-
Notifications
You must be signed in to change notification settings - Fork 69
6037 zfs(1M) needs to handle unknown uid/gid in context of allow/unallow more gracefully #690
Conversation
…low more gracefully Contributed by: Xin Li <delphij@FreeBSD.org>
|
Ping. |
|
Ping again :) |
This issue has been reported yesterday in the ZFS on Linux mailing list: it would be nice to get it fixed but maybe we should add a new test case to the "delegate" group? |
|
Can we please get this integrated? |
|
@yuripv I'd like to have 2 reviewers. Should we integrate with Xin as the author and you and I as reviewers? |
|
I made some changes to the original patch, but they seem to be cosmetic only, so yes, please list me as reviewer. |
|
Ping. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed By: Allan Jude allanjude@freebsd.org
|
Ping... |
|
illumos RTI is here |
|
This repo will be archived in the coming week, and therefore this PR is being closed. Alternate processes for contributing ZFS changes (including those in open PR's) include following the illumos procedures, or opening a PR against ZFSonLinux. The reasoning behind this are outlined in an email to the developer@open-zfs.org mailing list, which is reproduced below:
|
Fix by @delphij
Currently, if a uid/gid is unknown to the system, zfs(1M) would say nothing on the unknown user/group. For instance, after a user which owns uid=1002 is removed, we would have something like this, if 'destroy' is previously granted:
With the attached patch applied, it would become:
The proposed patch also allows 'allow' and 'unallow' to accept numerical IDs, even when they are not known to the system, when -u or -g is explicitly specified. Without the change there would be no way other than recreating a user/group that occupies the same UID/GID to revoke a granted permission to unknown user.