Your message dated Sat, 21 Dec 2024 17:17:10 +0000 with message-id <e1tp36e-009zmx...@fasolo.debian.org> and subject line Bug#1035908: fixed in nfs-utils 1:2.6.2-4+deb12u1 has caused the Debian Bug report #1035908, regarding regression from bullseye: NFS4 referals appear not to work to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1035908: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035908 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---package: nfs-utils severity: important justification: regression from bullseye with silent failure version: 1:2.6.2-4 Hi. I've noticed that since upgrading to bookworm the refer option in /etc/exports appears to be entirely ignored. Looking through the sources to exportd and support/export/cache.c, it looks like perhaps referals support in exports is keyed on --enable-junctions. I'm not entirely sure of that, but it looks like write_fsloc is only called in dump_to_cache if HAVE_JUNCTION_SUPPORT is enabled. I *think* write_fsloc is what writes out the referal location as well as any junction location. So, I *think* that as part of adding the junction support upstream has broken referals unless you enable junction support. That's kind of unfortunate for us because junction support comes with dependencies like libxml2 which are kind of a lot to swallow in nfs-utils. I'd appreciate help confirming my conclusions. * Are referals actually broken * Is there an easy way to get them back without junction support * how willing to turn on junction support are we in bookworm? In a bookworm backport?
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: nfs-utils Source-Version: 1:2.6.2-4+deb12u1 Done: Salvatore Bonaccorso <car...@debian.org> We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1035...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <car...@debian.org> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 11 Dec 2024 15:00:17 +0100 Source: nfs-utils Architecture: source Version: 1:2.6.2-4+deb12u1 Distribution: bookworm Urgency: medium Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <car...@debian.org> Closes: 1035908 1083098 Changes: nfs-utils (1:2.6.2-4+deb12u1) bookworm; urgency=medium . * debian/salsa-ci.yml: Set release to bookworm * d/salsa-ci.yml: Suppress aliased-location lintian errors * exports: Fix referrals when --enable-junction=no (Closes: #1083098, #1035908) Checksums-Sha1: 5aab537a26f904c475f604fe077c16e8fd9843c0 2586 nfs-utils_2.6.2-4+deb12u1.dsc 4b758bed09c9b706f74b5c912fbc221852ac9814 54068 nfs-utils_2.6.2-4+deb12u1.debian.tar.xz Checksums-Sha256: b06d0436fea322312c89a457d545aadd17264bd26e5df4e35868079430042212 2586 nfs-utils_2.6.2-4+deb12u1.dsc a53f043b43d447aa647cc51bcbb38774ebef78a8c5716583b7ad4a3832e29330 54068 nfs-utils_2.6.2-4+deb12u1.debian.tar.xz Files: 040ef474b62b53cc777dfe59ec5650c3 2586 net optional nfs-utils_2.6.2-4+deb12u1.dsc df8e3cc3c32af825a0f67e58e7a67c9a 54068 net optional nfs-utils_2.6.2-4+deb12u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmdZm3FfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EUP0P/08KHgXKSN8pPvqqK6Jn9t+ib/pp2jGo awGf0VGFPLLB+Ya69pMS+PEfZ+dNThAbneD9Uz9inaFmwmfFQsi5ff0f5X7ZL9rf 15qLB+8R+OOwaMXAN9haurVUVbnnn88WeM9r4ZabhB7OtU0KSg9eZQeClupRw9Ji wYtNH4A2HGEZE84lUgsl1Gll2+18bz8XgpjYeDRbupDB9ghaVHtbr2bKXb+77CGu UKGanQ6TfzKvoKhuwCKhUxiEK6P1RPn9R1pVQBRUiSCGxCaYL4Iwf6XJR61DWDvn ZwnR9lojit58Wn6mG4zpLonNeD9iI174R8hnVvH5Ihs1c+p9O+Cy0tC3XVEB8gSk az3ri3bM/WU9acDZYQ48Z2vE+vv9QifQsxxCdT2uY/hk62olb/NEJaL/yhrPQw93 7Ah+elicvbAYFOiJSaDTwEri1BIbrok3qzojDUja6Nwr5K+0MIqUmyV5MqStKhAB oH8ES4hBJYp5k8uT1RQiSvxvHfIILHOq5BSkA5EVV3qaquWsOnbdRher5NVKRUD1 dRzZWzEG1x3LTczJju+RfqI/weBd6WIEH1xzSPkjkC3DKi1rWZpcX+pkLX7Emeau kWd93IfL5lyye9FI0hWbJbA209IOMCwOXEQPdb25udpev4QCm8waUpeQQt0v+o3t 7AT0YFloFwgj =joE0 -----END PGP SIGNATURE-----
pgpwQQZ_2CLGA.pgp
Description: PGP signature
--- End Message ---