Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NAS-130877 / 24.10-RC.1 / Remove acltype normalization for datasets (by anodos325) #14386

Merged
merged 1 commit into from
Aug 30, 2024

Conversation

bugclerk
Copy link
Contributor

When we were doing initial development of TrueNAS SCALE (pre-angelfish) a bug was encountered when importing pools from FreeBSD in which the acltype could be set to OFF. Eventually this bug was fixed on the ZFS side, but it was still early days of testing NFSv4 acltype on SCALE and so we didn't want early-adopter migrators to have broken shares. Thus we normalized creation of new datasets to be POSIX acltype if user had selected to inherit from top-level dataset.

After a few releases and user bug reports we realized we needed to have specific ZFS dataset properties set depending on acltype. For example that the aclmode should be DISCARD (discard internal ZFS acl) because changing acltype does not remove the internal ZFS ACL and it could still be evaluated in zfs_zaccess calls. This eventually necessitated raising ValidationErrors on dataset creation for invalid parameter combinations. Unfortunately, the normalization behavior introduced in angelfish testing was overlooked at this point, which could cause a situation in which pools from FreeBSD where acltype now imports as nfsv4acl on top-level datasets would get flagged as needing normalization. This led to an invalid combination of acltype POSIX and aclmode PASSTHROUGH being set on new datasets when they were created to inherit from the top-level dataset.

Rather than fixing the normalization, at this point we're pretty confident about NFSv4 ACL type behavior in SCALE and can just remove the normalization logic entirely.

Original PR: #14377
Jira URL: https://ixsystems.atlassian.net/browse/NAS-130877

When we were doing initial development of TrueNAS SCALE (pre-angelfish)
a bug was encountered when importing pools from FreeBSD in which the
acltype could be set to OFF. Eventually this bug was fixed on the ZFS
side, but it was still early days of testing NFSv4 acltype on SCALE
and so we didn't want early-adopter migrators to have broken shares.
Thus we normalized creation of new datasets to be POSIX acltype if user
had selected to inherit from top-level dataset.

After a few releases and user bug reports we realized we needed to have
specific ZFS dataset properties set depending on acltype. For example
that the aclmode should be DISCARD (discard internal ZFS acl) because
changing acltype does not remove the internal ZFS ACL and it could
still be evaluated in zfs_zaccess calls. This eventually necessitated
raising ValidationErrors on dataset creation for invalid parameter
combinations. Unfortunately, the normalization behavior introduced in
angelfish testing was overlooked at this point, which could cause a
situation in which pools from FreeBSD where acltype now imports as
nfsv4acl on top-level datasets would get flagged as needing
normalization. This led to an invalid combination of acltype
POSIX and aclmode PASSTHROUGH being set on new datasets when they
were created to inherit from the top-level dataset.

Rather than fixing the normalization, at this point we're pretty
confident about NFSv4 ACL type behavior in SCALE and can just
remove the normalization logic entirely.

(cherry picked from commit da357b8)
@anodos325 anodos325 merged commit d98e5b9 into stable/electriceel Aug 30, 2024
1 of 2 checks passed
@anodos325 anodos325 deleted the NAS-130877-24.10-RC.1 branch August 30, 2024 17:37
@bugclerk
Copy link
Contributor Author

This PR has been merged and conversations have been locked.
If you would like to discuss more about this issue please use our forums or raise a Jira ticket.

@truenas truenas locked as resolved and limited conversation to collaborators Aug 30, 2024
@yocalebo
Copy link
Contributor

yocalebo commented Sep 3, 2024

backport

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants