mirror of
https://git.openafs.org/openafs.git
synced 2025-01-18 23:10:58 +00:00
retire-cat-pages-20051213
These can go now that we have POD versions of, in most cases, newer versions of the same documentation.
This commit is contained in:
parent
f64a78e701
commit
5d2b5780c4
@ -1,69 +0,0 @@
|
||||
ftpd (AFS version) AFS Commands ftpd (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
ftpd (AFS version) -- initialize Internet File Transfer
|
||||
|
||||
Protocol server.
|
||||
|
||||
|
||||
/usr/etc/ftpd [-d] [-l] [-ttimeout]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Functions like the standard UNIX ftpd, except that it also
|
||||
authenticates the issuer of the ftp command (who is
|
||||
presumably working on a remote machine) with the
|
||||
Authentication Server in the local cell (the home cell of
|
||||
the machine where ftpd is running). The authentication is
|
||||
based on the user name and password provided at the ftp
|
||||
prompts on the remote machine. The Cache Manager on the
|
||||
machine running ftpd stores the newly created token,
|
||||
identifying it by PAG rather than by the user's UNIX UID.
|
||||
|
||||
The issuer of ftp may be working in a foreign cell, as long
|
||||
as the user name and password provided are valid in the cell
|
||||
where ftpd is running.
|
||||
|
||||
If the user name under which ftp is issued does not exist in
|
||||
the Authentication Database for the cell where ftpd is
|
||||
running, or the issuer provides the wrong password, then
|
||||
ftpd logs the user into the UNIX file system of the machine
|
||||
where ftpd is running. The success of this local login
|
||||
depends on the user name appearing in the local password
|
||||
file and on the user providing the correct local password.
|
||||
In the case of a local login, AFS server processes consider
|
||||
the issuer of ftp to be anonymous.
|
||||
|
||||
In the configuration recommended by Transarc Corporation,
|
||||
the AFS version of ftpd is substituted for the standard
|
||||
version (only one of the versions can run at a time). The
|
||||
administrator then has two choices:
|
||||
|
||||
- name the binary for the AFS version something like
|
||||
ftpd.afs, leaving the standard version as ftpd.
|
||||
Change inetd.conf to refer to ftpd.afs; the
|
||||
standard version is not referenced.
|
||||
|
||||
- name the binary for the AFS version ftpd and
|
||||
rename the binary for the standard version to
|
||||
something like ftpd.old. No change to inetd.conf
|
||||
is necessary, but it is not as obvious that the
|
||||
standard version of ftpd is no longer in use.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
See the UNIX manual page for ftpd.
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
See the UNIX manual page for ftpd.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
UNIX manual page for ftp
|
||||
|
||||
UNIX manual page for ftpd
|
@ -1,163 +0,0 @@
|
||||
inetd (AFS version) AFS Commands inetd (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
inetd (AFS version) -- initialize Internet service daemon.
|
||||
|
||||
|
||||
/etc/inetd [-d] [<configfile>]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Functions like the standard UNIX inetd in invoking an
|
||||
Internet service daemon (itself called "inetd") that handles
|
||||
remotely-issued commands. The AFS inetd enables users of
|
||||
the remote services it supports to access those services as
|
||||
authenticated AFS users, provided that the supported
|
||||
services are also AFS versions capable of passing AFS tokens
|
||||
(authentication information). Examples of supported
|
||||
services are rcp and rsh.
|
||||
|
||||
AFS inetd can service the standard UNIX versions of the
|
||||
remote services, but it is instead recommended that the
|
||||
standard UNIX version of inetd be run in parallel with the
|
||||
AFS version. Name the AFS version something like inetd.afs
|
||||
and use it to service requests from AFS-modified programs;
|
||||
use standard inetd to service requests from standard UNIX
|
||||
programs. This separation requires using two different
|
||||
inetd.conf files, as described in the
|
||||
REQUIREMENTS/RESTRICTIONS section.
|
||||
|
||||
REQUIREMENTS/RESTRICTIONS
|
||||
|
||||
Several configuration changes are necessary for token
|
||||
passing to work correctly with the AFS version of inetd.
|
||||
There may be other UNIX-based requirements/restrictions not
|
||||
mentioned here; consult the UNIX manual page. (One
|
||||
important restriction is that there can be no blank lines in
|
||||
the configuration file other than at the end.)
|
||||
|
||||
The requirements/restrictions include the following. They
|
||||
assume that inetd.afs is running in parallel with standard
|
||||
inetd.
|
||||
|
||||
- For token passing to work, the request must come
|
||||
from the AFS version of the remote service (such
|
||||
as AFS rcp or AFS rsh). If the remote service is
|
||||
the standard UNIX version, it will not pass
|
||||
tokens. The issuer of the remote command is
|
||||
authenticated only in the local UNIX file system,
|
||||
not with AFS, so the AFS server processes in the
|
||||
local cell consider the issuer to be anonymous.
|
||||
|
||||
- The machine's reboot configuration file (/etc/rc
|
||||
or equivalent) should be altered so that it starts
|
||||
both standard inetd and inetd.afs.
|
||||
|
||||
- An AFS-specific inetd.conf file, perhaps called
|
||||
inetd.conf.afs, should exist alongside the
|
||||
standard one. When initializing inetd.afs,
|
||||
specify this configuration file rather than the
|
||||
standard one.
|
||||
|
||||
Each line in the inetd.conf.afs file must include
|
||||
|
||||
|
||||
|
||||
an additional field, fifth from the left, to
|
||||
specify the identity under which the program is to
|
||||
run. The normal choice is "root." The following
|
||||
sample shows the only lines that should appear in
|
||||
this file:
|
||||
|
||||
ta-rauth stream tcp nowait root internal
|
||||
shell stream tcp nowait root /usr/etc/r
|
||||
login stream tcp nowait root /usr/etc/r
|
||||
|
||||
Substitute appropriate values for the binary
|
||||
locations and names on the shell and login lines.
|
||||
Include the login line only if the AFS version of
|
||||
login is also in use in the cell; otherwise, refer
|
||||
to login in the standard inetd.conf instead. In
|
||||
addition, if the inetd.cond.afs file is used on a
|
||||
machine with a Sun system type, change rshd to
|
||||
in.rshd and change rlogind.afs to in.rlogind.afs
|
||||
on the shell and login lines, respectively.
|
||||
|
||||
- The standard inetd.conf (referred to by the
|
||||
standard inetd) should be altered: comment out the
|
||||
shell line and, if the AFS version of login is in
|
||||
use in the cell, the login line. References to
|
||||
these programs appear in inetd.conf.afs instead.
|
||||
Retain the login line if AFS login is not being
|
||||
used. Alter the ftp line to refer to the AFS
|
||||
version of ftpd, if it was substituted for the
|
||||
standard version. Do not insert the extra fifth
|
||||
column into standard inetd.conf if it does not
|
||||
already appear there. See the EXAMPLE section
|
||||
below for an illustration.
|
||||
|
||||
- The following two lines must appear in the
|
||||
/etc/services file on the machine running inetd
|
||||
(as well as on the machine running modified rcp or
|
||||
rsh). On NeXT machines, this information must
|
||||
appear in the NetInfo database rather than in
|
||||
/etc/services.
|
||||
|
||||
auth 113/tcp authentication
|
||||
ta-rauth 601/tcp rauth
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
See the UNIX manual page for inetd.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following are sample inetd.conf.afs and inetd.conf
|
||||
files, appropriate for use when inetd.afs is running in
|
||||
parallel with standard inetd and AFS login is being used in
|
||||
the cell. Changes to standard inetd.conf include
|
||||
referencing the AFS version of the ftpd binary and
|
||||
commenting out shell and login. The example inetd.conf does
|
||||
not include the extra fifth column. Do not use these
|
||||
examples without modifying them appropriately for the local
|
||||
machine type or cell.
|
||||
|
||||
|
||||
|
||||
# AFS version of Internet server configuration datab
|
||||
#(EXAMPLE ONLY)
|
||||
#
|
||||
ta-rauth stream tcp nowait root internal
|
||||
shell stream tcp nowait root /usr/etc/rshd
|
||||
login stream tcp nowait root /usr/etc/rlogind.afs
|
||||
|
||||
|
||||
|
||||
# Standard version of Internet server configuration
|
||||
#(EXAMPLE ONLY)
|
||||
#
|
||||
ftp stream tcp nowait /etc/ftpd.afs ftpd
|
||||
telnet stream tcp nowait /etc/telnetd teln
|
||||
#shell stream tcp nowait /etc/rshd rshd
|
||||
#login stream tcp nowait /etc/rlogind rlog
|
||||
finger stream tcp nowait /usr/etc/fingd fing
|
||||
uucp stream tcp nowait /etc/uucpd uucp
|
||||
exec stream tcp nowait /etc/rexecd rexe
|
||||
comsat dgram udp wait /etc/comsat coms
|
||||
talk dgram udp wait /etc/talkd talk
|
||||
ntalk dgram udp wait /usr/etc/ntalkd talk
|
||||
time dgram udp wait /etc/miscd time
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
See the UNIX manual page for inetd.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
rcp (AFS version)
|
||||
|
||||
rsh (AFS version)
|
||||
|
||||
UNIX manual page for inetd
|
@ -1,204 +0,0 @@
|
||||
login (AFS version) AFS Commands login (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
login (AFS version) -- login to AFS and UNIX file systems.
|
||||
|
||||
|
||||
login [<user name>]
|
||||
|
||||
Authenticates the issuer with the AFS Authentication Server
|
||||
in the local cell and logs him or her into the local
|
||||
machine's UNIX file system. More precisely, AFS login:
|
||||
|
||||
- creates a new "process authentication group" (PAG)
|
||||
associated with the issuer and the command shell
|
||||
where the command is issued. A PAG is a number
|
||||
guaranteed to identify the issuer uniquely to the
|
||||
local Cache Manager. The Cache Manager uses the
|
||||
PAG, instead of the issuer's UNIX UID, to identify
|
||||
him or her in the credential structure that it
|
||||
creates to track each user.
|
||||
|
||||
- authenticates the user with the AFS Authentication
|
||||
Server and obtains a "token"; the other AFS server
|
||||
processes in the cell accept the token as partial
|
||||
proof that the user is a legitimate AFS user. The
|
||||
Cache Manager stores the token in the credential
|
||||
structure along with the PAG, and presents it to
|
||||
AFS server processes as necessary.
|
||||
|
||||
- logs the user into the local UNIX file system
|
||||
|
||||
The lifetime of the token resulting from this command is the
|
||||
smallest of the following:
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
"afs" entry in the Authentication Database. The
|
||||
default is 100 hours. Administrators can inspect
|
||||
this value using kas examine, and change it using
|
||||
kas setfields.
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
issuer's Authentication Database entry. The
|
||||
default is 25 hours for user entries created by
|
||||
the AFS 3.1 or later version of the Authentication
|
||||
Server, and 100 hours for user entries created by
|
||||
the AFS 3.0 version of the Authentication Server.
|
||||
Administrators and the user himself/herself can
|
||||
inspect this value using kas examine, and
|
||||
administrators can change it using kas setfields.
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
"krbtgt.CELLNAME" entry in the Authentication
|
||||
Database; this entry corresponds to the ticket-
|
||||
granting ticket used internally in generating the
|
||||
token. The default is 720 hours (30 days).
|
||||
|
||||
If none of these defaults have been changed, then the
|
||||
standard token lifetime is 25 hours for users whose
|
||||
Authentication Database entries were created by the AFS 3.1
|
||||
or later version of the Authentication Server, and 100 hours
|
||||
for users whose Authentication Database entries were created
|
||||
by the AFS 3.0 version of the Authentication Server. The
|
||||
|
||||
|
||||
|
||||
user can issue klog to request a token with a different
|
||||
lifetime.
|
||||
|
||||
Using a PAG instead of the UNIX UID to distinguish users has
|
||||
two advantages.
|
||||
|
||||
- It means that processes spawned by the user
|
||||
inherit the PAG and so share the token; thus they
|
||||
gain access to AFS as the authenticated user.
|
||||
This is important in many environments where, for
|
||||
example, printer and other daemons run under
|
||||
identities (such as "root") that the AFS server
|
||||
processes recognize only as anonymous. Unless
|
||||
PAGs are used, such daemons cannot access
|
||||
information in directories protected against
|
||||
system:anyuser.
|
||||
|
||||
- It closes a potential security loophole: UNIX
|
||||
allows anyone already logged in as "root" on a
|
||||
machine to assume any other identity by issuing
|
||||
su. If the credential structure were identified
|
||||
by a UNIX UID rather than a PAG, then assuming the
|
||||
same UID would mean being able to use the token,
|
||||
too. Use of a PAG as an identifier eliminates
|
||||
that possibility.
|
||||
|
||||
The process of authenticating with the AFS Authentication
|
||||
Server is as follows:
|
||||
|
||||
1. The login program checks the user's entry in the
|
||||
local /etc/passwd file.
|
||||
|
||||
If no entry exists, or if an asterisk ( * )
|
||||
appears in the password field, the login attempt
|
||||
fails.
|
||||
|
||||
If the entry exists, the attempt proceeds to step
|
||||
LOGIN.PAG.
|
||||
|
||||
2. The login program invokes the command that
|
||||
creates a PAG.
|
||||
|
||||
3. The login program converts the password provided
|
||||
by the user into an encryption key and encrypts a
|
||||
packet of data with the key. It sends the packet
|
||||
to an AFS Authentication Server. The
|
||||
Authentication Server decrypts the packet and,
|
||||
depending on the success of the decryption,
|
||||
judges the password to be correct or incorrect.
|
||||
(Consult the AFS System Administrator's Guide for
|
||||
more information on the "mutual authentication"
|
||||
procedure used to verify the password in this
|
||||
step.)
|
||||
|
||||
If the Authentication Server judges the password
|
||||
incorrect, the user does not receive an AFS
|
||||
token. The attempt proceeds to step LOGIN.LOCAL.
|
||||
If the Authentication Server judges the password
|
||||
correct, it issues a token to the user as proof
|
||||
of AFS authentication. The login program also
|
||||
logs the user into the local UNIX file system.
|
||||
|
||||
|
||||
|
||||
Step LOGIN.LOCAL is skipped.
|
||||
|
||||
4. If no AFS token was granted in step 3, the login
|
||||
programattempts to log the user into the local
|
||||
UNIX file system, by comparing the password
|
||||
provided to the local password file (/etc/passwd,
|
||||
for instance).
