1
0
forked from pool/nfs-utils

9 Commits

Author SHA256 Message Date
64d1cddb60 Sync changes to SLFO-1.2 branch 2025-08-20 09:55:11 +02:00
aa69d6efee Accepting request 1296909 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1296909
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/nfs-utils?expand=0&rev=186
2025-08-03 11:36:08 +00:00
a75ae35ce2 - update to 2.8.3:
- https://kernel.org/pub/linux/utils/nfs-utils/2.8.3/2.8.3-Changelog
- Removed obsolete patch from this release:
  - nfs-utils-1.0.7-bind-syntax.patch
- Added upstream patches:
  - nfs-utils-Fix-build-with-glibc-2.42.patch
  - nfs-utils-nfsdctl-fix-lockd-config-during-autostart.patch

OBS-URL: https://build.opensuse.org/package/show/Base:System/nfs-utils?expand=0&rev=293
2025-07-31 22:51:30 +00:00
9e4c8aaf10 Accepting request 1244414 from Base:System
- update to 2.8.2:
  * exports: Fix referrals when --enable-junction=no
  * nfsidmap(v2): Add guards around [nfsidmap] usages of [sysconf].
  * libnsm(v2): fix the safer atomic filenames fix
  * libnsm: fix the safer atomic filenames fix
  * nfsd: dump default number of threads to 16
  * autoconf: don't build nfsdcltrack by default
  * nfs(5): Update rsize/wsize options
  * nfsdctl: clarify when versions can be set on the man page
  * nfsdctl: fix up the help text in version_usage()
  * libnsm: safer atomic filenames
  * nfs-utils: fixup statd testing simulator host arg
  * mount.nfs: retry NFSv3 mount after NFSv4 failure in auto negotiation

OBS-URL: https://build.opensuse.org/request/show/1244414
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/nfs-utils?expand=0&rev=185
2025-02-10 16:22:52 +00:00
70cddf05e8 - update to 2.8.2:
* exports: Fix referrals when --enable-junction=no
  * nfsidmap(v2): Add guards around [nfsidmap] usages of [sysconf].
  * libnsm(v2): fix the safer atomic filenames fix
  * libnsm: fix the safer atomic filenames fix
  * nfsd: dump default number of threads to 16
  * autoconf: don't build nfsdcltrack by default
  * nfs(5): Update rsize/wsize options
  * nfsdctl: clarify when versions can be set on the man page
  * nfsdctl: fix up the help text in version_usage()
  * libnsm: safer atomic filenames
  * nfs-utils: fixup statd testing simulator host arg
  * mount.nfs: retry NFSv3 mount after NFSv4 failure in auto negotiation

OBS-URL: https://build.opensuse.org/package/show/Base:System/nfs-utils?expand=0&rev=291
2025-02-08 21:32:28 +00:00
4d0d71e57a Accepting request 1229985 from Base:System
- Require system-user-nobody for nfs-client as the statd user relies
  on `nogroup` from this package (forwarded request 1229984 from firstyear)

OBS-URL: https://build.opensuse.org/request/show/1229985
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/nfs-utils?expand=0&rev=184
2025-01-31 15:02:12 +00:00
Neil Brown
87d204f4e2 - Require system-user-nobody for nfs-client as the statd user relies
on `nogroup` from this package

OBS-URL: https://build.opensuse.org/package/show/Base:System/nfs-utils?expand=0&rev=289
2024-12-11 03:30:00 +00:00
27cc9be039 Accepting request 1220464 from Base:System
OBS-URL: https://build.opensuse.org/request/show/1220464
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/nfs-utils?expand=0&rev=183
2024-11-05 14:40:26 +00:00
Neil Brown
7325ccd1b0 - Update to version 2.8.1
- https://lore.kernel.org/linux-nfs/4a86eea3-973e-4535-8aa5-f3b8b5f7934d@redhat.com/
  - https://kernel.org/pub/linux/utils/nfs-utils/2.8.1/2.8.1-Changelog
  - Add new binary nfsdctl
  - The default number of nfsd threads is now 16 instead of 8
- Removed patchs from previous releases
  - 0001-exportfs-remove-warning-if-neither-subtree_check-or-.patch
  - 0002-conffile-don-t-report-error-from-conf_init_file.patch
  - 0003-conffile-allow-usr-etc-to-provide-any-config-files-e.patch
  - 0004-fsidd-call-anonymous-sockets-by-their-name-only-don-.patch
  - 0001-gssd-revert-commit-a5f3b7ccb01c.patch
  - 0002-gssd-revert-commit-513630d720bd.patch
  - 0003-gssd-switch-to-using-rpc_gss_seccreate.patch
  - 0004-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-machine-cr.patch
  - 0005-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-user-crede.patch
  - 0006-configure-check-for-rpc_gss_seccreate.patch
- Turn nfs-utils-1.0.7-bind-syntax.patch to git patch (bug reference,
  easier to refresh via git, likely it can be now removed)
- Add BuildRequires libnl-3.0, readline

OBS-URL: https://build.opensuse.org/package/show/Base:System/nfs-utils?expand=0&rev=287
2024-11-04 02:35:38 +00:00
15 changed files with 189 additions and 1149 deletions

View File

@@ -1,167 +0,0 @@
From 40d6d58ee6e58f50d5f1aaf8c1253b2338bd7d06 Mon Sep 17 00:00:00 2001
From: NeilBrown <neilb@suse.de>
Date: Mon, 27 Nov 2023 10:12:19 -0500
Subject: [PATCH] exportfs: remove warning if neither subtree_check or
no_subtree_check is given
This warning was only ever intended as a transitional aid.
It doesn't serve any purpose any longer. Let's remove it.
Also clean up some white-space issues.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
support/export/export.c | 2 +-
support/export/xtab.c | 2 +-
support/include/nfslib.h | 2 +-
support/nfs/exports.c | 43 +++++++++++++++++-----------------------
4 files changed, 21 insertions(+), 28 deletions(-)
diff --git a/support/export/export.c b/support/export/export.c
index 3e48c42def19..100912cb29c3 100644
--- a/support/export/export.c
+++ b/support/export/export.c
@@ -119,7 +119,7 @@ export_read(char *fname, int ignore_hosts)
int reexport_found = 0;
setexportent(fname, "r");
- while ((eep = getexportent(0,1)) != NULL) {
+ while ((eep = getexportent(0)) != NULL) {
exp = export_lookup(eep->e_hostname, eep->e_path, ignore_hosts);
if (!exp) {
if (export_create(eep, 0))
diff --git a/support/export/xtab.c b/support/export/xtab.c
index e210ca99d574..282f15bc79cd 100644
--- a/support/export/xtab.c
+++ b/support/export/xtab.c
@@ -47,7 +47,7 @@ xtab_read(char *xtab, char *lockfn, int is_export)
setexportent(xtab, "r");
if (is_export == 1)
v4root_needed = 1;
- while ((xp = getexportent(is_export==0, 0)) != NULL) {
+ while ((xp = getexportent(is_export==0)) != NULL) {
if (!(exp = export_lookup(xp->e_hostname, xp->e_path, is_export != 1)) &&
!(exp = export_create(xp, is_export!=1))) {
if(xp->e_hostname) {
diff --git a/support/include/nfslib.h b/support/include/nfslib.h
index bdbde78d9ebd..eff2a486307f 100644
--- a/support/include/nfslib.h
+++ b/support/include/nfslib.h
@@ -111,7 +111,7 @@ struct rmtabent {
* configuration file parsing
*/
void setexportent(char *fname, char *type);
-struct exportent * getexportent(int,int);
+struct exportent * getexportent(int);
void secinfo_show(FILE *fp, struct exportent *ep);
void xprtsecinfo_show(FILE *fp, struct exportent *ep);
void putexportent(struct exportent *xep);
diff --git a/support/nfs/exports.c b/support/nfs/exports.c
index 15dc574cc21a..a6816e60d62e 100644
--- a/support/nfs/exports.c
+++ b/support/nfs/exports.c
@@ -59,7 +59,7 @@ static int *squids = NULL, nsquids = 0,
static int getexport(char *exp, int len);
static int getpath(char *path, int len);
-static int parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr);
+static int parseopts(char *cp, struct exportent *ep, int *had_subtree_opt_ptr);
static int parsesquash(char *list, int **idp, int *lenp, char **ep);
static int parsenum(char **cpp);
static void freesquash(void);
@@ -109,7 +109,7 @@ static void init_exportent (struct exportent *ee, int fromkernel)
}
struct exportent *
-getexportent(int fromkernel, int fromexports)
+getexportent(int fromkernel)
{
static struct exportent ee, def_ee;
char exp[512], *hostname;
@@ -147,7 +147,7 @@ getexportent(int fromkernel, int fromexports)
* we're not reading from the kernel.
*/
if (exp[0] == '-' && !fromkernel) {
- if (parseopts(exp + 1, &def_ee, 0, &has_default_subtree_opts) < 0)
+ if (parseopts(exp + 1, &def_ee, &has_default_subtree_opts) < 0)
return NULL;
has_default_opts = 1;
@@ -185,20 +185,20 @@ getexportent(int fromkernel, int fromexports)
}
ee.e_hostname = xstrdup(hostname);
- if (parseopts(opt, &ee, fromexports && !has_default_subtree_opts, NULL) < 0) {
- if(ee.e_hostname)
- {
- xfree(ee.e_hostname);
- ee.e_hostname=NULL;
- }
- if(ee.e_uuid)
- {
- xfree(ee.e_uuid);
- ee.e_uuid=NULL;
- }
+ if (parseopts(opt, &ee, NULL) < 0) {
+ if(ee.e_hostname)
+ {
+ xfree(ee.e_hostname);
+ ee.e_hostname=NULL;
+ }
+ if(ee.e_uuid)
+ {
+ xfree(ee.e_uuid);
+ ee.e_uuid=NULL;
+ }
return NULL;
- }
+ }
/* resolve symlinks */
if (realpath(ee.e_path, rpath) != NULL) {
rpath[sizeof (rpath) - 1] = '\0';
@@ -433,7 +433,7 @@ mkexportent(char *hname, char *path, char *options)
}
strncpy(ee.e_path, path, sizeof (ee.e_path));
ee.e_path[sizeof (ee.e_path) - 1] = '\0';
- if (parseopts(options, &ee, 0, NULL) < 0)
+ if (parseopts(options, &ee, NULL) < 0)
return NULL;
return &ee;
}
@@ -441,7 +441,7 @@ mkexportent(char *hname, char *path, char *options)
int
updateexportent(struct exportent *eep, char *options)
{
- if (parseopts(options, eep, 0, NULL) < 0)
+ if (parseopts(options, eep, NULL) < 0)
return 0;
return 1;
}
@@ -632,7 +632,7 @@ void fix_pseudoflavor_flags(struct exportent *ep)
* Parse option string pointed to by cp and set mount options accordingly.
*/
static int
-parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr)
+parseopts(char *cp, struct exportent *ep, int *had_subtree_opt_ptr)
{
int had_subtree_opt = 0;
char *flname = efname?efname:"command line";
@@ -852,13 +852,6 @@ bad_option:
ep->e_nsqgids = nsqgids;
out:
- if (warn && !had_subtree_opt)
- xlog(L_WARNING, "%s [%d]: Neither 'subtree_check' or 'no_subtree_check' specified for export \"%s:%s\".\n"
- " Assuming default behaviour ('no_subtree_check').\n"
- " NOTE: this default has changed since nfs-utils version 1.0.x\n",
-
- flname, flline,
- ep->e_hostname, ep->e_path);
if (had_subtree_opt_ptr)
*had_subtree_opt_ptr = had_subtree_opt;
--
2.43.0

