diff mbox series

[v4,4/5] tools/virtiofsd: xattr name mapping examples

Message ID 20201023165812.36028-5-dgilbert@redhat.com
State Accepted
Commit 491bfaea3bd44b47c62f758efffb67a392ded02b
Headers show
Series virtiofsd xattr name mappings | expand

Commit Message

Dr. David Alan Gilbert Oct. 23, 2020, 4:58 p.m. UTC
From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>

Add a few examples of xattrmaps to the documentation.

Signed-off-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
---
 docs/tools/virtiofsd.rst | 50 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 50 insertions(+)

Comments

Stefan Hajnoczi Oct. 26, 2020, 3:54 p.m. UTC | #1
On Fri, Oct 23, 2020 at 05:58:11PM +0100, Dr. David Alan Gilbert (git) wrote:
> +The third rule stops a guest from explicitly setting

> +the 'user.viritofs.' path directly.


s/virito/virtio/
Dr. David Alan Gilbert Oct. 26, 2020, 5:26 p.m. UTC | #2
* Stefan Hajnoczi (stefanha@redhat.com) wrote:
> On Fri, Oct 23, 2020 at 05:58:11PM +0100, Dr. David Alan Gilbert (git) wrote:
> > +The third rule stops a guest from explicitly setting
> > +the 'user.viritofs.' path directly.
> 
> s/virito/virtio/


Thanks!
diff mbox series

Patch

diff --git a/docs/tools/virtiofsd.rst b/docs/tools/virtiofsd.rst
index 868fa0e97b..4e74690eca 100644
--- a/docs/tools/virtiofsd.rst
+++ b/docs/tools/virtiofsd.rst
@@ -201,6 +201,56 @@  e.g.:
 
   would hide 'security.' xattr's in listxattr from the server.
 
+xattr-mapping Examples
+----------------------
+
+1) Prefix all attributes with 'user.virtiofs.'
+
+::
+
+-o xattrmap=":prefix:all::user.virtiofs.::bad:all:::"
+
+
+This uses two rules, using : as the field separator;
+the first rule prefixes and strips 'user.virtiofs.',
+the second rule hides any non-prefixed attributes that
+the host set.
+
+2) Prefix 'trusted.' attributes, allow others through
+
+::
+
+   "/prefix/all/trusted./user.virtiofs./
+    /bad/server//trusted./
+    /bad/client/user.virtiofs.//
+    /ok/all///"
+
+
+Here there are four rules, using / as the field
+separator, and also demonstrating that new lines can
+be included between rules.
+The first rule is the prefixing of 'trusted.' and
+stripping of 'user.virtiofs.'.
+The second rule hides unprefixed 'trusted.' attributes
+on the host.
+The third rule stops a guest from explicitly setting
+the 'user.viritofs.' path directly.
+Finally, the fourth rule lets all remaining attributes
+through.
+
+3) Hide 'security.' attributes, and allow everything else
+
+::
+
+    "/bad/all/security./security./
+     /ok/all///'
+
+The first rule combines what could be separate client and server
+rules into a single 'all' rule, matching 'security.' in either
+client arguments or lists returned from the host.  This stops
+the client seeing any 'security.' attributes on the server and
+stops it setting any.
+
 Examples
 --------