|
||||
|
||||
If the provided password is incorrect, or the
|
||||
password field in the local password file
|
||||
contains anything other than a 13-character
|
||||
UNIX-encrypted password string, then the login
|
||||
attempt fails.
|
||||
|
||||
If the password is correct, the user is logged
|
||||
into the local UNIX file system only. (The
|
||||
success of this attempt and the failure of the
|
||||
AFS authentication implies that the AFS and local
|
||||
passwords are different and that the issuer
|
||||
provided the latter.)
|
||||
|
||||
WARNINGS
|
||||
|
||||
Each PAG uses two of the memory slots that the kernel uses
|
||||
to record the UNIX groups associated with a user. If none
|
||||
of these slots are available, the PAG creation fails. The
|
||||
use of two group slots per PAG does not present a problem
|
||||
with most operating systems, which make at least 16 slots
|
||||
available.
|
||||
|
||||
The AFS version of login is based on the Berkeley 4.3
|
||||
Distribution and does not include the modified features
|
||||
included in some proprietary versions of login.
|
||||
|
||||
The AFS version of login works only on machines that have
|
||||
run afsd.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
See the UNIX manual page for login. The AFS version does
|
||||
not impose any stronger restrictions on acceptable user
|
||||
names than does the UNIX file system.
|
||||
|
||||
OUTPUT
|
||||
|
||||
To distinguish the AFS version of login from other versions,
|
||||
one of the following banners appears on standard out
|
||||
(stdout) when the command executes successfully.
|
||||
|
||||
AFS 3.0 Login
|
||||
|
||||
or
|
||||
|
||||
AFS 3.2 (R) Login
|
||||
|
||||
Various error messages appear if the login attempt is not
|
||||
successful. The "login:" prompt normally returns following
|
||||
the error messages, giving the user another chance to type
|
||||
the password correctly.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
|
||||
|
||||
None.
|
||||
|
||||
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
rlogind (AFS version)
|
||||
|
||||
UNIX manual page for login
|
@ -1,134 +0,0 @@
|
||||
rcp (AFS version) AFS Commands rcp (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
rcp (AFS version) -- copy file on remote machine.
|
||||
|
||||
|
||||
+
|
||||
rcp [-p] <file1> <file2> rcp [-r] [-p] <file> <directory>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Functions like the standard UNIX rcp, except it allows the
|
||||
issuer to use the remote machine's Cache Manager to access
|
||||
AFS files as an authenticated AFS user. The command passes
|
||||
a copy of the AFS token which the issuer obtained on the
|
||||
local machine to the remote machine's Cache Manager. The
|
||||
remote Cache Manager can use the token to gain authenticated
|
||||
access to AFS.
|
||||
|
||||
Token passing is most effective if both the remote machine
|
||||
and local machine belong to the same cell, because rcp can
|
||||
pass only one token even if the user has several tokensMit
|
||||
passes the token that is marked [1] in the output from the
|
||||
tokens command. If the remote and local machine are not in
|
||||
the same cell, the possibilities are:
|
||||
|
||||
- the token passed is for the cell to which the
|
||||
remote machine belongs. The issuer accesses the
|
||||
remote cell's AFS file tree as an authenticated
|
||||
AFS user, but is considered anonymous in the local
|
||||
cell. This means that the issuer can only
|
||||
exercise the access rights granted to
|
||||
system:anyuser in the local AFS file tree. For
|
||||
instance, a file being copied into the local cell
|
||||
can only be copied into a UNIX directory or an AFS
|
||||
directory where system:anyuser has the INSERT
|
||||
right.
|
||||
|
||||
- the token passed is for the cell to which the
|
||||
local machine belongs. The issuer accesses the
|
||||
remote cell's AFS file tree as anonymous, and so
|
||||
can only exercise the access rights granted to
|
||||
system:anyuser.
|
||||
|
||||
In addition to running the AFS version of the rcp binary on
|
||||
the machine where the rcp command is issued, other
|
||||
configuration changes are necessary for token passing to
|
||||
work properly. See the REQUIREMENTS/RESTRICTIONS section
|
||||
for a list.
|
||||
|
||||
The AFS version of rcp is compatible with the standard
|
||||
inetd, but token passing works only if the AFS versions of
|
||||
both programs are being used. If only one of them is
|
||||
modified, the issuer will access AFS files through the
|
||||
remote machine as anonymous.
|
||||
|
||||
WARNINGS
|
||||
|
||||
AFS rcp does not allow "third party copies", in which
|
||||
neither source nor target file is on the current machine.
|
||||
Standard UNIX rcp claims to provide this functionality.
|
||||
|
||||
The protections required on the .rhosts file in order for
|
||||
|
||||
|
||||
|
||||
token passing to work with this command (see the
|
||||
REQUIREMENTS/RESTRICTIONS section) are the opposite of those
|
||||
necessary for token creation to work with the AFS version of
|
||||
rlogind.
|
||||
|
||||
For security's sake, use the AFS version of rcp only in
|
||||
conjunction with PAGs, either by using the AFS version of
|
||||
login or always issuing pagsh before obtaining tokens.
|
||||
|
||||
REQUIREMENTS/RESTRICTIONS
|
||||
|
||||
Several configuration requirements and restrictions are
|
||||
necessary for token passing to work correctly with the AFS
|
||||
version of rcp. Some of these are also necessary with the
|
||||
standard UNIX version, but are included here because the
|
||||
issuer accustomed to AFS protections may not consider them.
|
||||
There may be other UNIX-based requirements/restrictions not
|
||||
mentioned here; consult the UNIX manual page. (One
|
||||
important one is that no stty commands may appear in the
|
||||
issuer's shell initialization file, such as .cshrc.)
|
||||
|
||||
The requirements/restrictions for token passing include the
|
||||
following.
|
||||
|
||||
- The local machine must be running the AFS version
|
||||
of rcp, with the rcp binary file locally installed
|
||||
to grant setuid privilege to the owner, "root".
|
||||
|
||||
- The remote machine must be running the AFS version
|
||||
of inetd.
|
||||
|
||||
- The following two lines must appear in the
|
||||
/etc/services file on the local machine (as well
|
||||
as on the remote machine running modified inetd).
|
||||
On NeXT machines, this information must appear in
|
||||
the NetInfo database rather than in /etc/services.
|
||||
|
||||
auth 113/tcp authentication
|
||||
ta-rauth 601/tcp rauth
|
||||
|
||||
- If rcp is to consult an .rhosts file on the remote
|
||||
machine, the file must have UNIX protections no
|
||||
more liberal than -rw-r--r--. If .rhosts resides
|
||||
in a user home directory in AFS, the home
|
||||
directory must also grant the LOOKUP and READ
|
||||
rights to system:anyuser.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
Consult the UNIX manual page for rcp.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
inetd (AFS version)
|
||||
|
||||
UNIX manual page for rcp
|
||||
|
||||
rlogind (AFS version)
|
||||
|
||||
|
||||
|
||||
tokens
|
@ -1,91 +0,0 @@
|
||||
rlogind (AFS version) AFS Commands rlogind (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
rlogind (AFS version) -- initialize remote login server.
|
||||
|
||||
|
||||
/etc/rlogind
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Functions like the standard UNIX rlogind, except that it is
|
||||
appropriate only for cells using the AFS version of the
|
||||
login program supplied by Transarc Corporation.
|
||||
|
||||
The AFS modifications to rlogind are strictly internal and
|
||||
are necessary so that remote AFS authentication is possible
|
||||
with the rlogin command. When a user issues rlogin, the AFS
|
||||
version of rlogind running on the remote machine invokes the
|
||||
AFS version of login; the user therefore obtains AFS tokens
|
||||
on the remote machine.
|
||||
|
||||
In the configuration recommended by Transarc Corporation,
|
||||
the AFS version of rlogind is substituted for the standard
|
||||
versionMbut only if the AFS version of login is also being
|
||||
used in the cell. (Only one version of rlogind can run on a
|
||||
machine at a time.) The administrator then has two choices:
|
||||
|
||||
- name the binary for the AFS version something like
|
||||
rlogind.afs, leaving the standard version as
|
||||
rlogind. Refer to rlogind.afs in inetd.conf.afs
|
||||
(the AFS version of inetd.conf), and comment out
|
||||
the reference to standard rlogind in standard
|
||||
inetd.conf.
|
||||
|
||||
- name the binary for the AFS version rlogind and
|
||||
rename the binary for the standard version to
|
||||
something like rlogind.old. Refer to rlogind in
|
||||
inetd.conf.afs (the AFS version of inetd.conf),
|
||||
and comment out the reference to rlogind in
|
||||
standard inetd.conf.
|
||||
|
||||
WARNINGS
|
||||
|
||||
The AFS version of rlogind is not available for the AIX
|
||||
2.2.1 operating system. (AIX 2.2.1 does not include the
|
||||
standard rlogind either.)
|
||||
|
||||
Do not install the AFS version of rlogind if the AFS version
|
||||
of login is not being used in the cell.
|
||||
|
||||
Remote AFS authentication is possible with rlogin only if
|
||||
|
||||
EITHER no .rhosts file exists on the machine where rlogind
|
||||
is running
|
||||
|
||||
OR .rhosts exists on the machine where rlogind is running, b
|
||||
has mode bits more liberal than -rw-r--r--. If .rhosts has
|
||||
mode bits as restrictive as -rw-r--r--, then rlogind logs th
|
||||
issuer of the remote rlogin command into the local UNIX file
|
||||
system without prompting for a password. The issuer does no
|
||||
tokens (authenticate with AFS), because that requires provid
|
||||
password. The user can, however, obtain tokens by issuing p
|
||||
|
||||
|
||||
|
||||
and klog after establishing the connection.
|
||||
|
||||
The protection required on .rhosts for token creation to
|
||||
work properly are exactly opposite those necessary for the
|
||||
AFS versions of rcp and rsh to handle tokens properly. The
|
||||
recommended solution is to configure .rhosts so that rcp and
|
||||
rsh work properly and to use telnet instead of rlogin.
|
||||
|
||||
No modifications to rlogin itself are necessary for AFS
|
||||
authentication to work.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
See the UNIX manual page for rlogind.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
login (AFS version)
|
||||
|
||||
rcp (AFS version)
|
||||
|
||||
UNIX manual page for rlogind
|
||||
|
||||
rsh (AFS version)
|
@ -1,109 +0,0 @@
|
||||
rsh (AFS version) AFS Commands rsh (AFS version)
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
rsh (AFS version) -- open shell on remote machine.
|
||||
|
||||
|
||||
rsh host [-l <username>] [-n] <command> host [-l
|
||||
<username>] [-n] <command>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Functions like the standard UNIX rsh, except that it allows
|
||||
the issuer to execute commands on the remote machine as an
|
||||
authenticated AFS user. The command passes a copy of the
|
||||
AFS token that the issuer has obtained on the local machine
|
||||
to the remote machine's Cache Manager. The remote Cache
|
||||
Manager can use the token to have the issuer recognized as
|
||||
an authenticated AFS user.
|
||||
|
||||
Token passing is most effective if both the remote machine
|
||||
and local machine belong to the same cell, because rsh can
|
||||
pass only one token even if the user has severalMit passes
|
||||
the token that is marked [1] in the output from the tokens
|
||||
command. If the remote and local machine are not in the
|
||||
same cell, the token should be for the cell to which the
|
||||
remote machine belongs, so that the remote cell's server
|
||||
processes will recognize the issuer as authenticated.
|
||||
|
||||
In addition to running the AFS version of the rsh binary on
|
||||
the machine where the rsh command is issued, other
|
||||
configuration changes are necessary for token passing to
|
||||
work properly. See the REQUIREMENTS/RESTRICTIONS section
|
||||
for a list.
|
||||
|
||||
The AFS version of rsh is compatible with the standard
|
||||
inetd, but token passing only works if the AFS versions of
|
||||
both programs are being used. If only one of them is
|
||||
modified, the issuer will access AFS files through the
|
||||
remote machine as anonymous.
|
||||
|
||||
WARNINGS
|
||||
|
||||
The protections required on the .rhosts file for token
|
||||
passing to work correctly with this command (see the
|
||||
REQUIREMENTS/RESTRICTIONS section) are the opposite of those
|
||||
necessary for token creation to work correctly with the AFS
|
||||
version of rlogind.
|
||||
|
||||
For security's sake, use the AFS version of rsh only in
|
||||
conjunction with PAGs, either by using the AFS version of
|
||||
login or always issuing pagsh before obtaining tokens.
|
||||
|
||||
REQUIREMENTS/RESTRICTIONS
|
||||
|
||||
Several configuration requirements and restrictions are
|
||||
necessary for token passing to work correctly with the AFS
|
||||
version of rsh. Some of these are also necessary with the
|
||||
standard UNIX version, but are included here because the
|
||||
issuer used to AFS protections may not be inclined to think
|
||||
of them. There may be other UNIX-based
|
||||
requirements/restrictions not mentioned here; consult the
|
||||
UNIX manual page. (One important one is that no stty
|
||||
|
||||
|
||||
|
||||
commands may appear in the issuer's shell initialization
|
||||
file, such as .cshrc.)
|
||||
|
||||
The requirements/restrictions for token passing include the
|
||||
following.
|
||||
|
||||
- The local machine must be running the AFS version
|
||||
of rsh, with the binary file locally installed to
|
||||
grant setuid privilege to the owner, "root".
|
||||
|
||||
- The remote machine must be running the AFS version
|
||||
of inetd.
|
||||
|
||||
- The following two lines must appear in the
|
||||
/etc/services file on the local machine (as well
|
||||
as on the remote machine running modified inetd).
|
||||
On NeXT machines, this information must appear in
|
||||
the NetInfo database rather than in /etc/services.
|
||||
|
||||
auth 113/tcp authentication
|
||||
ta-rauth 601/tcp rauth
|
||||
|
||||
- If rsh is to consult an .rhosts file on the remote
|
||||
machine, the file must have UNIX protections no
|
||||
more liberal than -rw-r--r--. If .rhosts resides
|
||||
in a user home directory in AFS, the home
|
||||
directory must also grant the LOOKUP and READ
|
||||
rights to system:anyuser.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
Consult the UNIX manual page for rsh.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
inetd (AFS version)
|
||||
|
||||
UNIX manual page for rsh
|
||||
|
||||
rlogind (AFS version)
|
||||
|
||||
tokens
|
462
src/man/afsd.1
462
src/man/afsd.1
@ -1,462 +0,0 @@
|
||||
afsd AFS Commands afsd
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
afsd -- initialize Cache Manager and start related
|
||||
|
||||
daemons.
|
||||
|
||||
|
||||
afsd [-blocks <number of cache blocks>] [-files <number of
|
||||
cache files>]
|
||||
[-stat <number of status cache entries>] [-rootvol <root
|
||||
volume>]
|
||||
[-cachedir <cache directory>] [-mountdir <AFS mount
|
||||
directory>]
|
||||
[-verbose] [-debug] [-nosettime]
|
||||
[-daemons <number of background daemons>] [-rmtsys]
|
||||
[-memcache] [-dcache <# entries>] [-chunksize <chunk
|
||||
exponent>]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites. Therefore, "afsd" and all switches and
|
||||
flags must be typed in full.
