Paul B. Henson wrote:
> On Fri, 14 Mar 2008, Mark Shellenbaum wrote:
> 
>> That is not correct.  The deny entries are necessary for POSIX semantics.
>> In POSIX are only allowed to pick up permissions from the owner, group or
>> other class.  You can't pick up part of the permissions you are looking
>> for from the group class and then some more from the other class.
> 
> Ah, I was interpreting them from the standpoint of an NFSv4 ACL, not from a
> legacy POSIX perspective.
> 
>>> Note that the above file still has a "trivial" ACL, as indicated by the
>>> lack of "+" in the permission bits.
>> That is actually a bug that was recently fixed.
> 
> What was fixed? That the ACL would no longer be considered trivial?

No longer considered trivial.

> 
>> Thats because the requesters mode must be honored.  You can't disregard
>> the mode the application requests and the ACL needs to be altered to
>> match the mode.  That why the three entries are basically nulled out, but
>> the ACEs are left in place in case you want to change them later.
> 
> Hmm... What's the point of having the ability to inherit ACL entries if you
> can't actually control the permissions on new files and directories that
> will be created?

Inheriting ACEs works better if you don't use owner@, group@ or 
[EMAIL PROTECTED]  Those ACEs affect the mode of the file

> 
>>> Why did my ACE's that were applicable to the parent directory and
>>> marked inheritable be split into two separate ACE's, one inherit only
>>> and one applicable? That seems redundant and overly complicates the
>>> ACL.
>> That necessary for effective propagation of ACEs.  That way the ACE is
>> propagated down as it was set at the first place the ACE was set.
> 
> Ok, if I understand you correctly, they are split such that you can modify
> the ACL pertaining to the actual directory object without modifying the ACL
> that will be inherited by future child objects? That makes sense.
> 
>>> What I would really like to see is a mode that completely ignores
>>> umask/mode bits and simply applies the inherited ACL with no
>>> modification or complication. I don't see any way to do that?
>> No such mode exists.
> 
> Am I mistaken or confused in my thought that such a mode would be highly
> desirable? I would like to be able to configure permissions, particularly
> inherited permissions, such that they would be fully defined by the ACL,
> and not modified in unknown ways by whatever umask happened to be in effect
> when the file or directory was created. I would also like to be able to
> maintain ACLs via either UNIX commands or from a CIFs client and have them
> stay compatible. I think it is a misnomer to call the current
> implementation of ZFS a "pure ACL" system, as clearly the ACLs are heavily
> contaminated by legacy mode bits.
> 

Feel free to open an RFE.  It may be a tough sell with PSARC, but maybe 
if we have enough customer requests maybe they can be won over.


> Thanks for the response...
> 
> 

_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to