mds: add protection from clients without fscrypt support#54725
mds: add protection from clients without fscrypt support#54725
Conversation
cfc098d to
a8643cd
Compare
a8643cd to
d3de83d
Compare
|
Locally the xfstests passed. |
|
This pull request can no longer be automatically merged: a rebase is needed and changes have to be manually resolved |
1 similar comment
|
This pull request can no longer be automatically merged: a rebase is needed and changes have to be manually resolved |
d3de83d to
83f1e0e
Compare
|
@lxbsz Is this ready for review? |
chrisphoffman
left a comment
There was a problem hiding this comment.
I'm happy to see there's been discussion about server side semantics enforcement.
Do we need any tests included in this PR to ensure our intended behavior doesn't change? We can't one day inadvertently allow older or non-friendly clients to be able to do known malicious things.
Yeah, we need to run qa. |
To be more specific, I was proposing new tests. For example testing a client working on a fscrypt tree that the client doesn't know about fscrypt. We want to make sure server enforced behavior fails on unaware clients. What do you think? Do we already test this? If so, can you point me to it? |
Hmm, sounds reasonable to me. Currently there has not thus test yet. |
035f6e3 to
fdc897f
Compare
|
This pull request can no longer be automatically merged: a rebase is needed and changes have to be manually resolved |
fdc897f to
06b547d
Compare
|
This PR is under test in https://tracker.ceph.com/issues/68092. |
* refs/pull/54725/head: qa/fscrypt: add fscrypt protection test cases qa/fscrypt: fix the incorrect option name qa/fscrypt: add the dedicated dir for fscrypt basic tests mds: add client dedicated features macro client: fix incorrectly handling the fscrypt_file bug mds: add open trunc protection from clients without fscrypt support mds: add protection from clients without fscrypt support Reviewed-by: Venky Shankar <vshankar@redhat.com> Reviewed-by: Christopher Hoffman <choffman@redhat.com>
|
Dropping my testing tag since I'm still running into failures which seem related. Will have to debug. |
|
This pull request has been automatically marked as stale because it has not had any activity for 60 days. It will be closed if no further activity occurs for another 30 days. |
@vshankar are we moving ahead with this? |
We need to, but the failure that I saw in the test run isn't debugged and @chrisphoffman will have a look. |
|
bumping this up for @chrisphoffman |
|
This pull request can no longer be automatically merged: a rebase is needed and changes have to be manually resolved |
Got it, added to fscrypt master tracker todo list: https://tracker.ceph.com/issues/65217 |
|
This pull request has been automatically marked as stale because it has not had any activity for 60 days. It will be closed if no further activity occurs for another 30 days. |
|
This pull request has been automatically closed because there has been no activity for 90 days. Please feel free to reopen this pull request (or open a new one) if the proposed change is still appropriate. Thank you for your contribution! |
|
@chrisphoffman @vshankar @batrick are we still working on this? |
Not sure what you mean. We need this change to ensure that non-fscrypt clients cannot mangle encrypted files/directories. |
|
(closed by mistake -- reopened) |
|
This pull request has been automatically marked as stale because it has not had any activity for 60 days. It will be closed if no further activity occurs for another 30 days. |
|
This pull request has been automatically closed because there has been no activity for 90 days. Please feel free to reopen this pull request (or open a new one) if the proposed change is still appropriate. Thank you for your contribution! |
Clients that do not support fscrypt can execute operations that may cause unrecoverable data loss. Add protection on the MDS so that it prevents these clients from executing some operations.
Note, however, that clients will still be able corrupt encrypted files by appending data to them. And they will still be able to read encrypted data from those files.
This PR originally from @luis-henrix 's PR #45073. And I just fix the lock order issue, and will run more tests for it.
Please note this PR will fix one issue from Luis' previous PR:
1, MDS crash issue https://tracker.ceph.com/issues/63685
Fixes: https://tracker.ceph.com/issues/65217
Contribution Guidelines
To sign and title your commits, please refer to Submitting Patches to Ceph.
If you are submitting a fix for a stable branch (e.g. "quincy"), please refer to Submitting Patches to Ceph - Backports for the proper workflow.
When filling out the below checklist, you may click boxes directly in the GitHub web UI. When entering or editing the entire PR message in the GitHub web UI editor, you may also select a checklist item by adding an
xbetween the brackets:[x]. Spaces and capitalization matter when checking off items this way.Checklist
Show available Jenkins commands
jenkins retest this pleasejenkins test classic perfjenkins test crimson perfjenkins test signedjenkins test make checkjenkins test make check arm64jenkins test submodulesjenkins test dashboardjenkins test dashboard cephadmjenkins test apijenkins test docsjenkins render docsjenkins test ceph-volume alljenkins test ceph-volume toxjenkins test windowsjenkins test rook e2e