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the Cache Manager on an AFS client machine by
|
||||
transferring AFS-related configuration information into
|
||||
kernel memory and starting several daemons. More
|
||||
specifically, afsd
|
||||
|
||||
- sets a field in kernel memory that defines which
|
||||
cell the machine belongs to. Some Cache
|
||||
Manager-internal operations and system calls
|
||||
consult this field to learn which cell to execute
|
||||
in. (The AFS command interpreters refer to
|
||||
/usr/vice/etc/ThisCell instead.)
|
||||
|
||||
This information is transferred into the kernel
|
||||
from the file /usr/vice/etc/ThisCell and cannot be
|
||||
changed until afsd runs again.
|
||||
|
||||
- places in kernel memory the names and Internet
|
||||
addresses of the database server machines in the
|
||||
local cell and (optionally) foreign cells. The
|
||||
appearance of a cell's database server machines in
|
||||
this list enables the Cache Manager to contact
|
||||
them and so to access files in the cell. Omission
|
||||
of a cell from this list, or incorrect information
|
||||
about its database server machines, prevents the
|
||||
Cache Manager from accessing files in it.
|
||||
|
||||
This information is transferred into the kernel
|
||||
from the file /usr/vice/etc/CellServDB. After
|
||||
initialization, use the fs newcell command to
|
||||
change the kernel-resident list without having to
|
||||
reboot.
|
||||
|
||||
- determines whether the cache is on disk or in
|
||||
machine memory. The default is to use a disk
|
||||
cache. If the -memcache argument is provided,
|
||||
|
||||
|
||||
|
||||
space is allocated in machine memory for caching,
|
||||
and disk space is not used even if the machine has
|
||||
a disk.
|
||||
|
||||
- defines the name of the local disk directory
|
||||
devoted to caching, when -memcache is not used.
|
||||
If necessary, afsd creates the directory (as long
|
||||
as its parent directory exists). It does not
|
||||
remove from the disk the directory that formerly
|
||||
served this function, if any.
|
||||
|
||||
The second field in the file
|
||||
/usr/vice/etc/cacheinfo is the source for this
|
||||
name, and the standard value is /usr/vice/cache.
|
||||
Use the -cachedir argument to override the value
|
||||
from cacheinfo.
|
||||
|
||||
- sets the size of the cache, for both disk and
|
||||
memory caches.
|
||||
|
||||
The afsd program consults the third field in the
|
||||
file /usr/vice/etc/cacheinfo to learn the default
|
||||
cache size in kilobyte blocks. The value should
|
||||
not exceed 90% to 95% of the disk space available
|
||||
on the cache partition (with a disk cache) or of
|
||||
the machine's memory (with a memory cache). This
|
||||
is because the cache implementation itself
|
||||
requires a small amount of disk or machine memory.
|
||||
|
||||
For either a disk or memory cache, use the -blocks
|
||||
argument to override the value from cacheinfo.
|
||||
|
||||
For a memory cache, the issuer can also override
|
||||
the cacheinfo value by providing either
|
||||
|
||||
* both -dcache and -chunksize, to set both
|
||||
number of dcache entries and chunk size (see
|
||||
below for definition of these parameters).
|
||||
In this case, afsd derives cache size
|
||||
(overriding the cacheinfo value) by
|
||||
multiplying the two values. Using this
|
||||
combination is not recommended, as it
|
||||
requires the issuer to perform the
|
||||
calculation beforehand to determine the
|
||||
resulting cache size.
|
||||
|
||||
* -dcache by itself. In this case, afsd derives
|
||||
cache size (overriding the cacheinfo value)
|
||||
by multiplying -dcache by the default chunk
|
||||
size of 8 kilobytes. Using this argument is
|
||||
not recommended, as it requires the issuer to
|
||||
perform the calculation beforehand to
|
||||
determine the resulting cache size.
|
||||
|
||||
For a disk cache, the value defined in cacheinfo
|
||||
or with -blocks is an absolute upper limit on
|
||||
cache size; values provided for other arguments
|
||||
cannot result in a larger cache.
|
||||
|
||||
After initialization, use fs setcachesize to
|
||||
change the size of a disk cache without having to
|
||||
|
||||
|
||||
|
||||
reboot; the value set with that command is
|
||||
overridden the next time afsd runs. The
|
||||
fs setcachesize command does not work for memory
|
||||
caches. Instead, the machine must be rebooted.
|
||||
|
||||
- sets the size of each "chunk" of data in the
|
||||
cache, and by implication the amount of data that
|
||||
the Cache Manager requests at a time from the File
|
||||
Server (how much data per "fetch" RPC, since AFS
|
||||
uses partial file transfer).
|
||||
|
||||
For a disk cache, each chunk is called a "V file",
|
||||
so this parameter sets the maximum size of each V
|
||||
file; the default is 64 kilobytes. See below for
|
||||
more on V files.
|
||||
|
||||
For a memory cache, each chunk is a collection of
|
||||
memory blocks allocated together, so this sets the
|
||||
size of each collection; the default is 8
|
||||
kilobytes.
|
||||
|
||||
For both types of cache, use the -chunksize
|
||||
argument to change the default chunk size. To
|
||||
guarantee proper chunk sizes, the integer provided
|
||||
is used as an exponent on the number 2; see the
|
||||
ARGUMENTS section for details. For a memory
|
||||
cache, if total cache size divided by chunk size
|
||||
leaves a remainder, afsd rounds down the number of
|
||||
dcache entries. resulting in a slightly smaller
|
||||
cache (see below for more on dcache entries).
|
||||
|
||||
- sets the number of empty "V files" created in the
|
||||
cache directory for a disk cache. Each file is a
|
||||
cache chunk, and the Cache Manager caches data in
|
||||
them as needed. By default, each "V" file can
|
||||
accommodate up to 64 kilobytes of data, since 64
|
||||
kilobytes is the default size of a disk cache
|
||||
chunk.
|
||||
|
||||
A memory cache cannot use V files because it does
|
||||
not use disk memory; instead the number of chunks
|
||||
is equivalent to the number of "dcache entries"
|
||||
(see below).
|
||||
|
||||
The default number of V files is 1000; use the
|
||||
-files argument to override it. Since by default
|
||||
each V file can accommodate 64 kilobytes, the only
|
||||
reason to increase from the default of 1000 is if
|
||||
the cache size is greater than about 64 megabytes
|
||||
(or the chunk size has been changed with the
|
||||
-chunksize argument discussed above).
|
||||
|
||||
- sets the number of "dcache entries" allocated in
|
||||
machine memory for storing information about the
|
||||
chunks in the cache.
|
||||
|
||||
With a disk cache, the file
|
||||
/usr/vice/cache/CacheItems on disk contains one
|
||||
entry for each V file. Some of the CacheItems
|
||||
entries, by default 100, are duplicated as dcache
|
||||
entries in machine memory for quicker access.
|
||||
|
||||
|
||||
|
||||
With a memory cache, there is no CacheItems file,
|
||||
so all information about cache chunks must be in
|
||||
memory as dcache entries. There must be one
|
||||
dcache entry for each cache chunk, so for a memory
|
||||
cache number of dcache entries equals number of
|
||||
cache chunks. There is no default number of
|
||||
dcache entries for a memory cache; instead, afsd
|
||||
derives it by dividing cache size by chunk size.
|
||||
|
||||
Use the -dcache argument to set the number of
|
||||
dcache entries. This is not recommended for
|
||||
either type of cache. Increasing the number of
|
||||
dcache entries for a disk cache may improve
|
||||
performance marginally because more entries are
|
||||
retrieved from memory rather than from disk, but
|
||||
is not generally necessary. Using this argument
|
||||
is not recommended for a memory cache because it
|
||||
requires the issuer to pre-calculate cache size by
|
||||
multiplying this value times chunk size (either
|
||||
the default 8 kilobytes or the value of
|
||||
-chunksize).
|
||||
|
||||
- sets the number of "stat" entries available in
|
||||
machine memory for caching status information
|
||||
about cached AFS files.
|
||||
|
||||
The default is 300; use the -stat argument to
|
||||
override the default.
|
||||
|
||||
- defines the directory in the machine's file name
|
||||
space at which the AFS file tree is mounted.
|
||||
|
||||
The first field in the file
|
||||
/usr/vice/etc/cacheinfo is the source for the
|
||||
default directory name. The standard value is
|
||||
/afs. Use the -mountdir argument to override the
|
||||
value from cacheinfo.
|
||||
|
||||
- defines which volume corresponds to the root of
|
||||
the AFS file tree.
|
||||
|
||||
The default is root.afs; use the -rootvol argument
|
||||
to override it. Note that although the volume
|
||||
name should be given in the "base" (ReadWrite)
|
||||
form, the Cache Manager retains its bias for
|
||||
accessing the ReadOnly version of the volumeMin
|
||||
the default case, root.afs.readonlyMif it is
|
||||
available.
|
||||
|
||||
- randomly selects a file server machine in the
|
||||
local cell as the source for the "correct" time.
|
||||
Every five minutes thereafter, the local clock is
|
||||
adjusted (if necessary) to match the file server
|
||||
machine's clock.
|
||||
|
||||
Use the -nosettime flag to prevent afsd from
|
||||
selecting a time standard. This is recommended
|
||||
only on file server machines that are also acting
|
||||
as clients. File server machines maintain the
|
||||
correct time using the Network Time Protocol
|
||||
Daemon instead.
|
||||
|
||||
|
||||
|
||||
In addition to setting cache configuration parameters, afsd
|
||||
starts up the following three types of daemons. On most
|
||||
system types, these daemons appear as nameless entries in
|
||||
the output of the ps command:
|
||||
|
||||
- a "callback" daemon that handles callbacks. It
|
||||
also responds to the File Server's periodic
|
||||
probes, which check that the client machine is
|
||||
still alive.
|
||||
|
||||
- a "maintenance" daemon that performs routine
|
||||
periodic maintenance tasks, including
|
||||
|
||||
* performing garbage collection
|
||||
|
||||
* synchronizing files
|
||||
|
||||
* probing the fileserver process on file server
|
||||
machines every few minutes
|
||||
|
||||
* refreshing information from ReadOnly volumes
|
||||
once per hour
|
||||
|
||||
* doing delayed writes for NFS clients if the
|
||||
machine is running the NFS/AFS Translator
|
||||
|
||||
* keeping the machine's clock synchronized with
|
||||
the chosen file server machine's
|
||||
|
||||
- "background" daemons that improve performance by
|
||||
pre-fetching files and performing background
|
||||
(delayed) writes of saved data into AFS.
|
||||
|
||||
The default number of background daemons is 2,
|
||||
usually enough to handle up to 5 simultaneous
|
||||
users of the machine. Use the -daemons argument
|
||||
to increase the number of background daemons, if
|
||||
the machine serves more users. No more than 6
|
||||
background daemons should ever be necessary.
|
||||
|
||||
The default number of daemons is four (one callback daemon,
|
||||
one maintenance daemon, and two background daemons). The
|
||||
issuer can alter only the number of background daemons; afsd
|
||||
always initializes one callback daemon and one maintenance
|
||||
daemon.
|
||||
|
||||
AFS includes three configuration scripts that can be used to
|
||||
modify some Cache Manager parameters on a client machine
|
||||
that uses a disk cache. Named rc.afsd.small, rc.afsd.med,
|
||||
and rc.afsd.large, the configuration scripts specify
|
||||
suitable, predefined values for the afsd command's -stat,
|
||||
-dcache, -daemons, and -volumes switches. They define
|
||||
increasingly greater values for these switches according to
|
||||
the configuration and usage patterns of the client machine
|
||||
on which the afsd command is run. Refer to the AFS System
|
||||
Administrator's Guide for more information about the scripts
|
||||
and how to use them.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-blocks specifies the number of kilobyte blocks to be made
|
||||
|
||||
|
||||
|
||||
available for caching in the machine's cache
|
||||
directory (for a disk cache) or memory (for a
|
||||
memory cache), overriding the default defined in
|
||||
the third field of /usr/vice/etc/cacheinfo. It
|
||||
should not exceed 90% to 95% of the actual space
|
||||
available. If using a memory cache, do not
|
||||
combine this argument with -dcache, since doing so
|
||||
could result in a chunk size that was not an
|
||||
exponent of 2.
|
||||
|
||||
-files specifies the number of V files to be created in
|
||||
the cache directory for a disk cache, overriding
|
||||
the default of 1000. Each V file can accommodate
|
||||
a "chunk" of data, which for a disk cache is 64
|
||||
kilobytes by default. Thus the default of 1000 is
|
||||
adequate for any cache smaller than 64 megabytes
|
||||
(unless chunk size is changed with -chunksize).
|
||||
Do not combine this argument with -memcache.
|
||||
|
||||
-stat specifies the number of entries in the machine's
|
||||
memory for recording status information about the
|
||||
AFS files in the cache. This value overrides the
|
||||
default of 300.
|
||||
|
||||
-rootvol names the Read Write volume corresponding to the
|
||||
root directory for the AFS file tree (which is
|
||||
usually /afs). This value overrides the default
|
||||
of root.afs.
|
||||
|
||||
-cachedir names the local disk directory to be used as the
|
||||
cache. This value overrides the default defined
|
||||
in the second field of /usr/vice/etc/cacheinfo
|
||||
(typically, /usr/vice/cache).
