Your message dated Sat, 19 Mar 2022 17:12:54 +0100
with message-id <b014b7b69916a0ec7d6be880e13980d478b4a75a.ca...@decadent.org.uk>
and subject line Re: Bug#847557: nfs-utils updated to 1.3.4-1, please check
your bug #847557
has caused the Debian Bug report #847557,
regarding /usr/sbin/exportfs: exportfs cannot handle IPv6 addresses
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
847557: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847557
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.8-9.2
Severity: important
File: /usr/sbin/exportfs
Tags: ipv6
Dear Maintainer,
when trying to export/unexport a path i cannot give IPv6 addresses to
exportfs.
# showmount -e
Export list for testhost:
/path/sub fe80::%eth0/10
# exportfs -u [fe80::%eth0]/10:/path/sub
exportfs: Invalid exporting option: [fe80
When removing the [] i get the same error (without [)
When using something like 2001:0db8:1234::/64 the same error occurs.
-- Package-specific info:
-- rpcinfo --
program vers proto port service
100000 4 tcp 111 portmapper
100000 3 tcp 111 portmapper
100000 2 tcp 111 portmapper
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100005 1 udp 59414 mountd
100005 1 tcp 55223 mountd
100005 2 udp 44480 mountd
100005 2 tcp 53745 mountd
100005 3 udp 41426 mountd
100005 3 tcp 55737 mountd
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100227 2 tcp 2049
100227 3 tcp 2049
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100227 2 udp 2049
100227 3 udp 2049
100021 1 udp 37459 nlockmgr
100021 3 udp 37459 nlockmgr
100021 4 udp 37459 nlockmgr
100021 1 tcp 34145 nlockmgr
100021 3 tcp 34145 nlockmgr
100021 4 tcp 34145 nlockmgr
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS="--manage-gids"
NEED_SVCGSSD=""
RPCSVCGSSDOPTS=""
-- /etc/exports --
/path/sub
fe80::%eth0/10(rw,no_subtree_check,no_root_squash)
-- System Information:
Debian Release: stretch/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable-debug'), (500,
'testing-debug'), (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'),
(500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.7.0-1-amd64 (SMP w/24 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages nfs-kernel-server depends on:
ii init-system-helpers 1.46
ii keyutils 1.5.9-9
ii libblkid1 2.29-1
ii libc6 2.24-7
ii libcap2 1:2.25-1
ii libsqlite3-0 3.15.2-1
ii libtirpc1 0.2.5-1
ii libwrap0 7.6.q-25
ii lsb-base 9.20161125
ii netbase 5.3
ii nfs-common 1:1.2.8-9.2
ii ucf 3.0036
nfs-kernel-server recommends no packages.
nfs-kernel-server suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Version: 1:1.3.4-1
On Thu, 15 Dec 2016 14:45:04 +0100 Bjoern Laessig
<b.laes...@pengutronix.de> wrote:
> On Do, 2016-12-15 at 14:15 +0100, Daniel Pocock wrote:
> > Thanks for providing a bug report for nfs-utils.
> > https://bugs.debian.org/847557
> > - if you have time to test the new package, […]
>
> Trying the package from sid (1:1.3.4-1):
>
> # exportfs [2001:0db8:1234::]/64:/path/sub
> # showmount -e localhost
> Export list for localhost:
> /path/sub 2001:0db8:1234::/64
> # exportfs -u [2001:0db8:1234::]/64:/path/sub
>
>
> The bug is fixed in nfs-kernel-server version 1:1.3.4-1
Thank you for checking; I'm now closing the bug report.
Ben.
--
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein
signature.asc
Description: This is a digitally signed message part
--- End Message ---