OpenStack Block Storage (Cinder)
Go to file
Glenn M. Gobeli 6879bd0720 NFS Security Enhancements: allows secure NFS environment setup
This patch allows an OpenStack environment to run as a secure NAS
environment from the client and server perspective, including having
root squash enabled and not running file operations as the 'root'
user. This also sets Cinder file permissions as 660: removing
other/world file access.

The "nas_secure_file_permissions" option controls the setting of file
permissions when Cinder volumes are created. The option defaults to
"auto" to gracefully handle upgrade scenarios. When set to "auto",
a check is done during Cinder startup to determine if there are
existing Cinder volumes: no volumes will set the option to 'true',
and use secure file permissions. The detection of existing volumes will
set the option to 'false', and use the current insecure method of
handling file permissions.

The "nas_secure_file_operations" option controls whether file
operations are run as the 'root' user or the current OpenStack
'process' user. The option defaults to "auto" to gracefully handle
upgrade scenarios. When set to "auto", a check is done during Cinder
startup to determine if there are existing Cinder volumes: no volumes
will set the option to 'true', be secure and do NOT run as the 'root'
user. The detection of existing volumes will set the option to 'false',
and use the current method of running operations as the 'root' user.
For new installations, a 'marker file' is written so that subsequent
restarts of Cinder will know what the original determination had been.

This patch enables this functionality only for the NFS driver.
Other similar drivers can use this code to enable the same
functionality with the same config options.

DocImpact
Change-Id: I3d25f593beab7f5462576b14ab62d13d8c53e7c6
Implements: blueprint secure-nfs
Partial-Bug: 1260679
2014-10-23 16:35:51 -04:00
bin Fixed Typo from modfied to modified 2014-10-07 22:15:49 -07:00
cinder NFS Security Enhancements: allows secure NFS environment setup 2014-10-23 16:35:51 -04:00
doc Adds openSUSE support for developer documentation 2014-09-29 17:25:10 +02:00
etc/cinder NFS Security Enhancements: allows secure NFS environment setup 2014-10-23 16:35:51 -04:00
rally-scenarios Add rally job 2014-04-25 18:31:06 +03:00
tools Ignore pylint error 'hashlib' has no shaxxx member 2014-08-29 12:18:06 -04:00
.coveragerc Add .coveragerc to show proper coverage statistics. As in other openstack projects. 2013-05-15 03:40:07 -07:00
.gitignore gitignore /.* 2014-10-09 15:23:48 -04:00
.gitreview Initial fork out of Nova. 2012-05-03 10:48:26 -07:00
.mailmap Add mailmap entry 2014-05-07 12:03:15 -07:00
.testr.conf Fix up the test framework 2013-06-14 14:02:17 +00:00
CONTRIBUTING.md Fix the section name in CONTRIBUTING.rst 2014-07-14 19:53:30 +08:00
HACKING.rst Updated HACKING.rst so that it is accurate 2014-08-09 22:07:11 -05:00
LICENSE Initial fork out of Nova. 2012-05-03 10:48:26 -07:00
MANIFEST.in Use setuptools-git. 2012-08-10 11:56:00 -04:00
README.rst Adding helpful URL links to README.rst and HACKING.rst 2013-12-27 19:29:17 -06:00
babel.cfg Initial fork out of Nova. 2012-05-03 10:48:26 -07:00
openstack-common.conf Remove useless sslutils from openstack.common 2014-10-09 16:43:17 +02:00
pylintrc Initial fork out of Nova. 2012-05-03 10:48:26 -07:00
requirements.txt Updated from global requirements 2014-10-15 23:40:34 +00:00
run_tests.sh Fix running unit tests with coverage 2014-09-02 13:04:06 +01:00
setup.cfg Open Kilo development 2014-09-30 09:25:35 +02:00
setup.py Updated from global requirements 2014-05-22 07:04:39 +00:00
test-requirements.txt Updated from global requirements 2014-10-15 23:40:34 +00:00
tox.ini Remove unused py33 tox env 2014-09-22 12:40:43 +00:00

README.rst

The Choose Your Own Adventure README for Cinder

You have come across a storage service for an open cloud computing service. It has identified itself as "Cinder." It was abstracted from the Nova project.

To monitor it from a distance: follow @openstack on twitter.

To tame it for use in your own cloud: read http://docs.openstack.org

To study its anatomy: read http://cinder.openstack.org

To dissect it in detail: visit http://github.com/openstack/cinder

To taunt it with its weaknesses: use http://bugs.launchpad.net/cinder

To watch it: http://jenkins.openstack.org

To hack at it: read HACKING.rst