|
||||
|
||||
-mountdir names the local disk directory on which to mount
|
||||
the AFS file tree. This value overrides the
|
||||
default defined in the first field of
|
||||
/usr/vice/etc/cacheinfo (typically, /afs). If
|
||||
/afs is not used, the machine cannot access the
|
||||
AFS global name space.
|
||||
|
||||
-daemons specifies the number of "background" daemons to
|
||||
run on the machine. These daemons improve
|
||||
efficiency by doing pre-fetching and background
|
||||
writing of saved data. This value overrides the
|
||||
default of 2, which is adequate for a machine
|
||||
serving up to five users. It does not change the
|
||||
number of "callback" or "maintenance" daemons,
|
||||
which is always one each.
|
||||
|
||||
-verbose causes afsd to produce a more detailed trace of
|
||||
its activities than the default one. The trace
|
||||
displays on standard out (stdout) unless it is
|
||||
piped into a file.
|
||||
|
||||
-debug causes afsd to produce a highly detailed trace of
|
||||
its activities, potentially useful to a developer
|
||||
for debugging purposes. The trace goes to
|
||||
standard output (stdout) by default.
|
||||
|
||||
-nosettime
|
||||
|
||||
|
||||
|
||||
prevents the machine from selecting at random a
|
||||
local file server machine to act as a source for
|
||||
the "correct" time. If this flag is omitted, the
|
||||
machine selects a file server machine as a time
|
||||
standard, and every five minutes thereafter
|
||||
adjusts its clock to avoid drifting from the
|
||||
standard.
|
||||
|
||||
-rmtsys initializes an additional "remote-system" daemon
|
||||
to execute AFS-specific system calls on behalf of
|
||||
NFS client machines. This flag is necessary only
|
||||
if the machine is an NFS/AFS translator machine,
|
||||
and if users on its NFS clients want to execute
|
||||
AFS commands.
|
||||
|
||||
-memcache causes afsd to initialize a memory cache rather
|
||||
than a disk cache. Do not combine this flag with
|
||||
-files.
|
||||
|
||||
-dcache sets the number of "dcache entries" in memory,
|
||||
which are used to store information about cache
|
||||
chunks. For a disk cache, this overrides the
|
||||
default of 100. For a memory cache, this argument
|
||||
effectively sets the number of cache chunks. Use
|
||||
of this argument is not recommended for a memory
|
||||
cache, because it requires the issuer to
|
||||
pre-calculate the resulting total cache size
|
||||
(derived by multiplying this value by chunk size).
|
||||
Do not combine this argument with -blocks, since
|
||||
doing so could result in a chunk size that was not
|
||||
an exponent of 2.
|
||||
|
||||
-chunksize
|
||||
sets the size of each cache chunk. The integer
|
||||
provided, which should be between 0 and 20, is
|
||||
used as an exponent on the number 2. It overrides
|
||||
16
|
||||
the default of 16 for a disk cache (2 is 64
|
||||
13
|
||||
kilobytes) and 13 for a memory cache (2 is 8
|
||||
kilobytes). A value of 0 or less, or greater than
|
||||
20, sets chunk size to the appropriate default.
|
||||
Values less than 10 (which sets chunk size to a
|
||||
10
|
||||
kilobyte, 2 ) are not recommended. Combining
|
||||
this argument with -dcache is not recommended
|
||||
because it requires that the issuer pre-calculate
|
||||
the cache size that results.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
This command is normally included in an initialization file
|
||||
such as /etc/rc, rather than typed at the command shell
|
||||
prompt. For most disk caches, the appropriate form is
|
||||
|
||||
/usr/vice/etc/afsd
|
||||
|
||||
The following is appropriate when enabling a machine to act
|
||||
as an NFS/AFS Translator machine serving more than five
|
||||
users.
|
||||
|
||||
/usr/vice/etc/afsd -daemons 4 -rmtsys
|
||||
|
||||
|
||||
|
||||
The following initializes a memory cache and sets chunk size
|
||||
14
|
||||
to 16 kilobytes (2 ).
|
||||
|
||||
/usr/vice/etc/afsd -memcache -chunksize 14
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged into the machine's UNIX file system as
|
||||
"root."
|
198
src/man/dkload.1
198
src/man/dkload.1
@ -1,198 +0,0 @@
|
||||
dkload AFS Commands dkload
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
dkload -- incorporate external libraries into kernel
|
||||
|
||||
without rebooting.
|
||||
|
||||
|
||||
dkload [-readonly] [-quiet] [-verbose] [-syscallResult
|
||||
<number>]
|
||||
[-path <object path>] [-ld_cmd <loader path>]
|
||||
[-as_cmd <assembler path>] [-nm_cmd <nm path>]
|
||||
[-libcommon <path>] [-kernel_alloc <path>]
|
||||
+
|
||||
[-name <library name>] [<library to incorporate> ]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites. Therefore, "dkload" must be typed in full
|
||||
and switches must always be included, though they may be
|
||||
shortened as indicated.
|
||||
|
||||
dkload [-r] [-q] [-v] [-s <number>] [-p <object path>]
|
||||
[-ld <loader path>]
|
||||
[-a <assembler path>] [-nm <nm path>] [-li <path>] [-k
|
||||
<path>]
|
||||
+
|
||||
[-na <library name>] [<library to incorporate> ]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Loads one or more libraries into the memory version of the
|
||||
local machine's kernel. It does not alter the disk version
|
||||
of the kernel (/vmunix or equivalent). Its intended use is
|
||||
loading the AFS routine library, lib.afs, into the kernel on
|
||||
client machines.
|
||||
|
||||
The dynamic loader begins by requesting (from a low-level
|
||||
kernel routine) allocation of a certain amount of memory in
|
||||
which to load the libraries. It resolves cross-references
|
||||
between procedures in the existing kernel and in the
|
||||
libraries (referred to as "linking" the two). The result is
|
||||
a list of memory addresses for the cross-referenced
|
||||
procedures, which the dynamic loader stores in a table. It
|
||||
generates an executable version of the libraries with
|
||||
correct addresses inserted for all of the necessary kernel
|
||||
variables and procedures, and loads the executable into the
|
||||
memory space allocated in the first phase.
|
||||
|
||||
REQUIREMENTS
|
||||
|
||||
The dkload binary file should be available in the current
|
||||
working directory, or the issuer must specify a pathname in
|
||||
the command name. The standard directory is
|
||||
/usr/vice/etc/dkload on client machines and
|
||||
/usr/afs/bin/dkload on file server machines.
|
||||
|
||||
The file kalloc.o should be available in the current working
|
||||
directory, or the issuer must specify a pathname with either
|
||||
the -kernel_alloc or -path argument. This file helps in the
|
||||
first phase of dynamic loading: allocating kernel memory
|
||||
|
||||
|
||||
|
||||
for the libraries. It is generated automatically during the
|
||||
compilation of the dkload program.
|
||||
|
||||
The file libcommon.a should be available in the current
|
||||
working directory, or the issuer must specify a pathname
|
||||
with either the -libcommon or -path argument. This file
|
||||
helps in the second phase of dynamic loading: resolving
|
||||
cross-references. It is generated automatically during the
|
||||
compilation of the dkload program.
|
||||
|
||||
The library file(s) to be loaded (such as lib.afs) should be
|
||||
available in the current working directory, or the issuer
|
||||
must use the -path argument to specify the correct path.
|
||||
|
||||
The binary files for the standard UNIX commands ld, as and
|
||||
nm should be available in a local disk directory included in
|
||||
the issuer's $PATH environment variable. Otherwise, the
|
||||
issuer needs to use the -ld_cmd, -as_cmd and/or -nm_cmd
|
||||
arguments to specify the correct pathname.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-readonly directs the command interpreter to report
|
||||
the actions it would perform if executing
|
||||
the command, rather than actually performing
|
||||
it.
|
||||
|
||||
-quiet suppresses the trace of actions that by
|
||||
default appears on standard output (stdout).
|
||||
|
||||
-verbose increases the amount of information in the
|
||||
trace that appears on standard output
|
||||
(stdout). Multiple instances of this flag
|
||||
may be provided, resulting (up to a certain
|
||||
point) in a increasing level of detail in
|
||||
the trace.
|
||||
|
||||
-syscallResult specifies the memory address at which
|
||||
allocation begins when the -readonly flag is
|
||||
provided. This is useful when the issuer
|
||||
wants to specify a memory address obtained
|
||||
during a previous aborted run of dkload.
|
||||
|
||||
Provide this argument only when using
|
||||
-readonly. The value may be either a large
|
||||
decimal or hexidecimal number (the latter
|
||||
beginning with 0x). If this flag is not
|
||||
provided, the value defaults to 0xc1456780,
|
||||
which may not be acceptable on all machine
|
||||
types but has the advantage that it causes
|
||||
allocation to begin well above the addresses
|
||||
used by standard libraries.
|
||||
|
||||
-path specifies the directory in which the command
|
||||
interpreter can find kalloc.o, libcommon.a
|
||||
and each library to be loaded, if they are
|
||||
not in the current working directory. The
|
||||
value of this argument is overridden by
|
||||
-kernel_alloc and -libcommon, or the
|
||||
pathnames given for each library to
|
||||
incorporate.
|
||||
|
||||
|
||||
|
||||
-ld_cmd specifies the pathname to the binary for the
|
||||
UNIX ld command, which the kernel dynamic
|
||||
loader uses during the linking phase.
|
||||
|
||||
This argument is necessary only if the
|
||||
issuer's $PATH environment variable will not
|
||||
lead to the correct binary file. The binary
|
||||
file cannot be in AFS, for instance, since
|
||||
the dynamic loader runs before the machine
|
||||
can access AFS.
|
||||
|
||||
-as_cmd specifies the pathname to the binary for the
|
||||
UNIX as command, which the kernel dynamic
|
||||
loader uses during the linking phase.
|
||||
|
||||
This argument is necessary only in the
|
||||
conditions specified under -ld_cmd.
|
||||
|
||||
-nm_cmd specifies the pathname to the binary for the
|
||||
UNIX nm command, which the kernel dynamic
|
||||
loader uses during the linking phase.
|
||||
|
||||
This argument is necessary only in the
|
||||
conditions specified under -ld_cmd.
|
||||
|
||||
-libcommon specifies the pathname of the libcommon.a
|
||||
file.
|
||||
|
||||
This argument is necessary only if the file
|
||||
does not reside in the current working
|
||||
directory or if the -path argument does not
|
||||
indicate the correct directory for it.
|
||||
|
||||
-kernel_alloc specifies the pathname of the kalloc.o file.
|
||||
|
||||
This argument is necessary only in the
|
||||
conditions specified under -libcommon.
|
||||
|
||||
-name specifies the variable part of the library
|
||||
name to be loaded: the command interpreter
|
||||
loads the library called
|
||||
"lib<library name>.a". For example, if
|
||||
<library name> is afs, then libafs.a gets
|
||||
loaded.
|
||||
|
||||
Provide this argument OR library to
|
||||
incorporate.
|
||||
|
||||
library to incorporate names each library to be incorporated
|
||||
into the kernel.
|
||||
|
||||
Provide this argument OR -name.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following loads in the AFS libraries. It assumes that
|
||||
all files can be found in the current directory or other
|
||||
expected place. The issuer desires extra trace information.
|
||||
|
||||
% dkload -verbose -name afs
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged into the machine's UNIX file system as
|
||||
"root" or at least have w access to /dev/mem and /dev/kmem.
|
@ -1,177 +0,0 @@
|
||||
fileserver AFS Commands fileserver
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fileserver -- initialize File Server component of fs
|
||||
|
||||
process.
|
||||
|
||||
|
||||
/usr/afs/bin/fileserver [-b <buffers>] [-banner] [-cb
|
||||
<callbacks>]
|
||||
[-d <debug level>] [-k <stack size>] [-l <large vnodes>]
|
||||
[-oldvldb] [-pctspare <percent>] [-rxdbg]
|
||||
[-rxdbge] [-rxpck]
|
||||
[-s <small vnodes>] [-spare <kilobyte blocks>]
|
||||
[-w <callback wait interval>]
|
||||
[-c <check interval>] [-ftpck <r ftp packets>] [-noauth]
|
||||
[-p <LWPs>] [-r <r retry count>] [-rpck <r
|
||||
packets
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the File Server component of the fs process.
|
||||
|
||||
The arguments on fileserver allow the issuer to control many
|
||||
aspects of its behavior, as detailed in the ARGUMENTS
|
||||
section.
|
||||
|
||||
Perhaps the most important aspect to control from an
|
||||
administrative standpoint is that by default the File Server
|
||||
allows users to store up to a megabyte (1024 kilobytes) of
|
||||
data in a volume after the volume's quota is exceeded. The
|
||||
user still cannot create new files after quota is exceeded.
|
||||
The issuer of this command can change the default with the
|
||||
-spare or -pctspare arguments:
|
||||
|
||||
- -spare specifies the number of kilobytes over
|
||||
quota the File Server will allow. To make users
|
||||
unable to store files after the quota is exceeded,
|
||||
specify a value of 0.
|
||||
|
||||
- -pctspare expresses the amount of excess the File
|
||||
Server will allow as a percentage of the volume's
|
||||
quota.
|
||||
|
||||
WARNING
|
||||
|
||||
This command is not normally issued at the command shell
|
||||
prompt, but rather placed into a file server machine's
|
||||
/usr/afs/local/BosConfig with the bos create command. If it
|
||||
is ever issued at the command shell prompt, the issuer must
|
||||
be working on a file server machine.
|
||||
|
||||
Several of this command's arguments are intended for use by
|
||||
AFS developers only. Changing them from their default
|
||||
values is strongly discouraged and may result in
|
||||
unpredictable File Server behavior. The relevant arguments
|
||||
are marked in the ARGUMENTS section.