View File

@@ -1,99 +0,0 @@
From 20c0797937e9ec43a78a2f5475d4296897f8c537 Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:46:35 -0500
Subject: [PATCH 1/6] gssd: revert commit a5f3b7ccb01c
In preparation for using rpc_gss_seccreate() function, revert commit
a5f3b7ccb01c "gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for user
credentials"
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
utils/gssd/gssd_proc.c | 2 --
utils/gssd/krb5_util.c | 42 ------------------------------------------
utils/gssd/krb5_util.h | 1 -
3 files changed, 45 deletions(-)
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
index a96647df..e5cc1d98 100644
--- a/utils/gssd/gssd_proc.c
+++ b/utils/gssd/gssd_proc.c
@@ -419,8 +419,6 @@ create_auth_rpc_client(struct clnt_info *clp,
if (cred == GSS_C_NO_CREDENTIAL)
retval = gssd_refresh_krb5_machine_credential(clp->servername,
"*", NULL, 1);
- else
- retval = gssd_k5_remove_bad_service_cred(clp->servername);
if (!retval) {
auth = authgss_create_default(rpc_clnt, tgtname,
&sec);
diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c
index 6f66ef4f..f6ce1fec 100644
--- a/utils/gssd/krb5_util.c
+++ b/utils/gssd/krb5_util.c
@@ -1553,48 +1553,6 @@ gssd_acquire_user_cred(gss_cred_id_t *gss_cred)
return ret;
}
-/* Removed a service ticket for nfs/<name> from the ticket cache
- */
-int
-gssd_k5_remove_bad_service_cred(char *name)
-{
- krb5_creds in_creds, out_creds;
- krb5_error_code ret;
- krb5_context context;
- krb5_ccache cache;
- krb5_principal principal;
- int retflags = KRB5_TC_MATCH_SRV_NAMEONLY;
- char srvname[1024];
-
- ret = krb5_init_context(&context);
- if (ret)
- goto out_cred;
- ret = krb5_cc_default(context, &cache);
- if (ret)
- goto out_free_context;
- ret = krb5_cc_get_principal(context, cache, &principal);
- if (ret)
- goto out_close_cache;
- memset(&in_creds, 0, sizeof(in_creds));
- in_creds.client = principal;
- sprintf(srvname, "nfs/%s", name);
- ret = krb5_parse_name(context, srvname, &in_creds.server);
- if (ret)
- goto out_free_principal;
- ret = krb5_cc_retrieve_cred(context, cache, retflags, &in_creds, &out_creds);
- if (ret)
- goto out_free_principal;
- ret = krb5_cc_remove_cred(context, cache, 0, &out_creds);
-out_free_principal:
- krb5_free_principal(context, principal);
-out_close_cache:
- krb5_cc_close(context, cache);
-out_free_context:
- krb5_free_context(context);
-out_cred:
- return ret;
-}
-
#ifdef HAVE_SET_ALLOWABLE_ENCTYPES
/*
* this routine obtains a credentials handle via gss_acquire_cred()
diff --git a/utils/gssd/krb5_util.h b/utils/gssd/krb5_util.h
index 7ef87018..62c91a0e 100644
--- a/utils/gssd/krb5_util.h
+++ b/utils/gssd/krb5_util.h
@@ -22,7 +22,6 @@ char *gssd_k5_err_msg(krb5_context context, krb5_error_code code);
void gssd_k5_get_default_realm(char **def_realm);
int gssd_acquire_user_cred(gss_cred_id_t *gss_cred);
-int gssd_k5_remove_bad_service_cred(char *srvname);
#ifdef HAVE_SET_ALLOWABLE_ENCTYPES
extern int limit_to_legacy_enctypes;
--
2.46.0

View File

@@ -1,179 +0,0 @@
From ed4dc834e1722b9217fae27da1adf29ab21d6a93 Mon Sep 17 00:00:00 2001
From: NeilBrown <neilb@suse.de>
Date: Mon, 27 Nov 2023 10:30:43 -0500
Subject: [PATCH] conffile: don't report error from conf_init_file()
conf_init_file() currently reports an error if the main config file
doesn't exist - even if there are conf files in the conf.d directory.
This is only used by nfsconfcli.c. However this is not needed. If
there is a real error, and error message is already logged.
If it is simply that the file doesn't exist, that isn't really an error.
So remove the error messages and change conf_init_file() to not return
any status.
Also fix up assorted nearby white-space issues.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
support/include/conffile.h | 2 +-
support/nfs/conffile.c | 32 ++++++++++++++------------------
tools/nfsconf/nfsconfcli.c | 15 ++-------------
3 files changed, 17 insertions(+), 32 deletions(-)
diff --git a/support/include/conffile.h b/support/include/conffile.h
index c4a3ca62860e..c04cd1ec5c0c 100644
--- a/support/include/conffile.h
+++ b/support/include/conffile.h
@@ -62,7 +62,7 @@ extern char *conf_get_str(const char *, const char *);
extern char *conf_get_str_with_def(const char *, const char *, char *);
extern char *conf_get_section(const char *, const char *, const char *);
extern char *conf_get_entry(const char *, const char *, const char *);
-extern int conf_init_file(const char *);
+extern void conf_init_file(const char *);
extern void conf_cleanup(void);
extern int conf_match_num(const char *, const char *, int);
extern int conf_remove(int, const char *, const char *);
diff --git a/support/nfs/conffile.c b/support/nfs/conffile.c
index fd4a17ad4293..6b813dd95147 100644
--- a/support/nfs/conffile.c
+++ b/support/nfs/conffile.c
@@ -658,7 +658,7 @@ conf_load_file(const char *conf_file)
return 0;
}
-static void
+static void
conf_init_dir(const char *conf_file)
{
struct dirent **namelist = NULL;
@@ -669,14 +669,14 @@ conf_init_dir(const char *conf_file)
dname = malloc(strlen(conf_file) + 3);
if (dname == NULL) {
xlog(L_WARNING, "conf_init_dir: malloc: %s", strerror(errno));
- return;
+ return;
}
sprintf(dname, "%s.d", conf_file);
n = scandir(dname, &namelist, NULL, versionsort);
if (n < 0) {
if (errno != ENOENT) {
- xlog(L_WARNING, "conf_init_dir: scandir %s: %s",
+ xlog(L_WARNING, "conf_init_dir: scandir %s: %s",
dname, strerror(errno));
}
free(dname);
@@ -691,7 +691,7 @@ conf_init_dir(const char *conf_file)
for (i = 0; i < n; i++ ) {
struct dirent *d = namelist[i];
- switch (d->d_type) {
+ switch (d->d_type) {
case DT_UNKNOWN:
case DT_REG:
case DT_LNK:
@@ -701,13 +701,13 @@ conf_init_dir(const char *conf_file)
}
if (*d->d_name == '.')
continue;
-
+
fname_len = strlen(d->d_name);
path_len = (fname_len + dname_len);
if (!fname_len || path_len > PATH_MAX) {
xlog(L_WARNING, "conf_init_dir: Too long file name: %s in %s",
d->d_name, dname);
- continue;
+ continue;
}
/*
@@ -715,7 +715,7 @@ conf_init_dir(const char *conf_file)
* that end with CONF_FILE_EXT
*/
if (fname_len <= CONF_FILE_EXT_LEN) {
- xlog(D_GENERAL, "conf_init_dir: %s: name too short",
+ xlog(D_GENERAL, "conf_init_dir: %s: name too short",
d->d_name);
continue;
}
@@ -746,31 +746,29 @@ conf_init_dir(const char *conf_file)
free(namelist[i]);
free(namelist);
free(dname);
-
+
return;
}
-int
+void
conf_init_file(const char *conf_file)
{
unsigned int i;
- int ret;
for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++)
LIST_INIT (&conf_bindings[i]);
TAILQ_INIT (&conf_trans_queue);
- if (conf_file == NULL)
- conf_file=NFS_CONFFILE;
+ if (conf_file == NULL)
+ conf_file = NFS_CONFFILE;
/*
- * First parse the give config file
- * then parse the config.conf.d directory
+ * First parse the give config file
+ * then parse the config.conf.d directory
* (if it exists)
- *
*/
- ret = conf_load_file(conf_file);
+ conf_load_file(conf_file);
/*
* When the same variable is set in both files
@@ -779,8 +777,6 @@ conf_init_file(const char *conf_file)
* have the final say.
*/
conf_init_dir(conf_file);
-
- return ret;
}
/*
diff --git a/tools/nfsconf/nfsconfcli.c b/tools/nfsconf/nfsconfcli.c
index b2ef96d1c600..bd9d52701aa6 100644
--- a/tools/nfsconf/nfsconfcli.c
+++ b/tools/nfsconf/nfsconfcli.c
@@ -135,19 +135,8 @@ int main(int argc, char **argv)
return 1;
}
- if (mode != MODE_SET && mode != MODE_UNSET) {
- if (conf_init_file(confpath)) {
- /* config file was missing or had an error, warn about it */
- if (verbose || mode != MODE_ISSET) {
- fprintf(stderr, "Error loading config file %s\n",
- confpath);
- }
-
- /* this isnt fatal for --isset */
- if (mode != MODE_ISSET)
- return 1;
- }
- }
+ if (mode != MODE_SET && mode != MODE_UNSET)
+ conf_init_file(confpath);
/* --dump mode, output the current configuration */
if (mode == MODE_DUMP) {
--
2.43.0

View File

@@ -1,51 +0,0 @@
From f05af7d9924b5e455f4e750c1e8985c560784fce Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:50:57 -0500
Subject: [PATCH 2/6] gssd: revert commit 513630d720bd
In preparation for using rpc_gss_seccreate(), revert commit 513630d720bd
"gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for machine credentials"
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
utils/gssd/gssd_proc.c | 16 +---------------
1 file changed, 1 insertion(+), 15 deletions(-)
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
index e5cc1d98..4fb6b72d 100644
--- a/utils/gssd/gssd_proc.c
+++ b/utils/gssd/gssd_proc.c
@@ -412,27 +412,13 @@ create_auth_rpc_client(struct clnt_info *clp,
tid, tgtname);
auth = authgss_create_default(rpc_clnt, tgtname, &sec);
if (!auth) {
- if (sec.minor_status == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
- printerr(2, "WARNING: server=%s failed context "
- "creation with KRB5_AP_ERR_BAD_INTEGRITY\n",
- clp->servername);
- if (cred == GSS_C_NO_CREDENTIAL)
- retval = gssd_refresh_krb5_machine_credential(clp->servername,
- "*", NULL, 1);
- if (!retval) {
- auth = authgss_create_default(rpc_clnt, tgtname,
- &sec);
- if (auth)
- goto success;
- }
- }
/* Our caller should print appropriate message */
printerr(2, "WARNING: Failed to create krb5 context for "
"user with uid %d for server %s\n",
uid, tgtname);
goto out_fail;
}
-success:
+
/* Success !!! */
rpc_clnt->cl_auth = auth;
*clnt_return = rpc_clnt;
--
2.46.0

View File

@@ -1,188 +0,0 @@
From 6a714409b17ad2cca99d497129fc944a808eb446 Mon Sep 17 00:00:00 2001
From: NeilBrown <neilb@suse.de>
Date: Mon, 27 Nov 2023 10:35:56 -0500
Subject: [PATCH] conffile: allow /usr/etc to provide any config files expected
in /etc
If any config file is configured to be in /etc, also read from /usr/etc.
This followed a growing trend of moving as much as possible out of /
and into /usr.
See https://en.opensuse.org/openSUSE:Packaging_UsrEtc
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
support/nfs/conffile.c | 26 +++++++++++++++-----------
support/nfsidmap/idmapd.conf.5 | 15 ++++++++++++++-
systemd/nfs.conf.man | 23 ++++++++++++++---------
systemd/nfs.systemd.man | 10 +++++++++-
utils/mount/nfsmount.conf.man | 19 ++++++++++---------
5 files changed, 62 insertions(+), 31 deletions(-)
--- a/support/nfs/conffile.c
+++ b/support/nfs/conffile.c
@@ -763,19 +763,23 @@ conf_init_file(const char *conf_file)
if (conf_file == NULL)
conf_file = NFS_CONFFILE;
- /*
- * First parse the give config file
- * then parse the config.conf.d directory
- * (if it exists)
+ /* If the config file is in /etc (normal) then check
+ * /usr/etc first. Also check config.conf.d for files
+ * names *.conf.
+ *
+ * Content or later files always over-rides earlier
+ * files.
*/
- conf_load_file(conf_file);
+ if (strncmp(conf_file, "/etc/", 5) == 0) {
+ char *usrconf = NULL;
- /*
- * When the same variable is set in both files
- * the conf.d file will override the config file.
- * This allows automated admin systems to
- * have the final say.
- */
+ if (asprintf(&usrconf, "/usr%s", conf_file) > 0 && usrconf) {
+ conf_load_file(usrconf);
+ conf_init_dir(usrconf);
+ free(usrconf);
+ }
+ }
+ conf_load_file(conf_file);
conf_init_dir(conf_file);
}
--- a/support/nfsidmap/idmapd.conf.5
+++ b/support/nfsidmap/idmapd.conf.5
@@ -37,7 +37,7 @@ Configuration file for libnfsidmap. Use
.SH DESCRIPTION
The
.B idmapd.conf
-configuration file consists of several sections, initiated by strings of the
+configuration files consists of several sections, initiated by strings of the
form [General] and [Mapping]. Each section may contain lines of the form
.nf
variable = value
@@ -398,6 +398,19 @@ LDAP_base = dc=org,dc=domain
.\" Additional sections
.\" -------------------------------------------------------------------
.\"
+.SH FILES
+.I /usr/etc/idmapd.conf
+.br
+.I /usr/etc/idmapd.conf.d/*.conf
+.br
+.I /etc/idmapd.conf
+.br
+.I /etc/idmapd.conf.d/*.conf
+.br
+.IP
+Files are read in the order listed. Later settings override earlier
+settings.
+
.SH SEE ALSO
.BR idmapd (8)
.BR svcgssd (8)
--- a/systemd/nfs.conf.man
+++ b/systemd/nfs.conf.man
@@ -2,10 +2,13 @@
.SH NAME
nfs.conf \- general configuration for NFS daemons and tools
.SH SYNOPSIS
+.I /usr/etc/nfs.conf
+.I /usr/etc/nfs.conf.d/
.I /etc/nfs.conf
+.I /etc/nfs.conf.d/
.SH DESCRIPTION
.PP
-This file contains site-specific configuration for various NFS daemons
+These files contain site-specific configuration for various NFS daemons
and other processes. Most configuration can also be passed to
processes via command line arguments, but it can be more convenient to
have a central file. In particular, this encourages consistent
@@ -314,15 +317,17 @@ See
for deatils.
.SH FILES
-.TP 10n
+.I /usr/etc/nfs.conf
+.br
+.I /usr/etc/nfs.conf.d/*.conf
+.br
.I /etc/nfs.conf
-Default NFS client configuration file
-.TP 10n
-.I /etc/nfs.conf.d
-When this directory exists and files ending
-with ".conf" exist, those files will be
-used to set configuration variables. These
-files will override variables set in /etc/nfs.conf
+.br
+.I /etc/nfs.conf.d/*.conf
+.br
+.IP
+Various configuration files read in order. Later settings override
+earlier settings.
.SH SEE ALSO
.BR nfsdcltrack (8),
.BR rpc.nfsd (8),
--- a/systemd/nfs.systemd.man
+++ b/systemd/nfs.systemd.man
@@ -27,7 +27,9 @@ any command line arguments to daemons so
behavior. In many case such configuration can be performed by making
changes to
.I /etc/nfs.conf
-or other configuration files. When that is not convenient, a
+or other configuration files (see
+.BR nfs.conf (5)).
+When that is not convenient, a
distribution might provide systemd "drop-in" files which replace the
.B ExecStart=
setting to start the program with different arguments. For example a
@@ -171,6 +173,12 @@ running, it can be masked with
/etc/nfsmount.conf
.br
/etc/idmapd.conf
+.P
+Also similar files in
+.B /usr/etc
+and in related
+.I conf.d
+drop-in directories.
.SH SEE ALSO
.BR systemd.unit (5),
.BR nfs.conf (5),
--- a/utils/mount/nfsmount.conf.man
+++ b/utils/mount/nfsmount.conf.man
@@ -115,16 +115,17 @@ All mounts to the '/export/home' export
the background (i.e. done asynchronously).
.RE
.SH FILES
-.TP 10n
+.I /usr/etc/nfsmount.conf
+.br
+.I /usr/etc/nfsmount.conf.d/*.conf
+.br
.I /etc/nfsmount.conf
-Default NFS mount configuration file
-.TP 10n
-.I /etc/nfsmount.conf.d
-When this directory exists and files ending
-with ".conf" exist, those files will be
-used to set configuration variables. These
-files will override variables set
-in /etc/nfsmount.conf
+.br
+.I /etc/nfsmount.conf.d/*.conf
+.br
+.IP
+Default NFS mount configuration files, variables set in the later file
+over-ride those in the earlier file.
.PD
.SH SEE ALSO
.BR nfs (5),

