Your message dated Tue, 09 Mar 2021 16:33:25 +0000 with message-id <[email protected]> and subject line Bug#846950: fixed in nfs-utils 1:1.3.4-5 has caused the Debian Bug report #846950, regarding nfs-common: RPCGSSDOPTS not replicated to /run/sysconfig/nfs-utils to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 846950: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=846950 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: nfs-common Version: 1:1.2.8-9.2 Severity: normal -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi, even though RPCGSSDOPTS is not documented or explicitly exposed in /etc/default/nfs-common, it’s used by the init script and I have been relying on it for a while. After switching to nfs-common -9.2 with the supplied systemd unit files I found RPCGSSDOPTS from rpc.gssd’s command line, since it’s not replicated by /usr/lib/systemd/scripts/nfs-utils_env.sh to /run/sysconfig/nfs-utils. Would it possible to add echo RPCGSSDARGS=\"${RPCGSSDOPTS:-}\" to the nfs-utils_env.sh script? Thanks! Sebastian - -- Package-specific info: - -- rpcinfo -- program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper - -- /etc/default/nfs-common -- If you do not set values for the NEED_ options, they will be attempted NEED_STATD=no STATDOPTS= NEED_IDMAPD=yes NEED_GSSD=yes RPCGSSDOPTS="-vvv" - -- /etc/idmapd.conf -- [General] Verbosity = 0 Pipefs-Directory = /run/rpc_pipefs Domain = yath.de [Mapping] Nobody-User = nobody Nobody-Group = nogroup - -- /etc/fstab -- fate.yath.de:/data /fate nfs noauto,x-systemd.automount,x-systemd.idle-timeout=600,x-systemd.device-timeout=10,_netdev,user,vers=4,sec=krb5p,nofail - -- /proc/mounts -- - -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.8.4+ (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages nfs-common depends on: ii adduser 3.115 ii init-system-helpers 1.45 ii keyutils 1.5.9-9 ii libc6 2.24-5 ii libcap2 1:2.25-1 ii libcomerr2 1.43.3-1 ii libdevmapper1.02.1 2:1.02.133-1 ii libevent-2.0-5 2.0.21-stable-2.1 ii libgssapi-krb5-2 1.15~beta1-1 ii libk5crypto3 1.15~beta1-1 ii libkeyutils1 1.5.9-9 ii libkrb5-3 1.15~beta1-1 ii libmount1 2.28.2-1 ii libnfsidmap2 0.25-5 ii libtirpc1 0.2.5-1 ii libwrap0 7.6.q-25 ii lsb-base 9.20161101 ii rpcbind 0.2.3-0.5 ii ucf 3.0036 Versions of packages nfs-common recommends: ii python 2.7.11-2 Versions of packages nfs-common suggests: ii open-iscsi 2.0.874-1 pn watchdog <none> - -- Configuration Files: /etc/default/nfs-common changed [not included] - -- no debconf information -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJYRDCbAAoJEPhx3EthBlqje+cP/2TJvoZZizZ0MsOsIvYA9A0L GoE46tm4TN8w08BSWhgDt4mH7fT8GGLIuc3qNB7Ue3+4f9ytsp/22xFaBPDF5585 