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites, so the command and switch names must be
|
||||
typed in full.
|
||||
|
||||
Do not specify both -spare and -pctspare. Doing so causes
|
||||
|
||||
|
||||
|
||||
the File Server to exit, leaving an error message in
|
||||
/usr/afs/logs/FileLog.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-b sets the number of directory buffers, which are
|
||||
2 kilobytes each. Provide a positive integer.
|
||||
The default is 70.
|
||||
|
||||
-banner causes the File Server to prints the following
|
||||
banner to /dev/console about every 10 minutes.
|
||||
|
||||
File Server is running at time.
|
||||
|
||||
-cb sets the number of callbacks the File Server
|
||||
can track. Provide a positive integer. The
|
||||
default is 20,000.
|
||||
|
||||
-d sets the detail level for the debugging trace
|
||||
the File Server produces in
|
||||
/usr/afs/logs/FileLog. Provide a positive
|
||||
integer; higher values (up to a point) produce
|
||||
greater detail. The default level of 0
|
||||
produces no trace.
|
||||
|
||||
-k sets the LWP stack size in units of 1 kilobyte.
|
||||
Provide a positive integer. The default is 24
|
||||
(kilobytes). Do not set this argument lower
|
||||
than the default.
|
||||
|
||||
-l sets the number of large vnodes to use (for
|
||||
tracking directory elements). Provide a
|
||||
positive integer. The default is 200.
|
||||
|
||||
-oldvldb directs the File Server to use the pre-AFS 3
|
||||
volume location facility rather than the VLDB
|
||||
and VL Server.
|
||||
|
||||
-pctspare specifies the amount by which the File Server
|
||||
will allow a volume to exceed its quota, as a
|
||||
percentage of the quota. Provide an integer
|
||||
between 0 and 99. A value of 0 prevents the
|
||||
volume from ever exceeding its quota. Do not
|
||||
combine this argument with -spare.
|
||||
|
||||
-rxdbg sends an Rx debugging trace to the rx_dbg file
|
||||
in the current working directory.
|
||||
|
||||
-rxdbge sends an Rx event debugging trace to the rx_dbg
|
||||
file in the current working directory.
|
||||
|
||||
-rxpck sets the number of extra Rx packets to reserve.
|
||||
Provide a positive integer. The default is
|
||||
100. Do not use this argument; changing its
|
||||
default may cause unpredictable behavior.
|
||||
|
||||
-s sets the number of small vnodes to use (for
|
||||
tracking file elements). Provide a positive
|
||||
integer. The default is 200.
|
||||
|
||||
-spare specifies the number of extra kilobytes the
|
||||
|
||||
|
||||
|
||||
File Server will allow users to store in a
|
||||
volume after its quota is exceeded. Provide a
|
||||
positive integer. A value of 0 prevents the
|
||||
volume from ever exceeding its quota. Do not
|
||||
combine this argument with -pctspare.
|
||||
|
||||
-w sets the interval at which daemons spawned by
|
||||
the File Server perform their maintenance
|
||||
tasks. The default is 300 seconds (5 minutes).
|
||||
Do not use this argument; changing its default
|
||||
may cause unpredictable behavior.
|
||||
|
||||
-c is not implemented.
|
||||
|
||||
-ftpck is obsolete.
|
||||
|
||||
-noauth is obsolete.
|
||||
|
||||
-p is obsolete.
|
||||
|
||||
-r is obsolete.
|
||||
|
||||
-rpck is obsolete.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following bos create command creates an fs process on
|
||||
fs2.transarc.com that allows volumes to exceed their quota
|
||||
by 10%.
|
||||
|
||||
Type the command on a single line.
|
||||
|
||||
% bos create fs2.transarc.com fs fs "/usr/afs/bin/fileserver
|
||||
-pctspare 10"
|
||||
/usr/afs/bin/volserver /usr/afs/bin/salvager
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList to place this
|
||||
command in /usr/afs/local/BosConfig, because that is the
|
||||
privilege required to issue bos create.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos create
|
68
src/man/fs.1
68
src/man/fs.1
@ -1,68 +0,0 @@
|
||||
AFS Commands
|
||||
|
||||
1. The fs Commands
|
||||
|
||||
------------------------------------------------------------
|
||||
|
||||
This command defines the fs commands that users and system
|
||||
administrators employ to contact the File Server and to
|
||||
configure the Cache Manager. It assumes the reader is
|
||||
familiar with the concepts described in the AFS System
|
||||
Administrator's Guide.
|
||||
|
||||
Some fs commands extend UNIX file system semantics by
|
||||
invoking file-related functions that UNIX does not provide
|
||||
(setting access control lists, for example). Other fs
|
||||
commands help users control the performance of the Cache
|
||||
Manager running on their local client workstation. When
|
||||
using fs commands, pay particular attention to the kind of
|
||||
privilege required, as it varies from command to command.
|
||||
|
||||
Refer to the Command Summary at the end of this document for
|
||||
a complete list of fs commands and their syntax.
|
||||
|
||||
1.1 Common Arguments and Flags
|
||||
All fs commands accept the following optional flag. It is
|
||||
listed in the command descriptions and is described in
|
||||
detail here:
|
||||
|
||||
[-help]
|
||||
|
||||
This flag has the same function as the fs help command: It
|
||||
prints a command's online help message on the screen. No
|
||||
other arguments or flags should be provided at the same time
|
||||
as this flag. If they are, this flag overrides them, and
|
||||
the only effect of issuing the command is that the help
|
||||
message appears.
|
||||
AFS Command Reference Manual The fs Commands 2
|
||||
|
||||
|
||||
1.2 The Privileges Required for fs Commands
|
||||
The privileges required for fs commands vary more than those
|
||||
required for commands in other suites. Pay special
|
||||
attention to the PRIVILEGE REQUIRED section of each command
|
||||
description.
|
||||
|
||||
The various types of necessary privilege include
|
||||
|
||||
|
||||
- Having certain rights on a directory's access
|
||||
control list. For example, creating and removing
|
||||
mount points requires ADMINISTER, INSERT, and
|
||||
DELETE rights for the directory in which the mount
|
||||
point resides. Setting a directory's access
|
||||
control list requires certain rights, too.
|
||||
|
||||
- Being logged in as the super-user "root" in the
|
||||
UNIX file system of the machine on which the
|
||||
command is being issued. This is necessary when
|
||||
issuing commands that affect Cache Manager
|
||||
configuration.
|
||||
|
||||
- Belonging to the system:administrators group in
|
||||
the Protection Database. See the fs setvol
|
||||
command for an example.
|
||||
|
||||
- No privilege. Many fs commands simply list
|
||||
information and so do not require any special
|
||||
privilege.
|
@ -1,66 +0,0 @@
|
||||
fs apropos AFS Commands fs apropos
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs apropos -- show each help entry containing keyword.
|
||||
|
||||
|
||||
fs apropos -topic <help string> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs ap -t <help string> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line of the online help entry for any fs
|
||||
command that has help string in its name or short
|
||||
description.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic
|
||||
specifies the keyword string for which to search. If
|
||||
it is more than a single word, surround it with double
|
||||
quotes or other delimiters. This argument is
|
||||
case-sensitive; type help strings for fs commands in
|
||||
lowercase letters.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The first line of a command's online help entry names the
|
||||
command and briefly describes what it does. The fs apropos
|
||||
command displays that first line for any fs command where
|
||||
help string is part of the command name or first line.
|
||||
|
||||
To see the remaining lines in a help entry, which provide
|
||||
the command's alias (if any) and syntax, use the fs help
|
||||
command.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following lists all fs commands that have the word
|
||||
"cache" in their operation codes or short online
|
||||
descriptions:
|
||||
|
||||
% fs apropos -topic cache
|
||||
setcachesize: set cache size
|
||||
flush: flush file from cache
|
||||
getcacheparms: get cache usage info
|
||||
monitor: set cache monitor host address
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs help
|
@ -1,153 +0,0 @@
|
||||
fs checkservers AFS Commands fs checkservers
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs checkservers -- check status of file server machines.
|
||||
|
||||
|
||||
fs checkservers [-cell <cell to check>] [-all] [-fast]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs checks [-c <cell to check>] [-a] [-f] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Lists any file server machines in the indicated cell(s) that
|
||||
meet two conditions:
|
||||
|
||||
1. The Cache Manager has been in contact with the
|
||||
fileserver process running on the machine, and/or
|
||||
may need to contact it in future. (Reasons for
|
||||
wanting to contact a file server machine might
|
||||
include holding a callback from that machine or
|
||||
having locked files on it.)
|
||||
|
||||
2. The fileserver process on the machine is not
|
||||
currently responding to Cache Manager probes
|
||||
(implying that it is not responding to Cache
|
||||
Manager file requests either).
|
||||
|
||||
The Cache Manager constantly maintains a list of file server
|
||||
machines that meet the first condition, updating it every
|
||||
four to ten minutes by attempting to contact the fileserver
|
||||
process on each machine in the list. When a process does
|
||||
not respond to the probe, the Cache Manager marks it as
|
||||
non-functioning. If a machine that previously did not
|
||||
respond begins to respond again, the Cache Manager erases
|
||||
the "not functioning" mark.
|
||||
|
||||
This command forces the Cache Manager to update its
|
||||
information immediately (rather than waiting the standard
|
||||
interval). The Cache Manager probes the fileserver process
|
||||
on the machines in the specified cell that meet the first
|
||||
condition above, records those that do not respond, and
|
||||
reports the result. If the issuer includes the -fast flag,
|
||||
the Cache Manager outputs the list it already has at the
|
||||
time the command is issued instead of probing the machines
|
||||
again.
|
||||
|
||||
By default, the Cache Manager probes machines in the local
|
||||
cell only. If the -all flag is used, it probes all machines
|
||||
(from all cells) that meet the first condition. If a cell
|
||||
name is specified with -cell, The Cache Manager probes the
|
||||
machines in that cell only.
|
||||
|
||||
WARNING
|
||||
|
||||
It can take quite a while for this command to produce its
|
||||
entire output if a number of machines in the Cache Manager's
|
||||
list are in fact down when the command is issued. The delay
|
||||
is because after issuing the probe the Cache Manager waits a
|
||||
standard timeout period before concluding that the
|
||||
|
||||
|
||||
|
||||
fileserver is not responding; this allows for the
|
||||
possibility of slow cross-network communication. If it is
|
||||
important that the command shell prompt return quickly, the
|
||||
issuer may wish to put this command in the background. It
|
||||
is harmless to interrupt the command (with Ctrl-C or another
|
||||
interrupt signal).
|
||||
|
||||
This command is not guaranteed to check the status of all
|
||||
file server machines in a cell. The Cache Manager probes
|
||||
only those machines that meet the first condition mentioned
|
||||
above.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-cell specifies the complete name of the cell whose file
|
||||
server machines the Cache manager should probe
|
||||
(shortened forms are not acceptable). Provide this
|
||||
argument OR -all; it may be combined with -fast.
|
||||
|
||||
-all causes the Cache Manager to probe all machines that
|
||||
meet the first condition mentioned above. Provide
|
||||
this argument OR -cell; it may be combined with -fast.
|
||||
|
||||
-fast tells the Cache Manager to display its current list of
|
||||
down machines, rather than probing any machines. The
|
||||
displayed output may be up to 10 minutes old.
|
||||
|
||||
-dir is obsolete, but can still be provided on the
|
||||
command-line. Previous versions of this command
|
||||
required a directory argument. If the issuer includes
|
||||
it by accident, a warning message appears, but the
|
||||
command still executes correctly.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
If the Cache Manager gets a response from all of the
|
||||
machines that it probes (i.e., all such machines are
|
||||
functioning normally), the output is
|
||||
|
||||
All servers are running.
|
||||
|
||||
(Remember that this message does not imply that all file
|
||||
server machines in the cell are running. It reports the
|
||||
status of only those that the Cache Manager tries to probe.)
|
||||
|
||||
If a machine fails to respond to the Cache Manager's probe
|
||||
within the timeout period, the output displays its name.
|
||||
The format of a machine name (name in uppercase, name in
|
||||
lowercase, or Internet address in four-field decimal form)
|
||||
depends on the state of the local cell's name server at the
|
||||
time the command is issued.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
In the following example, the issuer chooses to see the
|
||||
Cache Manager's current list of down machines that belong to
|
||||
|
||||
|
||||
|
||||
the local cell, rather than waiting for it to probe them
|
||||
again. The output indicates that all machines responded to
|
||||
the previous probe.
|
||||
|
||||
% fs checks -f All servers are running.
|
||||
|
||||
The following example checks file server machines in all
|
||||
cells that the Cache Manager has previously contacted. It
|
||||
reports that the machines fs1.transarc.com and
|
||||
vice3.andrew.cmu.edu did not respond to the machine's probe.
|
||||
|
||||
% fs checkservers -all & These servers are still down:
|
||||
fs1.transarc.com VICE3.ANDREW.CMU.EDU
|
||||
|
||||
The following example checks machines in the athena.mit.edu
|
||||
cell only:
|
||||
|
||||
% fs checks athena.mit.edu & %All servers are running.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
@ -1,44 +0,0 @@
|
||||
fs checkvolumes AFS Commands fs checkvolumes
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs checkvolumes -- force Cache Manager to update volume-
|
||||
|
||||
related information.
|
||||
|
||||
|
||||
fs checkvolumes [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs checkv [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Forces the Cache Manager to discard its table of mappings
|
||||
between volume names and volumeID numbers. The Cache
|
||||
Manager needs the information in the table to fetch files,
|
||||
so this command will force it to fetch the most current
|
||||
information available at the File Server about a volume's
|
||||
contents before it can fetch any more files.
|
||||
|
||||
This command is most useful if the issuer knows that a
|
||||
volume's name has changed, or that there has been a release
|
||||
of new ReadOnly replicas, because issuing it forces the
|
||||
Cache Manager to reference the volume with the new name, or
|
||||
the new ReadOnly replica.
|
||||
|
||||
Normally the Cache Manager flushes the table and constructs
|
||||
a new one once per hour anyway.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
@ -1,83 +0,0 @@
|
||||
fs cleanacl AFS Commands fs cleanacl
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs cleanacl -- remove obsolete entries from access control
|
||||
|
||||
list.
|
||||
|
||||
|
||||
+
|
||||
fs cleanacl [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs cl [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Removes from the access control list of each specified
|
||||
directory or file any entries that specify a user or group
|
||||
no longer found in the Protection Database. When a
|
||||
user/group is removed from the Protection Database, its AFS
|
||||
UID appears on access control lists rather than its name.
|
||||
This command removes such "abandoned" AFS UIDs from access
|
||||
control lists.
|
||||
|
||||
Cleaning access control lists in this way not only keeps
|
||||
them from becoming crowded with irrelevant information, but
|
||||
also prevents the new possessor of a recycled AFS UID from
|
||||
obtaining access intended for the former possessor of the
|
||||
ID. (Note that recycling IDs is not recommended in any
|
||||
case.)