View File

@@ -1,60 +0,0 @@
From 3abf6b5223af0ccf07d217d71978ee7987acce88 Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:52:47 -0500
Subject: [PATCH 3/6] gssd: switch to using rpc_gss_seccreate()
If available from the libtirpc library, switch to using
rpc_gss_seccreate() instead of authgss_create_default() which does not
expose gss error codes.
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
utils/gssd/gssd_proc.c | 15 +++++++++++++++
1 file changed, 15 insertions(+)
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
index 4fb6b72d..99761157 100644
--- a/utils/gssd/gssd_proc.c
+++ b/utils/gssd/gssd_proc.c
@@ -70,6 +70,9 @@
#include <sys/types.h>
#include <sys/wait.h>
#include <syscall.h>
+#ifdef HAVE_TIRPC_GSS_SECCREATE
+#include <rpc/rpcsec_gss.h>
+#endif
#include "gssd.h"
#include "err_util.h"
@@ -330,6 +333,11 @@ create_auth_rpc_client(struct clnt_info *clp,
struct timeval timeout;
struct sockaddr *addr = (struct sockaddr *) &clp->addr;
socklen_t salen;
+#ifdef HAVE_TIRPC_GSS_SECCREATE
+ rpc_gss_options_req_t req;
+ rpc_gss_options_ret_t ret;
+ char mechanism[] = "kerberos_v5";
+#endif
pthread_t tid = pthread_self();
sec.qop = GSS_C_QOP_DEFAULT;
@@ -410,7 +418,14 @@ create_auth_rpc_client(struct clnt_info *clp,
printerr(3, "create_auth_rpc_client(0x%lx): creating context with server %s\n",
tid, tgtname);
+#ifdef HAVE_TIRPC_GSS_SECCREATE
+ memset(&req, 0, sizeof(req));
+ req.my_cred = sec.cred;
+ auth = rpc_gss_seccreate(rpc_clnt, tgtname, mechanism,
+ rpcsec_gss_svc_none, NULL, &req, &ret);
+#else
auth = authgss_create_default(rpc_clnt, tgtname, &sec);
+#endif
if (!auth) {
/* Our caller should print appropriate message */
printerr(2, "WARNING: Failed to create krb5 context for "
--
2.46.0

View File

@@ -1,115 +0,0 @@
From 46f91dc8f0d9aa31e18327cf3ad61c27551c4cfc Mon Sep 17 00:00:00 2001
From: Ahelenia Ziemiaska <nabijaczleweli@nabijaczleweli.xyz>
Date: Mon, 27 Nov 2023 10:41:04 -0500
Subject: [PATCH] fsidd: call anonymous sockets by their name only, don't fill
with NULs to 108 bytes
Since e00ab3c0616fe6d83ab0710d9e7d989c299088f7, ss -l looks like this:
u_seq LISTEN 0 5 @/run/fsid.sock@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ 26989379 * 0
with fsidd pushing all the addresses to 108 bytes wide, which is deeply
egregious if you don't filter it out and recolumnate.
This is because, naturally (unix(7)), "Null bytes in the name have
no special significance": abstract addresses are binary blobs, but
paths automatically terminate at the first NUL byte, since paths
can't contain those.
So just specify the correct address length when we're using the abstract domain:
unix(7) recommends "offsetof(struct sockaddr_un, sun_path) + strlen(sun_path) + 1"
for paths, but we don't want to include the terminating NUL, so it's just
"offsetof(struct sockaddr_un, sun_path) + strlen(sun_path)".
This brings the width back to order:
-- >8 --
$ ss -la | grep @
u_str ESTAB 0 0 @45208536ec96909a/bus/systemd-timesyn/bus-api-timesync 18500238 * 18501249
u_str ESTAB 0 0 @fecc9657d2315eb7/bus/systemd-network/bus-api-network 18495452 * 18494406
u_seq LISTEN 0 5 @/run/fsid.sock 27168796 * 0
u_str ESTAB 0 0 @ac308f35f50797a2/bus/systemd-logind/system 19406 * 15153
u_str ESTAB 0 0 @b6606e0dfacbae75/bus/systemd/bus-api-system 18494353 * 18495334
u_str ESTAB 0 0 @5880653d215718a7/bus/systemd/bus-system 26930876 * 26930003
-- >8 --
Fixes: e00ab3c0616fe6d83ab0710d9e7d989c299088f7 ("fsidd: provide
better default socket name.")
Reviewed-by: NeilBrown <neilb@suse.de>
Signed-off-by: Ahelenia Ziemia?ska <nabijaczleweli@nabijaczleweli.xyz>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
support/reexport/fsidd.c | 9 ++++++---
support/reexport/reexport.c | 8 ++++++--
2 files changed, 12 insertions(+), 5 deletions(-)
diff --git a/support/reexport/fsidd.c b/support/reexport/fsidd.c
index 3e62b3fc1370..8a70b78f6362 100644
--- a/support/reexport/fsidd.c
+++ b/support/reexport/fsidd.c
@@ -147,6 +147,7 @@ int main(void)
{
struct event *srv_ev;
struct sockaddr_un addr;
+ socklen_t addr_len;
char *sock_file;
int srv;
@@ -161,10 +162,12 @@ int main(void)
memset(&addr, 0, sizeof(struct sockaddr_un));
addr.sun_family = AF_UNIX;
strncpy(addr.sun_path, sock_file, sizeof(addr.sun_path) - 1);
- if (addr.sun_path[0] == '@')
+ addr_len = sizeof(struct sockaddr_un);
+ if (addr.sun_path[0] == '@') {
/* "abstract" socket namespace */
+ addr_len = offsetof(struct sockaddr_un, sun_path) + strlen(addr.sun_path);
addr.sun_path[0] = 0;
- else
+ } else
unlink(sock_file);
srv = socket(AF_UNIX, SOCK_SEQPACKET | SOCK_NONBLOCK, 0);
@@ -173,7 +176,7 @@ int main(void)
return 1;
}
- if (bind(srv, (const struct sockaddr *)&addr, sizeof(struct sockaddr_un)) == -1) {
+ if (bind(srv, (const struct sockaddr *)&addr, addr_len) == -1) {
xlog(L_WARNING, "Unable to bind %s: %m\n", sock_file);
return 1;
}
diff --git a/support/reexport/reexport.c b/support/reexport/reexport.c
index 78516586b98e..0fb49a46723c 100644
--- a/support/reexport/reexport.c
+++ b/support/reexport/reexport.c
@@ -21,6 +21,7 @@ static int fsidd_srv = -1;
static bool connect_fsid_service(void)
{
struct sockaddr_un addr;
+ socklen_t addr_len;
char *sock_file;
int ret;
int s;
@@ -33,9 +34,12 @@ static bool connect_fsid_service(void)
memset(&addr, 0, sizeof(struct sockaddr_un));
addr.sun_family = AF_UNIX;
strncpy(addr.sun_path, sock_file, sizeof(addr.sun_path) - 1);
- if (addr.sun_path[0] == '@')
+ addr_len = sizeof(struct sockaddr_un);
+ if (addr.sun_path[0] == '@') {
/* "abstract" socket namespace */
+ addr_len = offsetof(struct sockaddr_un, sun_path) + strlen(addr.sun_path);
addr.sun_path[0] = 0;
+ }
s = socket(AF_UNIX, SOCK_SEQPACKET, 0);
if (s == -1) {
@@ -43,7 +47,7 @@ static bool connect_fsid_service(void)
return false;
}
- ret = connect(s, (const struct sockaddr *)&addr, sizeof(struct sockaddr_un));
+ ret = connect(s, (const struct sockaddr *)&addr, addr_len);
if (ret == -1) {
xlog(L_WARNING, "Unable to connect %s: %m, is fsidd running?\n", sock_file);
return false;
--
2.43.0

View File

@@ -1,62 +0,0 @@
From 2bfb59c6f50eb86c21f8e0c33bbf32ec53480fb8 Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:55:35 -0500
Subject: [PATCH 4/6] gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for machine
credentials
During context establishment, when the client received
KRB5_AP_ERR_BAD_INTEGRITY error, it might be due to the server
updating its key material. To handle such error, get a new
service ticket and re-try the AP_REQ.
This functionality relies on the new API in libtirpc that
exposes the gss errors.
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
utils/gssd/gssd_proc.c | 21 ++++++++++++++++++++-
1 file changed, 20 insertions(+), 1 deletion(-)
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
index 99761157..29600a3f 100644
--- a/utils/gssd/gssd_proc.c
+++ b/utils/gssd/gssd_proc.c
@@ -427,13 +427,32 @@ create_auth_rpc_client(struct clnt_info *clp,
auth = authgss_create_default(rpc_clnt, tgtname, &sec);
#endif
if (!auth) {
+#ifdef HAVE_TIRPC_GSS_SECCREATE
+ if (ret.minor_status == KRB5KRB_AP_ERR_BAD_INTEGRITY) {
+ printerr(2, "WARNING: server=%s failed context "
+ "creation with KRB5_AP_ERR_BAD_INTEGRITY\n",
+ clp->servername);
+ if (cred == GSS_C_NO_CREDENTIAL)
+ retval = gssd_refresh_krb5_machine_credential(clp->servername,
+ "*", NULL, 1);
+ if (!retval) {
+ auth = rpc_gss_seccreate(rpc_clnt, tgtname,
+ mechanism, rpcsec_gss_svc_none,
+ NULL, &req, &ret);
+ if (auth)
+ goto success;
+ }
+ }
+#endif
/* Our caller should print appropriate message */
printerr(2, "WARNING: Failed to create krb5 context for "
"user with uid %d for server %s\n",
uid, tgtname);
goto out_fail;
}
-
+#ifdef HAVE_TIRPC_GSS_SECCREATE
+success:
+#endif
/* Success !!! */
rpc_clnt->cl_auth = auth;
*clnt_return = rpc_clnt;
--
2.46.0

View File

@@ -1,101 +0,0 @@
From 15cd566633b1546f0808d0694ede094b4c99752d Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:57:28 -0500
Subject: [PATCH 5/6] gssd: handle KRB5_AP_ERR_BAD_INTEGRITY for user
credentials
Unlike the machine credential case, we can't throw away the ticket
cache and use the keytab to renew the credentials. Instead, we
need to remove the service ticket for the server that returned
KRB5_AP_ERR_BAD_INTEGRITY and try again.
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
utils/gssd/gssd_proc.c | 2 ++
utils/gssd/krb5_util.c | 42 ++++++++++++++++++++++++++++++++++++++++++
utils/gssd/krb5_util.h | 1 +
3 files changed, 45 insertions(+)
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
index 29600a3f..7629de0b 100644
--- a/utils/gssd/gssd_proc.c
+++ b/utils/gssd/gssd_proc.c
@@ -435,6 +435,8 @@ create_auth_rpc_client(struct clnt_info *clp,
if (cred == GSS_C_NO_CREDENTIAL)
retval = gssd_refresh_krb5_machine_credential(clp->servername,
"*", NULL, 1);
+ else
+ retval = gssd_k5_remove_bad_service_cred(clp->servername);
if (!retval) {
auth = rpc_gss_seccreate(rpc_clnt, tgtname,
mechanism, rpcsec_gss_svc_none,
diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c
index f6ce1fec..6f66ef4f 100644
--- a/utils/gssd/krb5_util.c
+++ b/utils/gssd/krb5_util.c
@@ -1553,6 +1553,48 @@ gssd_acquire_user_cred(gss_cred_id_t *gss_cred)
return ret;
}
+/* Removed a service ticket for nfs/<name> from the ticket cache
+ */
+int
+gssd_k5_remove_bad_service_cred(char *name)
+{
+ krb5_creds in_creds, out_creds;
+ krb5_error_code ret;
+ krb5_context context;
+ krb5_ccache cache;
+ krb5_principal principal;
+ int retflags = KRB5_TC_MATCH_SRV_NAMEONLY;
+ char srvname[1024];
+
+ ret = krb5_init_context(&context);
+ if (ret)
+ goto out_cred;
+ ret = krb5_cc_default(context, &cache);
+ if (ret)
+ goto out_free_context;
+ ret = krb5_cc_get_principal(context, cache, &principal);
+ if (ret)
+ goto out_close_cache;
+ memset(&in_creds, 0, sizeof(in_creds));
+ in_creds.client = principal;
+ sprintf(srvname, "nfs/%s", name);
+ ret = krb5_parse_name(context, srvname, &in_creds.server);
+ if (ret)
+ goto out_free_principal;
+ ret = krb5_cc_retrieve_cred(context, cache, retflags, &in_creds, &out_creds);
+ if (ret)
+ goto out_free_principal;
+ ret = krb5_cc_remove_cred(context, cache, 0, &out_creds);
+out_free_principal:
+ krb5_free_principal(context, principal);
+out_close_cache:
+ krb5_cc_close(context, cache);
+out_free_context:
+ krb5_free_context(context);
+out_cred:
+ return ret;
+}
+
#ifdef HAVE_SET_ALLOWABLE_ENCTYPES
/*
* this routine obtains a credentials handle via gss_acquire_cred()
diff --git a/utils/gssd/krb5_util.h b/utils/gssd/krb5_util.h
index 62c91a0e..7ef87018 100644
--- a/utils/gssd/krb5_util.h
+++ b/utils/gssd/krb5_util.h
@@ -22,6 +22,7 @@ char *gssd_k5_err_msg(krb5_context context, krb5_error_code code);
void gssd_k5_get_default_realm(char **def_realm);
int gssd_acquire_user_cred(gss_cred_id_t *gss_cred);
+int gssd_k5_remove_bad_service_cred(char *srvname);
#ifdef HAVE_SET_ALLOWABLE_ENCTYPES
extern int limit_to_legacy_enctypes;
--
2.46.0

View File

@@ -1,35 +0,0 @@
From 49567e7d03a5605c590be2135a24d4de8345fa3c Mon Sep 17 00:00:00 2001
From: Olga Kornievskaia <kolga@netapp.com>
Date: Mon, 11 Dec 2023 08:59:43 -0500
Subject: [PATCH 6/6] configure: check for rpc_gss_seccreate
If we have rpc_gss_sccreate in tirpc library define
HAVE_TIRPC_GSS_SECCREATE, which would allow us to handle bad_integrity
errors.
Reviewed-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Olga Kornievskaia <kolga@netapp.com>
Signed-off-by: Steve Dickson <steved@redhat.com>
---
aclocal/libtirpc.m4 | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/aclocal/libtirpc.m4 b/aclocal/libtirpc.m4
index bddae022..ef48a2ae 100644
--- a/aclocal/libtirpc.m4
+++ b/aclocal/libtirpc.m4
@@ -26,6 +26,11 @@ AC_DEFUN([AC_LIBTIRPC], [
[Define to 1 if your tirpc library provides libtirpc_set_debug])],,
[${LIBS}])])
+ AS_IF([test -n "${LIBTIRPC}"],
+ [AC_CHECK_LIB([tirpc], [rpc_gss_seccreate],
+ [AC_DEFINE([HAVE_TIRPC_GSS_SECCREATE], [1],
+ [Define to 1 if your tirpc library provides rpc_gss_seccreate])],,
+ [${LIBS}])])
AC_SUBST([AM_CPPFLAGS])
AC_SUBST(LIBTIRPC)
--
2.46.0

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:01b3b0fb9c7d0bbabf5114c736542030748c788ec2fd9734744201e9b0a1119d
size 728280

BIN
nfs-utils-2.8.2.tar.xz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@@ -1,3 +1,49 @@
-------------------------------------------------------------------
Sat Feb 8 21:30:47 UTC 2025 - Dirk Müller <dmueller@suse.com>
- update to 2.8.2:
* exports: Fix referrals when --enable-junction=no
* nfsidmap(v2): Add guards around [nfsidmap] usages of [sysconf].
* libnsm(v2): fix the safer atomic filenames fix
* libnsm: fix the safer atomic filenames fix
* nfsd: dump default number of threads to 16
* autoconf: don't build nfsdcltrack by default
* nfs(5): Update rsize/wsize options
* nfsdctl: clarify when versions can be set on the man page
* nfsdctl: fix up the help text in version_usage()
* libnsm: safer atomic filenames
* nfs-utils: fixup statd testing simulator host arg
* mount.nfs: retry NFSv3 mount after NFSv4 failure in auto negotiation
-------------------------------------------------------------------
Wed Dec 11 03:18:18 UTC 2024 - William Brown <william.brown@suse.com>
- Require system-user-nobody for nfs-client as the statd user relies
on `nogroup` from this package
-------------------------------------------------------------------
Tue Oct 29 10:05:55 UTC 2024 - Petr Vorel <pvorel@suse.cz>
- Update to version 2.8.1
- https://lore.kernel.org/linux-nfs/4a86eea3-973e-4535-8aa5-f3b8b5f7934d@redhat.com/
- https://kernel.org/pub/linux/utils/nfs-utils/2.8.1/2.8.1-Changelog
- Add new binary nfsdctl
- The default number of nfsd threads is now 16 instead of 8
- Removed patchs from previous releases
- 0001-exportfs-remove-warning-if-neither-subtree_check-or-.patch
- 0002-conffile-don-t-report-error-from-conf_init_file.patch
- 0003-conffile-allow-usr-etc-to-provide-any-config-files-e.patch
- 0004-fsidd-call-anonymous-sockets-by-their-name-only-don-.patch
- 0001-gssd-revert-commit-a5f3b7ccb01c.patch
- 0002-gssd-revert-commit-513630d720bd.patch
- 0003-gssd-switch-to-using-rpc_gss_seccreate.patch
- 0004-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-machine-cr.patch
- 0005-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-user-crede.patch
- 0006-configure-check-for-rpc_gss_seccreate.patch
- Turn nfs-utils-1.0.7-bind-syntax.patch to git patch (bug reference,
easier to refresh via git, likely it can be now removed)
- Add BuildRequires libnl-3.0, readline
-------------------------------------------------------------------
Tue Aug 20 20:21:14 UTC 2024 - Dirk Müller <dmueller@suse.com>
@@ -155,7 +201,7 @@ Sat May 7 12:17:24 UTC 2022 - Marcus Meissner <meissner@suse.com>
-------------------------------------------------------------------
Mon Mar 21 14:50:21 UTC 2022 - Dirk Müller <dmueller@suse.com>
- drop reenable-nfsv2.patch (poo#106679)
- drop reenable-nfsv2.patch (poo#106679)
-------------------------------------------------------------------
Tue Mar 8 20:58:54 UTC 2022 - Dirk Müller <dmueller@suse.com>
@@ -197,7 +243,7 @@ Mon Oct 25 23:53:37 UTC 2021 - Neil Brown <nfbrown@suse.com>
Thu Sep 9 23:35:04 UTC 2021 - Neil Brown <nfbrown@suse.com>
- Add 0001-gssd-fix-crash-in-debug-message.patch
Fix crash when rpc-gssd run with -v.
Fix crash when rpc-gssd run with -v.
(boo#1190144)
-------------------------------------------------------------------
@@ -377,7 +423,7 @@ Mon Feb 10 18:58:59 UTC 2020 - Petr Vorel <pvorel@suse.cz>
Dropped patches (upstream used different solution):
- 0009-Allow-compilation-to-succeed-with-fno-common.patch (btw this used
Patch0: instead of Patch10:) (boo#1160405)
Add nfsdcld - NFSv4 Client Tracking Daemon, add nfsdcld.service and enable it
for nfs-kernel-server, add man page
Add clddb-tool - tool for downgrading the nfsdcld sqlite database schema,
@@ -526,7 +572,7 @@ Fri Jul 6 15:02:49 CEST 2018 - kukuk@suse.de
-------------------------------------------------------------------
Thu Nov 23 13:40:51 UTC 2017 - rbrown@suse.com
- Replace references to /var/adm/fillup-templates with new
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)
-------------------------------------------------------------------
@@ -1031,7 +1077,7 @@ Mon May 13 15:32:55 UTC 2013 - coolo@suse.com
Wed Mar 6 20:04:55 UTC 2013 - darin@darins.net
- nfsserver.init,sysconfig.nfs - Add support for setting rpc.mountd
options.
options.
-------------------------------------------------------------------
Wed Nov 28 00:08:55 UTC 2012 - nfbrown@suse.com
@@ -1096,7 +1142,7 @@ Sun Nov 20 06:47:14 UTC 2011 - coolo@suse.com
-------------------------------------------------------------------
Sun Nov 6 11:43:39 UTC 2011 - puzel@suse.com
- do not strip the binaries
- do not strip the binaries
-------------------------------------------------------------------
Wed Oct 12 05:18:17 UTC 2011 - nfbrown@suse.com
@@ -1272,7 +1318,7 @@ Sun May 9 23:07:24 UTC 2010 - nfbrown@novell.com
-------------------------------------------------------------------
Mon Apr 19 23:43:45 UTC 2010 - nfbrown@novell.com
- mkinitrd-boot.sh: allow other mkinitrd-setup
- mkinitrd-boot.sh: allow other mkinitrd-setup
scripts to request the inclusion of nfs support
by setting need_nfs to 1. (bnc#572207)
@@ -1305,7 +1351,7 @@ Tue Feb 23 22:15:18 UTC 2010 - nfbrown@novell.com
-------------------------------------------------------------------
Sun Nov 29 22:03:26 UTC 2009 - nfbrown@novell.com
- nfs-utils-eperm-fallback.patch: mount.nfs
- nfs-utils-eperm-fallback.patch: mount.nfs
tries a v3 mount after a v4 mount fails with ENOENT.
Older linux nfsd servers return EPERM, so fall
back in that case too. bnc#557138
@@ -1314,7 +1360,7 @@ Sun Nov 29 22:03:26 UTC 2009 - nfbrown@novell.com
Thu Nov 5 03:16:22 UTC 2009 - nfbrown@novell.com
- New upsteam release - 1.2.1
Includes new config file: /etc/nfsmount.conf and
Includes new config file: /etc/nfsmount.conf and
man page.
- nfs.init
* implement try-restart in a more gentle fashion
@@ -1331,7 +1377,7 @@ Thu Nov 5 03:16:22 UTC 2009 - nfbrown@novell.com
-------------------------------------------------------------------
Fri Oct 30 05:43:32 CET 2009 - nfbrown@suse.de
- Kill processes on NFS mounts when unmounting
- Kill processes on NFS mounts when unmounting
for shutdown. This allows any 'sync' to happen
before we turn off the network.
(bnc#503640)
@@ -1372,7 +1418,7 @@ Sun Dec 7 22:20:05 CET 2008 - nfbrown@suse.de
- gssd-mem-leak
* set better expiry date for cached auth info
so kernel does not run out of memory
bnc#442490
bnc#442490
-------------------------------------------------------------------
Fri Dec 5 02:43:20 CET 2008 - nfbrown@suse.de
@@ -1400,7 +1446,7 @@ Tue Dec 2 03:15:50 CET 2008 - nfbrown@suse.de
- nfsserver.init
* set lockd sysctls before starting lockd.
(bnc#443118)
-------------------------------------------------------------------
Tue Nov 25 06:10:31 CET 2008 - nfbrown@suse.de
@@ -1423,7 +1469,7 @@ Mon Nov 24 00:01:51 CET 2008 - nfbrown@suse.de
* Don't use 'system' to run start-statd
as this looses our setuid bit.
bnc#447812
-------------------------------------------------------------------
Fri Nov 21 11:45:58 CET 2008 - hare@suse.de
@@ -1468,21 +1514,21 @@ Fri Nov 14 03:19:34 CET 2008 - nfbrown@suse.de
Fri Nov 7 04:32:51 CET 2008 - nfbrown@suse.de
- nfs.init
* fix typo in handling of "init.d/nfs status"
* fix typo in handling of "init.d/nfs status"
$status should have been $state
-------------------------------------------------------------------
Mon Oct 13 17:58:34 CEST 2008 - mkoenig@suse.de
- nfs.init:
- nfs.init:
* ensure all daemons get killed on stop (including rpc.statd)
* unmount rpc_pipefs
* unmount rpc_pipefs
* let close_usr do the work before the NFS filesystems get unmounted
-------------------------------------------------------------------
Mon Oct 13 10:35:13 CEST 2008 - ro@suse.de
- fix sysconfig filename for changed fillup call
- fix sysconfig filename for changed fillup call
-------------------------------------------------------------------
Mon Oct 6 14:37:33 CEST 2008 - kukuk@suse.de
@@ -1597,7 +1643,7 @@ Fri May 2 05:22:19 CEST 2008 - nfbrown@suse.de
- Added SM_NOTIFY_OPTIONS sysconfig - (bnc #379806)
- Removed needless rc_status/rc_exit games in nfsserver.init (bnc #380156)
- Fixed some sysconfig entries that asked to restart non-existent
services (gssd and idmpad have been rolled in to nfs/nfsserver).
services (gssd and idmpad have been rolled in to nfs/nfsserver).
-------------------------------------------------------------------
Fri Apr 11 12:08:38 CEST 2008 - jsrain@suse.cz
@@ -1613,25 +1659,25 @@ Wed Apr 9 12:06:23 CEST 2008 - jsrain@suse.cz
Tue Apr 1 16:12:22 CEST 2008 - mkoenig@suse.de
- fix path srvinfo.d -> svcinfo.d
- remove svcinfo.d dir as it is provided now by filesystem
- remove svcinfo.d dir as it is provided now by filesystem
-------------------------------------------------------------------
Thu Mar 27 13:53:20 CET 2008 - mkoenig@suse.de
- update to version 1.1.2
- uses libgssglue instead of libgssapi
- update to version 1.1.2
- uses libgssglue instead of libgssapi
- remove patch
nfs-utils-o_create-mode
-------------------------------------------------------------------
Wed Mar 26 17:11:33 CET 2008 - mkoenig@suse.de
- add rpcbind support [fate#300607]
- add rpcbind support [fate#300607]
-------------------------------------------------------------------
Thu Feb 28 18:42:52 CET 2008 - ro@suse.de
- added gssapi to buildrequires
- added gssapi to buildrequires
-------------------------------------------------------------------
Wed Feb 13 21:04:46 CET 2008 - jeffm@suse.com
@@ -1656,7 +1702,7 @@ Mon Dec 17 02:29:08 CET 2007 - nfbrown@suse.de
Mon Nov 12 12:58:01 CET 2007 - ro@suse.de
- use navigation icons from latex2html in nfs-utils-doc package
(#116355)
(#116355)
-------------------------------------------------------------------
Fri Sep 14 12:22:08 CEST 2007 - ro@suse.de
@@ -1668,12 +1714,12 @@ Fri Sep 14 12:22:08 CEST 2007 - ro@suse.de
Wed Sep 12 15:36:34 CEST 2007 - ro@suse.de
- drop conflicts with nfs-server (userspace) in nfs-client package
showmount has been removed there (#309782)
showmount has been removed there (#309782)
-------------------------------------------------------------------
Thu Jul 19 16:40:38 CEST 2007 - ro@suse.de
- added README.NFSv4 (#182775)
- added README.NFSv4 (#182775)
-------------------------------------------------------------------
Tue Jul 17 13:32:25 CEST 2007 - meissner@suse.de
@@ -1715,7 +1761,7 @@ Tue Feb 27 08:52:29 CET 2007 - ro@suse.de
- Fix -n option to mountd
- Document sensitive gids
- upstreamed patches deleted:
nfs-utils-anon-uid32.patch
nfs-utils-anon-uid32.patch
- added e2fsprogs-devel (for libblkid)
- nhfsXXX binaries and manpages have been removed upstream
@@ -1733,7 +1779,7 @@ Mon Jan 8 18:23:44 CET 2007 - ro@suse.de
-------------------------------------------------------------------
Mon Dec 18 18:40:03 CET 2006 - ro@suse.de
- added nfsserver.xml to /etc/omc/srvinfo.d (fate#301835)
- added nfsserver.xml to /etc/omc/srvinfo.d (fate#301835)
-------------------------------------------------------------------
Tue Aug 8 17:49:47 CEST 2006 - ro@suse.de
@@ -1754,7 +1800,7 @@ Tue Aug 8 17:49:47 CEST 2006 - ro@suse.de
- nfs-utils-1.0.7-strip.patch
- nfs-utils-64bigendian.patch
- nfs-utils-1.0.6-quota.patch (upstream different)
partly upstreamed patches:
- nfs-utils-1.0.6-anon-uid32.patch
- nfs-utils-1.0.7-gssd-select-ccache.patch
@@ -1771,17 +1817,17 @@ Thu Jul 13 14:33:24 CEST 2006 - aj@suse.de
-------------------------------------------------------------------
Fri Jun 23 15:20:54 CEST 2006 - ro@suse.de
- find kerberos ticket files even if /tmp on reiser (#187775)
- find kerberos ticket files even if /tmp on reiser (#187775)
-------------------------------------------------------------------
Wed Jun 21 12:13:00 CEST 2006 - ro@suse.de
- fix /etc/gssapi_mech.conf for lib64 platforms (#186954)
- fix /etc/gssapi_mech.conf for lib64 platforms (#186954)
-------------------------------------------------------------------
Mon Jun 12 15:26:54 CEST 2006 - ro@suse.de
- added support for type 3 filehandles to mountd (#182552)
- added support for type 3 filehandles to mountd (#182552)
-------------------------------------------------------------------
Fri Jun 2 12:39:10 CEST 2006 - ro@suse.de
@@ -1792,7 +1838,7 @@ Fri Jun 2 12:39:10 CEST 2006 - ro@suse.de
-------------------------------------------------------------------
Fri Jun 2 12:17:25 CEST 2006 - ro@suse.de
- added fix for 64bit bigendian platforms in gssd (#172605)
- added fix for 64bit bigendian platforms in gssd (#172605)
-------------------------------------------------------------------
Tue May 2 09:39:42 CEST 2006 - okir@suse.de
@@ -1803,7 +1849,7 @@ Tue May 2 09:39:42 CEST 2006 - okir@suse.de
Mon Apr 24 14:05:16 CEST 2006 - ro@suse.de
- nfs-server rc-script: make force-reload do as reload does
(#167152)
(#167152)
- nfs-server rc-script: reload idmapd if NFSV4 is on (#167016)
-------------------------------------------------------------------
@@ -1828,7 +1874,7 @@ Fri Jan 27 02:14:16 CET 2006 - mls@suse.de
-------------------------------------------------------------------
Wed Jan 25 16:20:23 CET 2006 - ro@suse.de
- nfsserver rcscript: only mount nfsdfs if not mounted already
- nfsserver rcscript: only mount nfsdfs if not mounted already
-------------------------------------------------------------------
Tue Jan 17 00:32:02 CET 2006 - schwab@suse.de
@@ -1844,12 +1890,12 @@ Mon Dec 19 14:56:53 CET 2005 - mmj@suse.de
Mon Nov 28 16:29:12 CET 2005 - ro@suse.de
- fix init scripts: in the stop case, a not running service
is not an error (#134904)
is not an error (#134904)
-------------------------------------------------------------------
Mon Nov 14 13:11:15 CET 2005 - ro@suse.de
- packaging /var/lib/nfs/v4recovery directory (#133502)
- packaging /var/lib/nfs/v4recovery directory (#133502)
-------------------------------------------------------------------
Thu Sep 1 11:09:56 CEST 2005 - okir@suse.de
@@ -1872,7 +1918,7 @@ Fri Aug 19 14:23:23 CEST 2005 - okir@suse.de
-------------------------------------------------------------------
Mon Jun 20 15:48:17 CEST 2005 - ro@suse.de
- fix in init-script (do not try unmount if not mounted) (#91460)
- fix in init-script (do not try unmount if not mounted) (#91460)
-------------------------------------------------------------------
Mon Jun 6 17:28:03 CEST 2005 - schwab@suse.de
@@ -1892,12 +1938,12 @@ Tue May 31 13:16:12 CEST 2005 - okir@suse.de
-------------------------------------------------------------------
Tue Apr 19 14:25:48 CEST 2005 - ro@suse.de
- do not warn about sync/async for readonly exports (#78369)
- do not warn about sync/async for readonly exports (#78369)
-------------------------------------------------------------------
Mon Apr 4 01:57:06 CEST 2005 - ro@suse.de
- make it build with gcc4
- make it build with gcc4
-------------------------------------------------------------------
Sat Feb 5 12:54:14 CET 2005 - schwab@suse.de
@@ -1909,7 +1955,7 @@ Sat Feb 5 12:54:14 CET 2005 - schwab@suse.de
-------------------------------------------------------------------
Mon Dec 13 14:00:35 CET 2004 - ro@suse.de
- update to 1.0.7-pre2 (use 1.0.6.2 as package version)
- update to 1.0.7-pre2 (use 1.0.6.2 as package version)
- disable gss and nfsv4 for now
-------------------------------------------------------------------
@@ -1949,7 +1995,7 @@ Thu Jun 24 12:58:14 CEST 2004 - ro@suse.de
Tue Jun 22 14:23:11 CEST 2004 - ro@suse.de
- remove nfslock start script
- remove nfslock dependency
- remove nfslock dependency
-------------------------------------------------------------------
Thu Jun 17 23:11:31 CEST 2004 - ro@suse.de
@@ -1992,34 +2038,34 @@ Mon Sep 15 09:12:00 CEST 2003 - ro@suse.de
-------------------------------------------------------------------
Fri Aug 29 18:47:29 CEST 2003 - ro@suse.de
- fix hed/tail calling syntax (#29644)
- fix hed/tail calling syntax (#29644)
-------------------------------------------------------------------
Mon Aug 25 11:41:31 CEST 2003 - ro@suse.de
- add restart_on_update/stop_on_removal macros
- add restart_on_update/stop_on_removal macros
-------------------------------------------------------------------
Fri Aug 15 15:04:43 CEST 2003 - ro@suse.de
- added sysconfig metadata (#28908)
- added sysconfig metadata (#28908)
-------------------------------------------------------------------
Tue Aug 5 01:38:42 CEST 2003 - ro@suse.de
- fix compile for rquotad (unused anyway
- fix compile for rquotad (unused anyway
-------------------------------------------------------------------
Thu Jul 31 14:15:43 CEST 2003 - ro@suse.de
- add support for STATD_HOSTNAME (#28201)
- add support for STATD_HOSTNAME (#28201)
-------------------------------------------------------------------
Mon Jul 28 14:20:00 CEST 2003 - ro@suse.de
- update to 1.0.5 and adapt patches
- overflow patch already included
- part of acl patch already included
- part of acl patch already included
-------------------------------------------------------------------
Mon Jul 21 17:04:00 CEST 2003 - agruen@suse.de
@@ -2046,7 +2092,7 @@ Thu Jun 12 07:19:59 CEST 2003 - kukuk@suse.de
-------------------------------------------------------------------
Tue May 13 00:34:35 CEST 2003 - ro@suse.de
- fix file list
- fix file list
-------------------------------------------------------------------
Fri Mar 28 01:42:47 CET 2003 - ro@suse.de
@@ -2056,12 +2102,12 @@ Fri Mar 28 01:42:47 CET 2003 - ro@suse.de
-------------------------------------------------------------------
Wed Jan 8 12:56:27 CET 2003 - ro@suse.de
- added sysconfig metadata (#22663)
- added sysconfig metadata (#22663)
-------------------------------------------------------------------
Fri Sep 6 15:07:56 CEST 2002 - ro@suse.de
- rcnfsserver: moved ypbind to should-start (#18952)
- rcnfsserver: moved ypbind to should-start (#18952)
- rcnfslock: fixed typo killing daemons on "status" (#19046)
-------------------------------------------------------------------
@@ -2078,7 +2124,7 @@ Mon Aug 26 11:47:10 CEST 2002 - okir@suse.de
-------------------------------------------------------------------
Thu Aug 22 11:18:32 CEST 2002 - ro@suse.de
- fixed symlink rcnfslock (#18171)
- fixed symlink rcnfslock (#18171)
-------------------------------------------------------------------
Wed Aug 7 17:14:21 CEST 2002 - ro@suse.de
@@ -2089,7 +2135,7 @@ Wed Aug 7 17:14:21 CEST 2002 - ro@suse.de
Thu Aug 1 16:47:34 CEST 2002 - ro@suse.de
- update to 1.0.1
- added prereqs
- added prereqs
-------------------------------------------------------------------
Thu Jul 25 10:16:28 CEST 2002 - okir@suse.de
@@ -2113,7 +2159,7 @@ Tue Jul 16 18:41:22 CEST 2002 - kukuk@suse.de
Fri Jun 14 01:55:23 CEST 2002 - ro@suse.de
- run suse_update_config
-------------------------------------------------------------------
Tue Feb 26 17:06:41 CET 2002 - ro@suse.de
@@ -2122,31 +2168,31 @@ Tue Feb 26 17:06:41 CET 2002 - ro@suse.de
-------------------------------------------------------------------
Wed Feb 6 14:07:06 CET 2002 - ro@suse.de
- ignore returncodes from killing statd and lockd (#13072)
- ignore returncodes from killing statd and lockd (#13072)
-------------------------------------------------------------------
Wed Feb 6 13:33:08 CET 2002 - ro@suse.de
- sysconfig/nfs-server -> sysconfig/nfs
- sysconfig/nfs-server -> sysconfig/nfs
-------------------------------------------------------------------
Wed Jan 9 11:44:08 CET 2002 - ro@suse.de
- removed variable NFS_SERVER (#12742)
- moved USE_KERNEL_NFSD_NUMBER to /etc/sysconfig/nfs-server
- moved USE_KERNEL_NFSD_NUMBER to /etc/sysconfig/nfs-server
-------------------------------------------------------------------
Wed Sep 26 15:36:25 CEST 2001 - ro@suse.de
- up to 0.3.3
many fixes to canonicalize hostnames in exports
many fixes to canonicalize hostnames in exports
-------------------------------------------------------------------
Fri Aug 24 15:31:29 CEST 2001 - ro@suse.de
- removed nfs-version 3 detection in start-script, all kernels
that have kernel nfsd support usually do have nfsd-v3 support
and detection would require at least a 5 sec wait in the script
and detection would require at least a 5 sec wait in the script
-------------------------------------------------------------------
Tue Jul 31 09:53:20 CEST 2001 - kukuk@suse.de
@@ -2158,26 +2204,26 @@ Tue Jul 31 09:53:20 CEST 2001 - kukuk@suse.de
-------------------------------------------------------------------
Wed Apr 11 18:39:20 CEST 2001 - ro@suse.de
- lockd only started for 2.2 kernels instead of ignoring error
- lockd only started for 2.2 kernels instead of ignoring error
- completed rpc.statd to /sbin move in startscript
-------------------------------------------------------------------
Mon Mar 12 16:30:48 CET 2001 - ro@suse.de
- move rpc.lockd, rpc.statd to /sbin
- move rpc.lockd, rpc.statd to /sbin
-------------------------------------------------------------------
Mon Mar 12 01:39:10 CET 2001 - ro@suse.de
- update to 0.3.1
- ignore lockd error messages
- dump filedescriptors before starting kernel threads
- dump filedescriptors before starting kernel threads
-------------------------------------------------------------------
Tue Feb 6 12:33:46 CET 2001 - ro@suse.de
- renamed package to nfs-utils
- Obsoletes and Provides nfsutils
- Obsoletes and Provides nfsutils
-------------------------------------------------------------------
Fri Jan 12 01:47:05 CET 2001 - ro@suse.de
@@ -2187,7 +2233,7 @@ Fri Jan 12 01:47:05 CET 2001 - ro@suse.de
-------------------------------------------------------------------
Thu Jan 11 23:09:27 CET 2001 - ro@suse.de
- don't fail if lockd can't be started
- don't fail if lockd can't be started
-------------------------------------------------------------------
Wed Dec 6 00:44:49 PST 2000 - bk@suse.de
@@ -2203,24 +2249,24 @@ Tue Nov 28 10:30:00 CET 2000 - kukuk@suse.de
Thu Oct 12 18:13:48 CEST 2000 - ro@suse.de
- exports.4 should be exports.5
- removed k-prefix
- removed k-prefix
-------------------------------------------------------------------
Thu Oct 12 15:43:43 CEST 2000 - ro@suse.de
- added exports.4 man-page
- added exports.4 man-page
- up to 0.2.1
-------------------------------------------------------------------
Wed Sep 27 11:44:11 CEST 2000 - ro@suse.de
- update to 0.2
- fix for nfsserver.init (check for v3)
- fix for nfsserver.init (check for v3)
-------------------------------------------------------------------
Thu Aug 17 15:04:11 CEST 2000 - ro@suse.de
- ugraded from knfsd to successor package nfs-utils (v.0.1.9.1)
- ugraded from knfsd to successor package nfs-utils (v.0.1.9.1)
-------------------------------------------------------------------
Fri Jul 28 18:31:24 CEST 2000 - bjacke@suse.de
@@ -2257,18 +2303,18 @@ Sat Apr 15 16:22:26 CEST 2000 - kukuk@suse.de
Wed Feb 16 17:31:37 CET 2000 - kukuk@suse.de
- Fill out Copyright and Group field
- Remove rquotad from file list, it is already in the quota
- Remove rquotad from file list, it is already in the quota
package [Bug 1571]
-------------------------------------------------------------------
Tue Jan 25 15:11:24 CET 2000 - ro@suse.de
- manpages to /usr/share using macro
- manpages to /usr/share using macro
-------------------------------------------------------------------
Thu Oct 21 00:26:42 CEST 1999 - ro@suse.de
- renamed package from linuxnfs to knfsd
- renamed package from linuxnfs to knfsd
-------------------------------------------------------------------
Tue Oct 12 17:56:24 CEST 1999 - garloff@suse.de
@@ -2304,7 +2350,7 @@ Mon Jun 14 10:27:36 MEST 1999 - kukuk@suse.de
-------------------------------------------------------------------
Sun Jun 6 15:51:15 MEST 1999 - kukuk@suse.de
- update to version 1.3.3b
- update to version 1.3.3b
-------------------------------------------------------------------
Tue Mar 16 13:14:54 MET 1999 - ro@suse.de

View File

@@ -1,7 +1,7 @@
#
# spec file for package nfs-utils
#
# Copyright (c) 2024 SUSE LLC
# Copyright (c) 2025 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -22,7 +22,7 @@
%endif
Name: nfs-utils
Version: 2.6.4
Version: 2.8.2
Release: 0
Summary: Support Utilities for Kernel nfsd
License: GPL-2.0-or-later
@@ -42,17 +42,6 @@ Source25: rpc-svcgssd.options.conf
Source26: nfs.conf
Source27: nfs-kernel-server.tmpfiles.conf
Patch0: nfs-utils-1.0.7-bind-syntax.patch
Patch1: 0001-exportfs-remove-warning-if-neither-subtree_check-or-.patch
Patch2: 0002-conffile-don-t-report-error-from-conf_init_file.patch
Patch3: 0003-conffile-allow-usr-etc-to-provide-any-config-files-e.patch
Patch4: 0004-fsidd-call-anonymous-sockets-by-their-name-only-don-.patch
# PATCH-FIX-UPSTREAM: fix build against libtirpc 1.3.5
Patch5: 0001-gssd-revert-commit-a5f3b7ccb01c.patch
Patch6: 0002-gssd-revert-commit-513630d720bd.patch
Patch7: 0003-gssd-switch-to-using-rpc_gss_seccreate.patch
Patch8: 0004-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-machine-cr.patch
Patch9: 0005-gssd-handle-KRB5_AP_ERR_BAD_INTEGRITY-for-user-crede.patch
Patch10: 0006-configure-check-for-rpc_gss_seccreate.patch
BuildRequires: e2fsprogs-devel
BuildRequires: gcc-c++
BuildRequires: libtool
@@ -66,9 +55,11 @@ BuildRequires: pkgconfig(krb5)
BuildRequires: pkgconfig(libcap)
BuildRequires: pkgconfig(libevent)
BuildRequires: pkgconfig(libkeyutils)
BuildRequires: pkgconfig(libnl-3.0)
BuildRequires: pkgconfig(libtirpc)
BuildRequires: pkgconfig(libxml-2.0)
BuildRequires: pkgconfig(mount)
BuildRequires: pkgconfig(readline)
BuildRequires: pkgconfig(sqlite3)
Suggests: python-base
%{?systemd_ordering}
@@ -84,6 +75,8 @@ Group: Productivity/Networking/NFS
Requires: keyutils
Requires: netcfg
Requires: rpcbind
# The statd user relies on 'nogroup' from system-user-nobody
Requires: system-user-nobody
Requires(post): %fillup_prereq
Requires(pre): permissions
Obsoletes: nfs-utils < 1.1.0
@@ -375,6 +368,7 @@ fi
%{_sbindir}/rpc.mountd
%{_sbindir}/rpc.nfsd
%{_sbindir}/nfsdcltrack
%{_sbindir}/nfsdctl
%{_sbindir}/nfsref
%attr(0755,root,root) %{_sbindir}/nfsdclddb
%attr(0755,root,root) %{_sbindir}/nfsdclnts
@@ -386,6 +380,7 @@ fi
%{_mandir}/man8/nfsref.8%{ext_man}
%{_mandir}/man8/rpc.mountd.8%{ext_man}
%{_mandir}/man8/rpc.nfsd.8%{ext_man}
%{_mandir}/man8/nfsdctl.8%{ext_man}
%{_mandir}/man8/nfsdcltrack.8%{ext_man}
%config(noreplace) %{_localstatedir}/lib/nfs/etab
%config(noreplace) %{_localstatedir}/lib/nfs/rmtab

View File

@@ -3,9 +3,8 @@
# NFS daemons and tools
# DO NOT MAKE CHANGES TO THIS FILE as they will
# be lost on the next software update. Make changes
# to /etc/sysconfig/nfs, /usr/src/nfs.conf./*.conf or
# /etc/nfs.conf.d/*.conf instead.
# The .conf file can include multiple sections, just
# to /etc/sysconfig/nfs or /etc/nfs.conf.local instead.
# /etc/nfs.conf.local can include multiple sections, just
# like this file.
[environment]
@@ -13,20 +12,77 @@ include = /etc/sysconfig/nfs
include = -/etc/nfs.conf.local
[general]
pipefs-directory=$RPC_PIPEFS_DIR
[gssd]
#
#[exportfs]
# debug=0
#
#[gssd]
# verbosity=0
# rpc-verbosity=0
# use-memcache=0
# use-machine-creds=1
# use-gss-proxy=0
avoid-dns=$NFS_GSSD_AVOID_DNS
# limit-to-legacy-enctypes=0
# context-timeout=0
# rpc-timeout=5
# keytab-file=/etc/krb5.keytab
# cred-cache-directory=
# preferred-realm=
#
[lockd]
port=$LOCKD_TCPPORT
udp-port=$LOCKD_UDPPORT
#
[mountd]
# debug=0
# manage-gids=n
# descriptors=0
port= $MOUNTD_PORT
# threads=1
# reverse-lookup=n
# state-directory-path=/var/lib/nfs
# ha-callout=
#
#[nfsdcltrack]
# debug=0
# storagedir=/var/lib/nfs/nfsdcltrack
#
[nfsd]
# debug=0
threads= $USE_KERNEL_NFSD_NUMBER
# host=
# port=0
grace-time=$NFSV4GRACETIME
lease-time=$NFSV4LEASETIME
# udp=n
# tcp=y
# vers2=n
vers3=$NFS3_SERVER_SUPPORT
vers4=$NFS4_SUPPORT
# vers4.0=y
# vers4.1=y
# vers4.2=y
# rdma=n
# rdma-port=20049
scope=$NFSD_SCOPE
#
[statd]
# debug=0
port=$STATD_PORT
# outgoing-port=0
name=$STATD_HOSTNAME
# state-directory-path=/var/lib/nfs/statd
# ha-callout=
# no-notify=0
#
#[sm-notify]
# debug=0
# force=0
# retry-time=900
# outgoing-port=
# outgoing-addr=
# lift-grace=y
#
#[svcgssd]
# principal=