha, ssamanta, vagarwal, vbellur | |
| Target Milestone: | --- | Keywords: | FutureFeature | |
| Target Release: | --- | |||
| Hardware: | x86_64 | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | glusterfs-3.6.0beta1 | Doc Type: | Enhancement | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | 1018894 | |||
| : | 1115369 (view as bug list) | Environment: | ||
| Last Closed: | 2014-11-11 08:29:44 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1018894 | |||
| Bug Blocks: | 1115369 | |||
|
Description
Poornima G
2014-04-10 05:46:30 UTC
REVIEW: http://review.gluster.org/7431 (common-utils: valid_host_name() now allows wildcards(*/?/[]) in hostname.) posted (#1) for review on master by Poornima G (pgurusid) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#1) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#2) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#3) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#4) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#5) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#6) for review on master by Santosh Pradhan (spradhan) REVIEW: http://review.gluster.org/7485 (gNFS: Support wildcard in RPC auth allow/reject) posted (#7) for review on master by Santosh Pradhan (spradhan) COMMIT: http://review.gluster.org/7485 committed in master by Vijay Bellur (vbellur) ------ commit 00e247ee44067f2b3e7ca5f7e6dc2f7934c97181 Author: Santosh Kumar Pradhan <spradhan> Date: Wed Apr 9 10:19:43 2014 +0530 gNFS: Support wildcard in RPC auth allow/reject RFE: Support wildcard in "nfs.rpc-auth-allow" and "nfs.rpc-auth-reject". e.g. *.redhat.com 192.168.1[1-5].* 192.168.1[1-5].*, *.redhat.com, 192.168.21.9 Along with wildcard, support for subnetwork or IP range e.g. 192.168.10.23/24 The option will be validated for following categories: 1) Anonymous i.e. "*" 2) Wildcard pattern i.e. string containing any ('*', '?', '[') 3) IPv4 address 4) IPv6 address 5) FQDN 6) subnetwork or IPv4 range Currently this does not support IPv6 subnetwork. Change-Id: Iac8caf5e490c8174d61111dad47fd547d4f67bf4 BUG: 1086097 Signed-off-by: Santosh Kumar Pradhan <spradhan> Reviewed-on: http://review.gluster.org/7485 Reviewed-by: Poornima G <pgurusid> Reviewed-by: Harshavardhana <harsha> Tested-by: Gluster Build System <jenkins.com> Reviewed-by: Vijay Bellur <vbellur> A beta release for GlusterFS 3.6.0 has been released. Please verify if the release solves this bug report for you. In case the glusterfs-3.6.0beta1 release does not have a resolution for this issue, leave a comment in this bug and move the status to ASSIGNED. If this release fixes the problem for you, leave a note and change the status to VERIFIED. Packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update (possibly an "updates-testing" repository) infrastructure for your distribution. [1] http://supercolony.gluster.org/pipermail/gluster-users/2014-September/018836.html [2] http://supercolony.gluster.org/pipermail/gluster-users/ This bug is getting closed because a release has been made available that should address the reported issue. In case the problem is still not fixed with glusterfs-3.6.1, please reopen this bug report. glusterfs-3.6.1 has been announced [1], packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update infrastructure for your distribution. [1] http://supercolony.gluster.org/pipermail/gluster-users/2014-November/019410.html [2] http://supercolony.gluster.org/mailman/listinfo/gluster-users |