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies a file or directory for which the associated
|
||||
access control list is to be cleaned. If a filename
|
||||
is specified, the ACL of the file's parent directory
|
||||
is cleaned. If the issuer omits this switch, the
|
||||
current working directory is assumed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
If there are no obsolete AFS UIDs on the ACL, the following
|
||||
message appears:
|
||||
|
||||
Access list for directory is fine.
|
||||
|
||||
Otherwise, the output reports the resulting state of the
|
||||
ACL, following the header
|
||||
|
||||
Access list for directory is now
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
In the following example, the user pat cleans the ACL on the
|
||||
current directory and its subdirectories called reports and
|
||||
sources. The ACLs for the first two have no obsolete AFS
|
||||
UIDs on them, but sources does.
|
||||
|
||||
% fs cl . ./reports ./sources Access list for . is fine.
|
||||
Access list for ./reports is fine. Access list for
|
||||
./sources is now Normal rights: system:authuser rl
|
||||
pat rlidwka
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have ADMINISTER rights to the directory; by
|
||||
default, the owner of the directory and members of
|
||||
system:administrators do.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs listacl
|
@ -1,137 +0,0 @@
|
||||
fs copyacl AFS Commands fs copyacl
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs copyacl -- copy access control list from one directory
|
||||
|
||||
to one or more other directories.
|
||||
|
||||
|
||||
fs copyacl -fromdir <source directory>
|
||||
+
|
||||
-todir <destination directory>
|
||||
[-clear] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs co -f <source directory> -t <destination directory>
|
||||
[-c] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Copies the access control list (ACL) from the source
|
||||
directory to each destination directory. The command does
|
||||
not affect entries on the ACL of the source directory. It
|
||||
affects entries on the ACL of each destination directory as
|
||||
follows:
|
||||
|
||||
- If an entry is unique to the ACL of the source
|
||||
directory, it is copied to the ACL of the
|
||||
destination directory.
|
||||
|
||||
- If an entry exists on the ACLs of both
|
||||
directories, it is changed on the ACL of the
|
||||
destination directory to match the rights granted
|
||||
on the ACL of the source directory.
|
||||
|
||||
- If an entry is unique to the ACL of the
|
||||
destination directory and the -clear flag is
|
||||
omitted, the entry is not affected.
|
||||
|
||||
- If an entry is unique to the ACL of the
|
||||
destination directory and the -clear flag is
|
||||
included, the entry is removed.
|
||||
|
||||
Use the -clear flag to completely replace the ACL of each
|
||||
destination directory with that of the source directory.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-fromdir
|
||||
specifies the source directory whose ACL is to be
|
||||
copied to each destination directory. Abbreviated
|
||||
pathnames are interpreted relative to the directory in
|
||||
which the command is issued. If a filename is
|
||||
provided, the file's parent directory is used as the
|
||||
source directory.
|
||||
|
||||
-todir
|
||||
specifies one or more destination directories to
|
||||
receive the ACL from the source directory.
|
||||
Abbreviated pathnames are interpreted relative to the
|
||||
directory in which the command is issued. A filename
|
||||
|
||||
|
||||
|
||||
cannot be specified with this switch.
|
||||
|
||||
-clear
|
||||
removes all existing entries from the ACL of each
|
||||
destination directory before copying the ACL from the
|
||||
source directory. The ACL of each destination
|
||||
directory is thus completely replaced with the ACL of
|
||||
the source directory. If the issuer omits this flag,
|
||||
entries that exist on the ACL of a destination
|
||||
directory but not on the ACL of the source directory
|
||||
are not affected.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following example uses the fs copyacl command to copy
|
||||
the ACL from the current directory to the subdirectory named
|
||||
reports. Entries on the ACL of the current directory are
|
||||
not affected. Because the -clear option is not used,
|
||||
entries on the ACL of the reports directory that are not on
|
||||
the ACL of the current directory remain unaffected as well.
|
||||
|
||||
% fs la . reports
|
||||
Access list for . is
|
||||
Normal rights:
|
||||
pat rlidwka
|
||||
smith rlidwk
|
||||
|
||||
Access list for reports is
|
||||
Normal rights:
|
||||
pat rl
|
||||
pat:friends rl
|
||||
Negative rights
|
||||
jones rlidwka
|
||||
|
||||
% fs co . reports
|
||||
|
||||
% fs la . reports
|
||||
Access list for . is
|
||||
Normal rights:
|
||||
pat rlidwka
|
||||
smith rlidwk
|
||||
|
||||
Access list for reports is
|
||||
Normal rights:
|
||||
pat rlidwka
|
||||
pat:friends rl
|
||||
smith rlidwk
|
||||
Negative rights
|
||||
jones rlidwka
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have LOOKUP right to the source directory and
|
||||
ADMINISTER right to each destination directory. To issue
|
||||
the command with a filename used for source directory, the
|
||||
issuer must have both the LOOKUP and READ rights on the ACL
|
||||
of the file's parent directory.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs listacl
|
||||
|
||||
fs setacl
|
@ -1,110 +0,0 @@
|
||||
fs debug AFS Commands fs debug
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs debug -- enable/disable Cache Manager debugging trace.
|
||||
|
||||
|
||||
fs debug -debug <'on' or 'off'> [-dafs <afs debug level>]
|
||||
[-dnet <network debug level>] [-syslog] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs de -de <on> or <off> [-da <afs debug level>]
|
||||
[-dn <network debug level>] [-s] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Determines whether the Cache Manager records information
|
||||
about its activities that may prove helpful in debugging or
|
||||
other trouble-shooting. The output goes into the file
|
||||
/usr/vice/etc/AFSLog (unless an alternate directory or name
|
||||
is specified for the file with the -logfile switch of the
|
||||
afsd command). See the ARGUMENTS section for information
|
||||
about the different types of debugging output that can be
|
||||
written to the file.
|
||||
|
||||
You can use the more command (or an equivalent command such
|
||||
as the pg command on AIX systems) to read the debugging
|
||||
output recorded in the AFSLog file. You must be logged in
|
||||
as root on the machine on which the AFSLog file resides to
|
||||
read the file. Interpreting the output requires familiarity
|
||||
with the AFS source code.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-debug
|
||||
controls whether debugging information is produced.
|
||||
The legal values are on, which directs debugging
|
||||
information into the AFSLog file, and off, which stops
|
||||
the recording of information in the file.
|
||||
|
||||
-dafs determines the types of debugging information the
|
||||
Cache Manager produces about its activities. The
|
||||
following list describes the legal values for this
|
||||
switch and the type of debugging output each causes
|
||||
the Cache Manager to write to the AFSLog file:
|
||||
|
||||
- 1, which causes the Cache Manager to write
|
||||
standard debugging information. Using this
|
||||
value provides a good deal of general
|
||||
output.
|
||||
|
||||
- 2, which causes the Cache Manager to write
|
||||
low-level debugging information about the
|
||||
AFS network. Use this value only if you are
|
||||
convinced that network problems exist.
|
||||
|
||||
- 4, which causes the Cache Manager to write
|
||||
debugging information about the RX protocol.
|
||||
|
||||
- 8, which causes the Cache Manager to write
|
||||
debugging information about the interface
|
||||
layer to AFS. This value is not useful on
|
||||
|
||||
|
||||
|
||||
machines running a Sun operating system.
|
||||
|
||||
In addition, if a value of 1, 4, or 8 is specified,
|
||||
the Cache Manager also records in the AFSLog file the
|
||||
AFS UID of each user who accesses data from a file
|
||||
server machine. It records the appropriate AFS UID
|
||||
with each operation that accesses data.
|
||||
|
||||
The legal values can be added to specify different
|
||||
combinations of output. For example, a value of 15
|
||||
specifies that all possible types of output are to be
|
||||
provided. The default value of 1 is used if no value
|
||||
is specified.
|
||||
|
||||
Note: The AFSLog file also records the type of volume
|
||||
(ReadWrite, ReadOnly, or Backup) accessed from a file
|
||||
server machine. The type of the volume is displayed
|
||||
along with the volumeID in the "state" flag in bitmap
|
||||
form. If a ReadWrite volume is accessed, the bits are
|
||||
clear; if a ReadOnly volume is accessed, the 1 bit is
|
||||
set; if a Backup volume is accessed, the 4 bit is set.
|
||||
|
||||
-dnet is not currently implemented and should not be used.
|
||||
|
||||
-syslog
|
||||
specifies that debugging output is to be redirected to
|
||||
the syslogd daemon. This flag can be used only on
|
||||
machines running Sun OS 4.1 or higher.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following turns on debugging using the default debugging
|
||||
level of 1:
|
||||
|
||||
% fs de on
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
afsd
|
@ -1,88 +0,0 @@
|
||||
fs diskfree AFS Commands fs diskfree
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs diskfree -- show information about the partition housing
|
||||
|
||||
a directory/file.
|
||||
|
||||
|
||||
+
|
||||
fs diskfree [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs df [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Provides information about the partition that houses the
|
||||
volume containing the specified directory or file. See the
|
||||
OUTPUT section for a complete explanation of the information
|
||||
provided. To learn more about the volume itself, use the fs
|
||||
examine command.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies a file or directory about whose host
|
||||
partition information is desired. If the issuer omits
|
||||
this argument, the current working directory is
|
||||
assumed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
Note: The numbers that appear in this output may not always
|
||||
agree with the corresponding numbers in the output of the
|
||||
standard UNIX df command. The main reason is that the df
|
||||
output reflects the state of partitions exactly when the
|
||||
command is issued. The numbers in this command's output may
|
||||
be up to 5 minutes old, as the Cache Manager polls the File
|
||||
Server for partition information at that frequency. Another
|
||||
potential difference: the partition size reported by the
|
||||
UNIX df command includes some reserved space that does not
|
||||
show up in this report of partition size, and so is likely
|
||||
to be about 10% larger.
|
||||
|
||||
The output reports the following information about each
|
||||
partition that houses a specified directory or file:
|
||||
|
||||
- the name of the volume that contains the directory
|
||||
or file
|
||||
|
||||
- the total size in kilobyte blocks of the partition
|
||||
that stores the named volume
|
||||
|
||||
- the number of kilobyte blocks used on the
|
||||
partition
|
||||
|
||||
- the number of kilobyte blocks available on the
|
||||
|
||||
|
||||
|
||||
partition
|
||||
|
||||
- the percentage of the partition's total space used
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output for the partition housing the
|
||||
volume user.smith in the Transarc Corporation cell:
|
||||
|
||||
% fs df /afs/transarc.com/usr/smith
|
||||
Volume Name kbytes used avail %used
|
||||
user.smith 333305 286710 46595 86%
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs examine
|
@ -1,109 +0,0 @@
|
||||
fs examine AFS Commands fs examine
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs examine -- show information about volume containing
|
||||
|
||||
specified directory.
|
||||
|
||||
|
||||
+
|
||||
fs examine [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs exa [-p <dir/file path> ] [-h]
|
||||
+
|
||||
fs listvol [-p <dir/file path> ] [-h]
|
||||
+
|
||||
fs lv [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays information about the volume containing each
|
||||
specified directory or file. The information includes the
|
||||
file's quota and current size. See the OUTPUT section for a
|
||||
complete explanation of the information provided. While
|
||||
this command provides the most information about a volume,
|
||||
the fs listquota and fs quota commands are also available to
|
||||
display information about a volume.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file and/or directory for which
|
||||
information about the host volume is desired. Omit
|
||||
this switch to display information about the volume
|
||||
that contains the current working directory.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
Note: The partition-related numbers that appear in this
|
||||
output may not always agree with the corresponding numbers
|
||||
in the output of the standard UNIX df command. The main
|
||||
reason is that the df output reflects the state of
|
||||
partitions exactly when the command is issued. The numbers
|
||||
in this command's output may be up to 5 minutes old, as the
|
||||
Cache Manager polls the File Server for partition
|
||||
information at that frequency. Another potential
|
||||
difference: the partition size reported by the UNIX df
|
||||
command includes some reserved space that does not show up
|
||||
in this report of partition size, and so is likely to be
|
||||
about 10% larger.
|
||||
|
||||
|
||||
|
||||
The output reports the following information about each
|
||||
volume that contains a specified directory or file:
|
||||
|
||||
- the volumeID number (abbreviated in the output as
|
||||
"vid") of the volume
|
||||
|
||||
- the volume's name
|
||||
|
||||
- the current "offline" message associated with the
|
||||
volume, as set by a system administrator using the
|
||||
fs setvol command
|
||||
|
||||
- the current "message of the day" associated with
|
||||
the volume, as set by a system administrator using
|
||||
the fs setvol command
|
||||
|
||||
- the volume's maximum size quota, in kilobyte
|
||||
blocks
|
||||
|
||||
- its current size, in kilobyte blocks
|
||||
|
||||
- the number of kilobyte blocks still available on
|
||||
the disk partition that houses the volume and the
|
||||
partition's total size
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output for the volume user.smith
|
||||
(and the partition housing it) in the Transarc Corporation
|
||||
cell:
|
||||
|
||||
% fs exa /afs/transarc.com/usr/smith
|
||||
Volume status for vid = 50489902 named user.smith
|
||||
Current maximum quota is 15000
|
||||
Current blocks used are 5073
|
||||
The partition has 46383 blocks available out of 333305
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs listquota
|
||||
|
||||
fs quota
|
||||
|
||||
fs setquota
|
@ -1,93 +0,0 @@
|
||||
fs exportafs AFS Commands fs exportafs
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs exportafs -- report or set whether machine can export
|
||||
|
||||
AFS to clients of alternate file
|
||||
systems.
|
||||
|
||||
|
||||
fs exportafs -type <exporter name> [-state <'on' or
|
||||
'off'>] [-noconvert] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs exp -t <exporter name> [-s <'on' or 'off'>] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
This command performs one of the following, depending on
|
||||
whether the issuer provides the -state argument:
|
||||
|
||||
- It sets whether the machine is accessible as a
|
||||
server of the non-AFS file system exporter name,
|
||||
able to be mounted by clients of that file system.
|
||||
|
||||
- It reports on the current status of the machine.
|
||||
|
||||
The command's -noconvert flag can be used to indicate
|
||||
whether mode bits of exported directories and files are to
|
||||
be converted. By default, the group and other mode bits of
|
||||
exported directories and files are changed to match the user
|
||||
bits.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-type names the alternate file system for which the setting
|
||||
is to be changed or reported. Only lowercase letters
|
||||
are acceptable. The only legal value is nfs.
