Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mapping method of a file system access control list

An access control list, file system technology, applied in the storage field, can solve problems such as normal access

Inactive Publication Date: 2019-05-10
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a mapping method, device, file server and storage system of a file system access control list, to solve the problem that when the server and the client use ACLs of different formats, it will cause the problem of normal access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mapping method of a file system access control list
  • A mapping method of a file system access control list
  • A mapping method of a file system access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The following introduces Embodiment 1 of a mapping method for a file system access control list provided by the present invention. Embodiment 1 is applied to a file server, see figure 1 , embodiment one includes:

[0040] Step S101: Obtain an access control list of the client in response to the client's operation request on the target node in the file system.

[0041] The file system is the method and data structure used by the operating system to identify files on the disk or partition. Generally, the organizational structure of the file system is a tree structure, in which each node is a file or a directory. In the file system The file or directory of the may be the object to be accessed, therefore, the above target node is a certain file or a certain directory.

[0042] The access control list (Access Control List, referred to as ACL) contains the permission information of a certain node. The access control list is a list of fine-grained access permissions for speci...

Embodiment approach

[0095] As an optional implementation, the device also includes:

[0096] Storage module 504: configured to store the target ACL, and store the correspondence between the target ACL and the client.

[0097] As an optional implementation manner, the format of the access control list includes: POSIX ACL and / or NFSv4ACL.

[0098] The device for mapping a file system access control list in this embodiment is used to implement the above-mentioned method for mapping a file system access control list, so the specific implementation of the device can be seen in the preceding file system access control list The embodiment part of the mapping method, for example, the obtaining module 501, the judging module 502, and the converting module 503 are respectively used to implement steps S101, S102, and S103 in the above-mentioned method for mapping a file system access control list. Therefore, for the specific implementation manners thereof, reference may be made to the descriptions of the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mapping method of a file system access control list and is applied to file server. An operation request of a client for a target node in the file system can be responded; anaccess control list of the client can be obtained, whether the format of the access control list of the client is the same as that of the access control list of the client or not is judged; and if not, the format of the access control list of the client is converted into the format of the access control list of the client to obtain a target access control list, so as to judge whether the client has permission to execute the operation request by inquiring the target access control list. Therefore, according to the method, when the client initiates the operation request, the format of the access control list is unified, the problem that access cannot be achieved is avoided, and the scene adaptability of the file server is improved. In addition, the invention further provides a mapping device of the file system access control list, a file server and a storage system, and the effects of the mapping device, the file server and the storage system correspond to those of the method.

Description

technical field [0001] The invention relates to the field of storage, in particular to a mapping method and device of a file system access control list, a file server and a storage system. Background technique [0002] In the Linux system, users have three types of operation permissions on files: r (read), w (write), and x (executable). For files or directories under Linux, user identities are divided into: owner, group, There can only be one other person, and the owner of the file, and the group to which it belongs, so when assigning user permissions to the file, only rwx permissions can be assigned to these three identities. [0003] With the increase of NFS-Ganesha network file system clients, users have gradually increased the granularity of file access control requirements. Currently, the NFS-Ganesha user-mode network file system V4 protocol version does not support the POSIX ACL standard access control list, and the NFS kernel The state V4 protocol version provides NF...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
Inventor 臧林劼
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products