Bug 1579276 - rpc: The gluster auth version is always AUTH_GLUSTERFS_v2
Summary: rpc: The gluster auth version is always AUTH_GLUSTERFS_v2
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: GlusterFS
Classification: Community
Component: rpc
Version: mainline
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kotresh HR
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1582063
TreeView+ depends on / blocked
 
Reported: 2018-05-17 09:42 UTC by Kotresh HR
Modified: 2018-10-23 15:09 UTC (History)
1 user (show)

Fixed In Version: glusterfs-5.0
Clone Of:
: 1582063 (view as bug list)
Environment:
Last Closed: 2018-10-23 15:09:12 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Embargoed:


Attachments (Terms of Use)
Client logs (1.28 MB, text/plain)
2018-05-17 09:48 UTC, Kotresh HR
no flags Details
Brick logs (2.32 MB, text/plain)
2018-05-17 09:49 UTC, Kotresh HR
no flags Details

Description Kotresh HR 2018-05-17 09:42:13 UTC
Description of problem:
The new features like ctime which uses auth version - AUTH_GLUSTERFS_v3 is failing because the auth value is always AUTH_GLUSTERFS_v2

Version-Release number of selected component (if applicable):
mainline

How reproducible:
Always happening in one machine and not reproducible in others

Steps to Reproduce:
1.  Create gluster volume, start it.
2.  Enable ctime and utime features on the volume
3.  Mount the volume
4.  Create a file, stat to record ctime
5.  chmod on file, stat to record ctime. 

Actual results:

The ctime is same between create and chmod.

Expected results:

The ctime should have changed between create and chmod

Additional info:

Comment 1 Worker Ant 2018-05-17 09:45:06 UTC
REVIEW: https://review.gluster.org/20030 (rpc: Don't reset auth_value in disconnect) posted (#1) for review on master by Kotresh HR

Comment 2 Kotresh HR 2018-05-17 09:48:33 UTC
Created attachment 1437868 [details]
Client logs

Client logs where AUTH_GLUSTERFS_v2 is being chosen over AUTH_GLUSTERFS_v3

Comment 3 Kotresh HR 2018-05-17 09:49:16 UTC
Created attachment 1437869 [details]
Brick logs

Brick logs

Comment 4 Worker Ant 2018-05-24 05:26:43 UTC
COMMIT: https://review.gluster.org/20030 committed in master by "Raghavendra G" <rgowdapp> with a commit message- rpc: Don't reset auth_value in disconnect

The auth_value was being reset to AUTH_GLUSTERFS_v2
during rpc disconnect. It shoud not be reset. The
disconnect during portmap request can race with
handshake. If handshake happens first and
disconnect later, auth_value would set to default
value and it never sets back to actual auth_value

fixes: bz#1579276
Change-Id: Ib46c9e01a97f6defb3fd1e0423fdb4b899b4a361
Signed-off-by: Kotresh HR <khiremat>

Comment 5 Worker Ant 2018-05-24 06:50:16 UTC
REVISION POSTED: https://review.gluster.org/20076 (rpc: Don't reset auth_value in disconnect) posted (#2) for review on release-4.1 by Kotresh HR

Comment 6 Shyamsundar 2018-10-23 15:09:12 UTC
This bug is getting closed because a release has been made available that should address the reported issue. In case the problem is still not fixed with glusterfs-5.0, please open a new bug report.

glusterfs-5.0 has been announced on the Gluster mailinglists [1], packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update infrastructure for your distribution.

[1] https://lists.gluster.org/pipermail/announce/2018-October/000115.html
[2] https://www.gluster.org/pipermail/gluster-users/


Note You need to log in before you can comment on or make changes to this bug.