|
||||
|
||||
-state
|
||||
controls whether the workstation is accessible as a
|
||||
server of the non-AFS file system or not. The legal
|
||||
values are on, which enables the workstation as a
|
||||
server, and off, which makes it inaccessible as a
|
||||
server. If the issuer omits this argument, the output
|
||||
reports the current setting.
|
||||
|
||||
-noconvert
|
||||
determines whether the group and other bits on
|
||||
exported files and directories are converted to match
|
||||
the user bits. By default, the group and other bits
|
||||
on exported files and directories are made to match
|
||||
the user bits. Specify this flag to leave the bits as
|
||||
they are in AFS.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
|
||||
|
||||
OUTPUT
|
||||
|
||||
When the -state argument is omitted, the output reports the
|
||||
name of the non-AFS file system and whether the workstation
|
||||
is enabled as a server of it.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows that this machine is enabled as an NFS
|
||||
server (i.e., it is running the AFS/NFS Translator):
|
||||
|
||||
% fs exportafs nfs Exporter type: nfs is currently enabled
|
||||
for AFS
|
||||
|
||||
The following shows that the machine is not enabled as an
|
||||
NFS server:
|
||||
|
||||
% fs exportafs nfs Sorry, the nfs-exporter type is
|
||||
currently not supported on this AFS client
|
||||
|
||||
The following prevents the machine from acting as an NFS
|
||||
server:
|
||||
|
||||
% fs exp nfs off
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged in as "root" in the UNIX file system
|
||||
of the machine on which the command is being issued.
|
@ -1,63 +0,0 @@
|
||||
fs flush AFS Commands fs flush
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs flush -- force Cache Manager to discard a cached
|
||||
|
||||
file/directory.
|
||||
|
||||
|
||||
+
|
||||
fs flush [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs flush [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Forces the Cache Manager to remove each specified directory
|
||||
or file from its caches of data and status information. The
|
||||
result is that the next time data from a flushed directory
|
||||
or file is requested, the Cache Manager contacts the File
|
||||
Server for the most current version, along with a new
|
||||
callback (if necessary) and associated status information.
|
||||
This command does not discard data from application program
|
||||
buffers or data that has been altered in the cache but not
|
||||
yet written back to the central copy maintained by the File
|
||||
Server.
|
||||
|
||||
The fs flushvolume command can be used to flush all data
|
||||
that resides in the same volume as a specified file or
|
||||
directory.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file or directory to be flushed. In
|
||||
the case of a directory element, only the element
|
||||
itself is flushed, not data cached from files or
|
||||
subdirectories that reside in it. If this argument is
|
||||
omitted, the current directory is flushed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following flushes from the cache the file projectnotes
|
||||
in the current working directory and all data from the
|
||||
subdirectory plans:
|
||||
|
||||
% fs flush projectnotes ./plans/*
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs flushvolume
|
@ -1,65 +0,0 @@
|
||||
fs flushvolume AFS Commands fs flushvolume
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs flushvolume -- force Cache Manager to discard any cached
|
||||
|
||||
data from the volume containing
|
||||
specified file/directory.
|
||||
|
||||
|
||||
+
|
||||
fs flushvolume [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs flushv [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Forces the Cache Manager to remove cached data (but not the
|
||||
cached status information) for all files and directories
|
||||
that reside in the same volume as each specified directory
|
||||
or file. The result is that the next time the Cache Manager
|
||||
needs anything from a flushed volume, it contacts the File
|
||||
Server for the most current version, along with a new
|
||||
callback (if necessary). This command does not discard data
|
||||
from application program buffers or data that has been
|
||||
altered in the cache but not yet written back to the central
|
||||
copy maintained by the File Server.
|
||||
|
||||
The fs flush command can be used to flush individual files
|
||||
and directories.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies one file or directory from each volume that
|
||||
the Cache Manager is to flush completely from its
|
||||
cache. If this argument is omitted, all data from the
|
||||
volume that contains the current directory is flushed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following flushes from the cache all data that comes
|
||||
from the volume that contains the current working directory
|
||||
and the directory reports at the same level in the file
|
||||
tree:
|
||||
|
||||
% fs flushv . ../reports
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs flush
|
@ -1,67 +0,0 @@
|
||||
fs getcacheparms AFS Commands fs getcacheparms
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs getcacheparms -- show current size of data cache and
|
||||
|
||||
amount being used.
|
||||
|
||||
|
||||
fs getcacheparms [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs getca [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the current size of the cache that the Cache
|
||||
Manager has at its disposal, and the amount it is using at
|
||||
the moment the command is issued. The command works both on
|
||||
machines using a memory cache and on machines using a disk
|
||||
cache.
|
||||
|
||||
This information comes from the kernel of the workstation on
|
||||
which the command is issued. On machines using a disk
|
||||
cache, the current cache size may disagree with the default
|
||||
setting specified in the file /usr/vice/etc/cacheinfo, if
|
||||
someone has set it with the fs setcachesize command.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output is of the form
|
||||
|
||||
AFS using <amount> of the cache's available <size> 1
|
||||
blocks.
|
||||
|
||||
where <amount> is the number of 1K byte blocks the Cache
|
||||
Manager is currently using, and <size> the total number of
|
||||
blocks available to the Cache Manager (the current cache
|
||||
size).
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output on a machine with a 25000
|
||||
kilobyte cache.
|
||||
|
||||
% fs getca
|
||||
AFS using 22876 of the cache's available 25000 1K by
|
||||
blocks.
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs setcachesize
|
@ -1,74 +0,0 @@
|
||||
fs getcellstatus AFS Commands fs getcellstatus
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs getcellstatus -- show whether workstation can run setuid
|
||||
|
||||
programs
|
||||
from specified cell(s), and whether cell
|
||||
is using the old VLDB.
|
||||
|
||||
|
||||
+
|
||||
fs getcellstatus -cell <cell name> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs getce -c <cell name> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Reports whether the workstation allows programs fetched from
|
||||
the specified cell(s) to run with setuid privilege. System
|
||||
administrators set a cell's setuid status on a
|
||||
per-workstation basis with the fs setcell command.
|
||||
|
||||
If a cell is using the AFS 2.0 method for tracking volume
|
||||
location rather than the VLDB, the output reports this also
|
||||
(see the OUTPUT section).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-cell names the cell(s) for which setuid status is desired.
|
||||
Provide the complete Internet-style name for each cell
|
||||
(unlike the common -cell argument in other command
|
||||
suites, it is not possible to abbreviate this one).
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
Possible output values are
|
||||
|
||||
- no setuid allowed, indicating that programs from
|
||||
the cell may not run with setuid privilege.
|
||||
|
||||
- setuid allowed, indicating that programs from the
|
||||
cell may run with setuid privilege.
|
||||
|
||||
- using old VLDB, indicating that the cell is still
|
||||
using the AFS 2.0 volume location method.
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following indicates that programs from the cell
|
||||
oldcell.com may not run with setuid privilege and that the
|
||||
cell is still using the old volume location method:
|
||||
|
||||
% fs getce oldcell.com Cell oldcell.com status: no setuid
|
||||
allowed, using old VLDB
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs setcell
|
@ -1,147 +0,0 @@
|
||||
fs getserverprefs AFS Commands fs getserverprefs
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs getserverprefs -- display Cache Manager's preferences
|
||||
|
||||
for file server machines.
|
||||
|
||||
|
||||
fs getserverprefs [-file <dir/file path>] [-numeric]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs gets [-f <dir/file path>] [-n] [-h]
|
||||
|
||||
fs gp [-f <dir/file path>] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the Cache Manager's preferences for file server
|
||||
machines. A preference consists of the name or IP address
|
||||
of a file server machine followed by its "rank." The rank
|
||||
is a positive integer in the range from 1 to 65,534.
|
||||
|
||||
A file server machine's rank determines the Cache Manager's
|
||||
preference for selecting it when the Cache Manager must
|
||||
access a ReadOnly replica that resides on it. The Cache
|
||||
Manager compares the rank of the server machine with the
|
||||
ranks of other server machines that house the replica. It
|
||||
then attempts to access the replica on the server machine
|
||||
that has the lowest integer rank.
|
||||
|
||||
If it cannot access the replica on the machine with the
|
||||
lowest rank (possibly because the machine or the network on
|
||||
which the machine is located is down), the Cache Manager
|
||||
attempts to access the replica from the server machine with
|
||||
the next lowest rank. It continues in this manner until it
|
||||
either accesses the replica or determines that all of the
|
||||
file server machines on which the replica resides are
|
||||
unavailable.
|
||||
|
||||
The Cache Manager records addresses and ranks for all local
|
||||
file server machines. It also records addresses and ranks
|
||||
for all foreign file server machines that house a volume it
|
||||
has accessed or for which a rank has been specified with the
|
||||
fs setserverprefs command. It stores the addresses and
|
||||
ranks in the kernel of the client machine.
|
||||
|
||||
Information displayed with this command is sent to stdout by
|
||||
default. The -file switch can be used to direct the output
|
||||
to a file.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-file specifies the pathname of a file to which
|
||||
the file server machine names and ranks are
|
||||
to be written. Omit this switch to display
|
||||
the machine names and ranks on stdout.
|
||||
|
||||
-numeric specifies that the IP addresses of the file
|
||||
server machines are to be displayed. Omit
|
||||
this flag to display the names of the file
|
||||
server machines. Because including this
|
||||
flag skips the resolution of IP addresses to
|
||||
machine names, information is displayed more
|
||||
quickly than if the option is omitted.
|
||||
(This flag is especially useful if the
|
||||
output is intended to be used as input to
|
||||
the fs setserverprefs command, in which case
|
||||
it does not matter whether names or
|
||||
addresses are used.)
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output displays a separate line for each file server
|
||||
machine that has a rank in the kernel of the machine on
|
||||
which the command is issued. Each line displays the name of
|
||||
a file server machine followed by its rank, as follows:
|
||||
|
||||
first machine name rank
|
||||
second machine name rank
|
||||
. . . . . .
|
||||
|
||||
If the -numeric flag is included with the command, the
|
||||
output displays the IP addresses of the file server machines
|
||||
instead of their names. The address of a machine is also
|
||||
displayed if the Cache Manager cannot resolve a file server
|
||||
machine's name based on the machine's address at the time
|
||||
the command is issued.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following displays the preferences (the list of file
|
||||
server machines and their respective ranks) associated with
|
||||
a Cache Manager. The output in the example truncates the
|
||||
complete list of server machine names and ranks. Note that
|
||||
the IP addresses, not the names, of some machines are
|
||||
displayed because their addresses cannot be resolved.
|
||||
|
||||
|
||||
|
||||
% fs gets
|
||||
fs5.transarc.com 20000
|
||||
fs1.transarc.com 40000
|
||||
fs3.transarc.com 20001
|
||||
fs4.transarc.com 40001
|
||||
fs2.transarc.com 25000
|
||||
121.86.3.37 40002
|
||||
fserver1.andrew.cmu.edu 40000
|
||||
121.86.3.34 40001
|
||||
server1.athena.mit.edu 1000
|
||||
. . . . . . .
|
||||
|
||||
The following displays the same Cache Manager's preferences,
|
||||
but the -numeric flag is included to display only the IP
|
||||
addresses of the file server machines, not their names. The
|
||||
example output again truncates the complete list of server
|
||||
machine names and ranks.
|
||||
|
||||
% fs gets -n
|
||||
128.21.6.214 20000
|
||||
128.2.11.9 40000
|
||||
128.2.11.12 20001
|
||||
128.2.11.13 40001
|
||||
128.2.11.11 25000
|
||||
121.86.3.37 40002
|
||||
121.86.3.31 40000
|
||||
121.86.3.34 40001
|
||||
145.2.50.121 1000
|
||||
. . . . .
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs setserverprefs
|
@ -1,80 +0,0 @@
|
||||
fs help AFS Commands fs help
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs help -- show syntax of specified fs commands or list
|
||||
|
||||
functional descriptions of all fs
|
||||
commands.
|
||||
|
||||
|
||||
+
|
||||
fs help [-topic <help string> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs h [-t <help string> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line (name and short description) of
|
||||
every fs command's online help entry if no help string is
|
||||
provided. For each operation code specified with -topic, it
|
||||
outputs the entire help entry. See the OUTPUT section.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic specifies the operation codes for which
|
||||
syntax is to be provided. If the issuer
|
||||
omits this argument, the output instead
|
||||
provides a short description of all fs
|
||||
commands.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The online help entry for each fs command consists of two or
|
||||
three lines:
|
||||
|
||||
- The first line names the command and briefly
|
||||
describes what it does.
|
||||
|
||||
- The second line displays any aliases the command
|
||||
has (this line does not appear for every command).
|
||||
|
||||
- The final line, which begins with "Usage:", lists
|
||||
the command's arguments and flags in the
|
||||
prescribed order. Online help entries use the
|
||||
same symbols (for example, brackets) as the
|
||||
command definitions in this manual. For an
|
||||
explanation of their meaning, see page v of the
|
||||
introductory About This Manual chapter.