9vRtrlghRgYbHKxBmzonf1LTYzoJCeRTV/njIT/AXnHponKWihZF9drcfr5TLDJR vqbE1jvx4cvo/O/6hL+JAlPDP+tjVhlz1pW6Y5KufW9PAYgCsSUXAvEc38gwJ86R Gmp+fub210NeWOQNUOuAVtoKBNfpBUtoFs5wW7pxe7hPoz3icEqX1ZyyB0Fxky2L LcjfbBY1WpdgbcTHUxYmt/QJxfDUKZgfJrCdLe/qtVjnvdXk2eWqGTNk8cyL0Mwq 2NfLpdQaVP61imunKgGUZ56t5hevqbdyagY/DxIGR9dRtGb4ZjV5PJKP6MsckLdL hAyTM7wPv5EFGucq1EbNzeG3VXFqyFKSBT8MS+zwi0TuVKSkx3QqZH8XvPAwOXeZ +IzcQgf60L2148JqShGSenxZoBLpirFvmkFGnzDJSmFmluMGCVuci1F2spGZU2JR fdWRuFJWvd7rOpcftDgHfxn2ojE9RuAE80Yqz1tJX45SI0rGm0ShgQvkQSYmfh7X ac9UM1bm4RQTvr6SCmUkwKZ+g07T3+lenAG1gcbIO8snJpnx5BOGcFajY7vdMN/U ohVaW/Idw4AlRvZ2giec =VlIm -----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---Source: nfs-utils Source-Version: 1:1.3.4-5 Done: Salvatore Bonaccorso <[email protected]> We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <[email protected]> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 09 Mar 2021 17:17:42 +0100 Source: nfs-utils Architecture: source Version: 1:1.3.4-5 Distribution: unstable Urgency: medium Maintainer: Debian kernel team <[email protected]> Changed-By: Salvatore Bonaccorso <[email protected]> Closes: 846950 Changes: nfs-utils (1:1.3.4-5) unstable; urgency=medium . [ Felix Lechner ] * Propagate $RPCGSSDOPTS from /etc/default/nfs-common to the system service script for rpc-gssd. (Closes: #846950) Checksums-Sha1: 5012ccad3266ffcdc4a55d99e0075f98ac3828d5 2448 nfs-utils_1.3.4-5.dsc 7f770a1d345686bd1b71eb52372c431d48b983ef 51176 nfs-utils_1.3.4-5.debian.tar.xz Checksums-Sha256: 110e095f85f6dfcb61141faf944db9ddcff42ff611f3eb8b05e948d17c1acbbe 2448 nfs-utils_1.3.4-5.dsc 48112dfde4aab0dfff65cb307575b1d5b97fc532edc495c64d37dcec5eccac81 51176 nfs-utils_1.3.4-5.debian.tar.xz Files: 1d0f7c85991d36d78c0505074a785d16 2448 net optional nfs-utils_1.3.4-5.dsc c41d41072d62e477a565f72cf237f53f 51176 net optional nfs-utils_1.3.4-5.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmBHoLZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EB08P/3tWvAgzWw4htSGi6mlgiXsCAQ/IRvrX ZnNvwXQCu6s9QQ20tJHLE3Pq9BGKyup4q6riL+eUgO8tJw3EUkvB33SaeUsHCnBO 0hBdRC5og+S5Acn2R/+exabpBPMjxiNkTfiZsvCwaf+MW6uTgvxq6AToi/KP2dau W1wCYJ4eFgM711O2Aaw7EiEXK1/qBpueXZJMV+y67BJpn1uZwXUo48PLSLQ92Piw L3zQ8781gfGXKenkKoHRIm+LbUdtWDHty9SW9muNS4l10OAYABMAWIUsyOyr70dZ vgcpfsxpDQhS5EcLAO23aDPsuttXJpG3KRrDdO9G94RmS/LB0hVwQhBZ3bRtE+Cu NyBUeOJYhoTpk01I2dC72QSwcB4WVTvcTGp5Q6JyxBJFNSGSEZCd2LbPf1Xjqk2l sLYysxyyfyiEE75JCTmQAHKgZW3gVv5Ukm+xZx+bIqO+LFIhAbDSH4EiRFDmwC3q +fkoOmxQKC7seVTeKqLQJ2UoV7Bd0XcfIa4dOUqQx3kBnRRvIxsEoEOXX4lX/ycd OdcOlqoy1yP8WYMoYqnxFCU3iFvMuOetQu7OEOKT5gb/CGyd/VXsb5iPf/dhWsEp fkTJyKRXGWOM0UJeDoNItkyPttSh6QW8t+CgKWWyOaUPUwNOr2BsyUJ7W6RqVFtm 1bSrPy/Y0TXs =Ym4E -----END PGP SIGNATURE-----
--- End Message ---

