-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Swapping files corrupts multi-owner permissions silently #37
Comments
Possible workaround could be to 'cache' permissions of 'similarly named files' for some amount of time, and detecting a set of known patterns of application behavior... restore the original permissions on the swapped tempfile-turned-realfile. This is a problematic approach as it's specific to particular programs and their behavior... Please share any other strategies for the NFSRODS server to 'know' a new file is a tempfile created for the purposes of replacing the realfile by an application on the other side of the mountpoint. |
Is the implementation calling 'rename' under the covers on the files? I can dig into the code, but I'm wondering how this swapping takes place in terms of visibility to the underlying iRODS code. I'm confused on this issue, so knowing the call chain that occurs would be the best first step! |
Kory can be more specific... but as I understand it...
|
That's what I'm after, whether there is a definite API 'signal' here. Maybe if we are picking a hackfest day at RENCI we could sit and instrument this before cutting a solution? It's been a while since I dug into that code... |
Known applications that do this are:
The text was updated successfully, but these errors were encountered: