Message ID | 20210322072827.1456-1-adolf.belka@ipfire.org |
---|---|
State | Accepted |
Commit | 0422f3fc5230c29cb8dce6b4f8b71c26998c5071 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4F3mMD30sRz40Qq for <patchwork@web04.haj.ipfire.org>; Mon, 22 Mar 2021 07:28:40 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4F3mM70qzyz5QN; Mon, 22 Mar 2021 07:28:35 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4F3mM66vnzz2ycj; Mon, 22 Mar 2021 07:28:34 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4F3mM5709Tz2xd1 for <development@lists.ipfire.org>; Mon, 22 Mar 2021 07:28:33 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4F3mM054l5z5Pm; Mon, 22 Mar 2021 07:28:28 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1616398108; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=JqWuvaP6ime2d0j8cop4qhlFP+zx1h2NCSAaoL25oqE=; b=wAZWTKbxYuJLHswe9Jmbck4zBGh52AOpaBgDybEOG3aUE9DXK12kb7u0wruwYZNNhsebIv eCATFQPl1lLxcrAQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1616398108; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=JqWuvaP6ime2d0j8cop4qhlFP+zx1h2NCSAaoL25oqE=; b=ACDPQec2XfIdStPtfHdO9av/nZk/mrXUYIfVF4bOBYcnuAlAxLypFFQzM2QJ/zoXgZjMuW 7sgzoxwVCQm+TMesvjRTA7gITTvhM6CdI6UNPICt7+/7Hbo+tHuMa82de4Da0RhiVqnxsi e1+HjGghD34Lc1Rp0sdBWaWhUphPELycxVzrKqQqnUffpxkFByovxq3Ba2cRGQkU+LlGrq uzGrrLgfK20/tF9EC0ZmbbPVwpyxY/6aG7j7DA1Ny8s4K9zutrHGoZfD0q/7RJpI4sIzmf RQlGIN1w3bKHnMwvEBwR+XD6IDfRIq6a8huzUsKqfwqn46PswoR+R1ZeEdPw7w== From: Adolf Belka <adolf.belka@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH 1/4] nfs: Update to 2.5.3 Date: Mon, 22 Mar 2021 08:28:27 +0100 Message-Id: <20210322072827.1456-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Series |
[1/4] nfs: Update to 2.5.3
|
|
Commit Message
Adolf Belka
March 22, 2021, 7:28 a.m. UTC
- Update from 2.5.1 to 2.5.3
- No update to rootfile required
- Changelog
Changelog for each version has around 500 lines so there is too much to
put here. The full change logs for each version can be found at
https://sourceforge.net/projects/nfs/files/nfs-utils/
Two bug fixes in 2.5.2 and four in 2.5.3 as follows
Author: Steve Dickson <steved@redhat.com>
Date: Tue Feb 2 11:02:47 2021 -0500
mount: fix parsing of default options
A recent patch to change configfile.c to use parse_opt.c contained code
which was intended to remove all "default*" options from the list before
that could be passed to the kernel. This code didn't work, so default*
options WERE passed to the kernel, and the kernel complained and failed
the mount attempt.
A more recent patch attempted to fix this by not including the
"default*" options in the option list at all. This resulting in
global-default defaults over-riding per-mount or per-server defaults.
This patch reverse the "more recent" patch, and fixes the original patch
by providing correct code to remove all "default*" options before the
kernel can see them.
Fixes: 88c22f924f1b ("mount: convert configfile.c to use parse_opt.c")
Fixes: 8142542bda28 ("mount: parse default values correctly")
Author: Steve Dickson <steved@redhat.com>
Date: Wed Jan 6 13:12:12 2021 -0500
mount: parse default values correctly
Commit 88c22f92 converted the configfile.c routines
to use the parse_opt interfaces which broke how
default values from nfsmount.conf are managed.
Default values can not be added to the mount string
handed to the kernel. They must be interpreted into
the correct mount options then passed to the kernel.
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1912877
Author: Steve Dickson <steved@redhat.com>
Date: Mon Nov 9 14:34:15 2020 -0500
nfs-v4client.target: NFSv4 only client target.
To allow v4 only clients, create an systemd
nfs-client target that does not "Wants" a
rpc-statd notify
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1886634
Author: Steve Dickson <steved@redhat.com>
Date: Fri Sep 4 14:15:53 2020 -0400
rpc.idmapd: Do not free config variables
Commit 93e8f092e added a conf_cleanup() call to clean
up memory after the config file was parsed. It turns
out that memory still needed and it is not very much
so the call is removed.
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1873965
Author: Steve Dickson <steved@redhat.com>
Date: Wed Aug 5 14:59:23 2020 -0400
rpc.idmapd: Turn down the verbosity in flush_inotify()
Commit 27a8e146 introduce a debugging message
that was not cover by a check if verbose
is set, which cause a large number of message
to be logged on every kerberos mount
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1867172
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
lfs/nfs | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/lfs/nfs b/lfs/nfs index 3e2f56b7e..55accfb28 100644 --- a/lfs/nfs +++ b/lfs/nfs @@ -24,7 +24,7 @@ include Config -VER = 2.5.1 +VER = 2.5.3 THISAPP = nfs-utils-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -32,7 +32,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = nfs -PAK_VER = 14 +PAK_VER = 15 DEPS = libnfsidmap rpcbind @@ -44,7 +44,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = d14294d5efcd9aada28f4dab871a44a6 +$(DL_FILE)_MD5 = dd8100f51bf838f2a396c86163c9a0e3 install : $(TARGET)