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following displays the online help entry for the
|
||||
fs setacl command:
|
||||
|
||||
% fs help setacl
|
||||
fs setacl: set access control list
|
||||
aliases: sa
|
||||
+
|
||||
Usage: fs setacl -dir <directory>
|
||||
+
|
||||
-acl <access list entries> [-clear] [-negative] [-help]
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs apropos
|
@ -1,128 +0,0 @@
|
||||
fs listacl AFS Commands fs listacl
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs listacl -- show access control list.
|
||||
|
||||
|
||||
+
|
||||
fs listacl [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs la [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the access control list (ACL) associated with each
|
||||
directory. It is legal to provide a filename rather than a
|
||||
directory name for directory, in which case the ACL of the
|
||||
file's parent directory is displayed (because it is not
|
||||
possible to set an ACL for an individual file, the file is
|
||||
inheriting the ACL from its parent directory). Omit this
|
||||
switch to display the ACL of the current working directory.
|
||||
|
||||
Users who possess the ADMINISTER right on an ACL may change
|
||||
the ACL with the fs setacl command or copy the ACL from a
|
||||
different directory to it with the fs copyacl command.
|
||||
|
||||
WARNING
|
||||
|
||||
The appearance of a user/group on the Negative rights list
|
||||
does not guarantee that the person is denied those rights.
|
||||
If system:anyuser is granted any rights on the Normal rights
|
||||
list, a user need only unlog to obtain those rights.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file and/or directory for
|
||||
which to display the associated ACL. If
|
||||
this argument is omitted, the output
|
||||
displays the ACL associated with the current
|
||||
working directory. If it is a filename, the
|
||||
ACL displayed is associated with the file's
|
||||
parent directory.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The first line of the output names the directory associated
|
||||
with the access control list. If the issuer used shorthand
|
||||
notation (such as "." for the current directory) when
|
||||
indicating the directory, it may appear here rather than the
|
||||
full pathname of the directory.
|
||||
|
||||
|
||||
|
||||
The "Normal rights:" header indicates the list of users who
|
||||
have normal rights to the directory. Each following line
|
||||
lists a user/group name and the set of rights the user/group
|
||||
may exercise. The possible rights and their meanings are
|
||||
|
||||
|
||||
- r = READ the contents of files in the directory
|
||||
|
||||
- w = WRITE (modify) the contents of files in the
|
||||
directory
|
||||
|
||||
- l = LOOKUP status information about the files in
|
||||
the directory
|
||||
|
||||
- d = DELETE files from the directory
|
||||
|
||||
- i = INSERT new files into the directory
|
||||
|
||||
- k = LOCK; set read or write locks on the files in
|
||||
the directory
|
||||
|
||||
- a = ADMINISTER; change the rights on the access
|
||||
control list
|
||||
|
||||
- A, B, C, D, E, F, G, H; by default, these have no
|
||||
meaning to AFS server processes. Administrators
|
||||
and application programs may assign meanings to
|
||||
them and place them on ACLs to control access to
|
||||
the directory's contents in new ways. The letters
|
||||
must be uppercase.
|
||||
|
||||
A "Negative rights:" header may appear next, if any negative
|
||||
rights have been specified for this directory. The format
|
||||
of this list is the same as that of the Normal rights list.
|
||||
The difference is that the user(s)/group(s) listed are
|
||||
denied rather than granted the specified rights.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following displays the ACL associated with user pat's
|
||||
home directory and its private subdirectory when the
|
||||
fs listacl command is issued in the home directory:
|
||||
|
||||
% fs la . private Access list for . is Normal rights:
|
||||
system:authuser rl pat rlidwka pat:friends rlid
|
||||
Negative rights: smith rlidwka
|
||||
|
||||
Access list for private is Normal rights: pat rlidwka
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
To issue this command with a directory name argument, issuer
|
||||
must have the LOOKUP right on the directory's ACL. To issue
|
||||
command with a filename argument, the issuer must have both
|
||||
the LOOKUP and READ rights on the ACL of the file's parent
|
||||
directory.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs cleanacl
|
||||
|
||||
fs copyacl
|
||||
|
||||
fs setacl
|
@ -1,64 +0,0 @@
|
||||
fs listcells AFS Commands fs listcells
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs listcells -- show database server machines in cell(s)
|
||||
|
||||
known to Cache Manager.
|
||||
|
||||
|
||||
fs listcells [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs listc [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Formats and displays the Cache Manager's kernel-resident
|
||||
list of the database server machines in its home cell and
|
||||
foreign cells.
|
||||
|
||||
At each reboot of the workstation, the Cache Manager copies
|
||||
the contents of /usr/vice/etc/CellServDB into the kernel. It
|
||||
is possible to modify the kernel-resident list between
|
||||
reboots using fs newcell.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output contains a line for each cell for which the
|
||||
kernel has a list of database server machines. The cell
|
||||
name is followed by a list of its database server machines
|
||||
(referred to as "hosts").
|
||||
|
||||
The format of each machine name (name in uppercase, name in
|
||||
lowercase, or Internet address in four-field decimal form)
|
||||
depends on the state of the local cell's name server at the
|
||||
time the command is issued.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows output for several cells as
|
||||
illustrations of the different formats for machine names:
|
||||
|
||||
% fs listc
|
||||
Cell transarc.com on hosts fs1.transarc.com fs2.transarc
|
||||
Cell andrew.cmu.edu on hosts VICE11.FS.ANDREW.CMU.EDU
|
||||
VICE2.FS.ANDREW.CMU.EDU VICE7.FS.ANDREW.CMU.EDU.
|
||||
Cell athena.mit.edu on hosts 18.80.0.2 orf.mit.edu
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs newcell
|
@ -1,84 +0,0 @@
|
||||
fs listquota AFS Commands fs listquota
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs listquota -- show quota information for the volume
|
||||
|
||||
containing a file/directory.
|
||||
|
||||
|
||||
+
|
||||
fs listquota [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs lq [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays information about the size and quota of the volume
|
||||
containing each specified directory or file. See the OUTPUT
|
||||
section for a complete explanation of the information
|
||||
provided.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file and/or directory for which
|
||||
information about the host volume is desired. If the
|
||||
issuer omits this argument, the current directory is
|
||||
assumed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output reports the following information about each
|
||||
volume that contains a specified directory or file:
|
||||
|
||||
- the name of the volume
|
||||
|
||||
- its maximum size quota, in kilobytes
|
||||
|
||||
- its current size, in kilobytes
|
||||
|
||||
- the percentage of its quota that its current size
|
||||
represents
|
||||
|
||||
- the percentage of the volume's disk partition that
|
||||
is full. This is usually unrelated to how much of
|
||||
the user's quota is used, since it depends on all
|
||||
the volumes on the partition. A large value may
|
||||
nevertheless prevent a user from being able to
|
||||
store more data on the partition.
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output for the volume user.smith in
|
||||
the Transarc Corporation cell:
|
||||
|
||||
% fs lq /afs/transarc.com/usr/smith
|
||||
Volume Name Quota Used % Used Partition
|
||||
user.smith 15000 5071 34% 86%
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs diskfree
|
||||
|
||||
fs examine
|
||||
|
||||
fs quota
|
||||
|
||||
fs setquota
|
||||
|
||||
fs setvol
|
@ -1,96 +0,0 @@
|
||||
fs lsmount AFS Commands fs lsmount
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs lsmount -- show volume for which directory is a mount
|
||||
|
||||
point.
|
||||
|
||||
|
||||
+
|
||||
fs lsmount -dir <directory> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs ls -d <directory> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Outputs the name of the volume(s) for which each directory
|
||||
is the root directory. If directory is not a mount point or
|
||||
is not in AFS, an error message appears.
|
||||
|
||||
The association between directory and a volume name was
|
||||
created with the fs mkmount command.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-dir names the directory that serves as a mount point for a
|
||||
volume. The last element in the pathname that the
|
||||
issuer provides must be an actual name, not "dot" (.)
|
||||
or "dot dot" (. .), which the fs command interpreter
|
||||
does not understand in this case.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output is of the form:
|
||||
|
||||
'directory' is a mount point for volume 'volume name'
|
||||
|
||||
A hash sign (#) preceding volume name indicates that
|
||||
directory is a regular mount point.
|
||||
|
||||
A percent sign (%) preceding volume name indicates that
|
||||
directory is a ReadWrite mount point.
|
||||
|
||||
If directory is a cellular mount point, then a cell name and
|
||||
colon precede volume name in addition to the hash sign or
|
||||
percent sign.
|
||||
|
||||
|
||||
|
||||
If directory is not a mount point, the output reads:
|
||||
|
||||
'directory' is not a mount point.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the mount point for the home directory
|
||||
of user smith in the Transarc Corporation cell:
|
||||
|
||||
% fs ls /afs/transarc.com/usr/smith
|
||||
'/afs/transarc.com/usr/smith' is a mount point for
|
||||
volume '#user.smith'
|
||||
|
||||
The following shows both the regular and ReadWrite mount
|
||||
points for the Transarc Corporation cell's root.cell volume.
|
||||
|
||||
% fs ls /afs/transarc.com
|
||||
'/afs/transarc.com' is a mount point for volume '#ro
|
||||
|
||||
% fs ls /afs/.transarc.com
|
||||
'/afs/.transarc.com' is a mount point for volume
|
||||
'%root.cell'
|
||||
|
||||
The following shows a cellular mount point: the Andrew
|
||||
cell's root.cell volume as mounted in the Transarc
|
||||
Corporation cell's tree.
|
||||
|
||||
% fs ls /afs/andrew.cmu.edu
|
||||
'/afs/andrew.cmu.edu' is a mount point for volume
|
||||
'#andrew.cmu.edu:root.cell'
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs mkmount fs rmmount
|
@ -1,297 +0,0 @@
|
||||
fs mkmount AFS Commands fs mkmount
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs mkmount -- create a mount point for a volume.
|
||||
|
||||
|
||||
fs mkmount -dir <directory> -vol <volume name> [-cell <cell
|
||||
name>] [-rw] [-fast] [-root] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs mk -d <directory> -v <volume name> [-c <cell name>]
|
||||
[-rw] [-f] [-ro] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a mount point called directory for the volume volume
|
||||
name. The volume's root directory is also named directory.
|
||||
Mount points look and act just like standard UNIX directory
|
||||
structures, because when the Cache Manager encounters a
|
||||
mount point directory in a pathname, it knows to look in the
|
||||
indicated volume for the elements listed under directory.
|
||||
|
||||
It is possible, although not recommended, to create more
|
||||
than one mount point to a volume.
|
||||
|
||||
Types of mount points
|
||||
|
||||
There are several types of mount points, because mount
|
||||
points can vary along three dimensions. The following will
|
||||
discuss the three dimensions in turn, explaining how they
|
||||
affect the Cache Manager's interpretation of the mount
|
||||
point.
|
||||
|
||||
Dimension 1: Volume Type
|
||||
|
||||
The first dimension concerns which type of volume
|
||||
(ReadWrite, ReadOnly or Backup) is named in the mount point.
|
||||
ReadOnly and Backup volumes are distinguished by a .readonly
|
||||
or .backup extension, respectively. When a mount point
|
||||
names a volume with either extension, the Cache Manager
|
||||
accesses the specified volume only, ignoring Dimension 2
|
||||
(the mount point's type). In other words, the Cache Manager
|
||||
will never access the ReadWrite version of a volume if the
|
||||
mount point explicitly names the ReadOnly or Backup version.
|
||||
If the named ReadOnly or Backup volume is inaccessible, the
|
||||
Cache Manager reports an error.
|
||||
|
||||
If the volume name does not include a .backup or .readonly
|
||||
extension, then the volume is ReadWrite. The Cache Manager
|
||||
considers Dimension 2.
|
||||
|
||||
Dimension 2: Mount Point Type
|
||||
|
||||
Note: This dimension is relevant only if the volume
|
||||
indicated in the mount point is ReadWrite. Only Dimension 1
|
||||
is relevant if the named volume is ReadOnly or Backup.
|
||||
|
||||
The second dimension concerns whether the mount point itself
|
||||
is "regular" or "ReadWrite":
|
||||
|
||||
- When the Cache Manager encounters a regular mount
|
||||
|
||||
|
||||
|
||||
point (one naming a ReadWrite volume), it tries to
|
||||
access a copy of the volume that is of same type
|
||||
(ReadWrite or ReadOnly) as the volume which houses
|
||||
the mount point. If there is no volume of the
|
||||
same type, it will access the type that is
|
||||
available.
|
||||
|
||||
Almost all mount points are of this type. Its
|
||||
advantage is that the Cache Manager is free to
|
||||
access the most readily available form of the
|
||||
volume. When the Cache Manager starts in a
|
||||
ReadOnly volume, this type of mount point means
|
||||
that it traverses a "ReadOnly path," which can be
|
||||
efficient because no callbacks are necessary.
|
||||
|
||||
The issuer creates a regular mount point by
|
||||
providing only the required -dir and -vol
|
||||
arguments.
|
||||
|
||||
- When the Cache Manager encounters a ReadWrite
|
||||
mount point, it accesses only the ReadWrite
|
||||
version of the indicated volume. (This assumes
|
||||
that the volume does not have a .backup or
|
||||
.readonly extension. Mounting a Backup or
|
||||
ReadOnly volume with a ReadWrite mount point is
|
||||
possible but unnecessary, as the Cache Manager
|
||||
handles those volume types in the same way whether
|
||||
their mount point is regular or ReadWrite. See
|
||||
Dimension 1.)
|
||||
|
||||
A ReadWrite mount point is generally used to mount
|
||||
only one volume in a cell: its root.cell volume at
|
||||
the second level in the file tree, just below
|
||||
/afs. Conventionally, root.cell is also mounted
|
||||
with a regular mount point at the same level. The
|
||||
two mount points are distinguished by the
|
||||
placement of a period at the start of the
|
||||
ReadWrite mount point's name (see the EXAMPLES
|
||||
section). The existence of a ReadWrite mount
|
||||
point for root.cell allows the system
|
||||
administrator to switch onto a "ReadWrite" path
|
||||
and thus be sure he or she is accessing the
|
||||
ReadWrite version of a volume when that is
|
||||
important.
|
||||
|
||||
The issuer creates a ReadWrite mount point by
|
||||
adding the -rw flag.
|
||||
|
||||
Dimension 3: Cellular versus Local
|
||||
|
||||
The third dimension concerns which cell the volume resides
|
||||
in. A cellular mount point indicates to the Cache Manager
|
||||
that the volume resides in a foreign cell (and specifies
|
||||
which one). If the mount point is not cellular, then the
|
||||
Cache Manager assumes that the volume resides in the same
|
||||
cell as the mount point does.
|
||||
|
||||
Normally, cellular mount points are used only at the second
|
||||
level in a cell's file tree (i.e., at the "cell" level just
|
||||
below /afs), to mount the root.cell volumes for foreign
|
||||
cells that are to be visible in the local cell. It is
|
||||
|
||||
|
||||
|
||||
possible to create cellular mount points (mount foreign
|
||||
volumes) at other levels in the tree. Doing so is not
|
||||
recommended, however, as it can make it difficult to
|
||||
determine which cell a given pathname leads to.
|
||||
|
||||
Cellular mount points can be either regular or ReadWrite:
|
||||
|
||||
- A regular cellular mount point not only tells the
|
||||
Cache Manager to cross into a foreign cell, but
|
||||
also to access the ReadOnly version of the
|
||||
indicated volume if possible. The advantage is
|
||||
that the Cache Manager traverses a "ReadOnly path"
|
||||
in the foreign cell, even if the mount point for
|
||||
the indicated volume resides in a ReadWrite
|
||||
volume. This is particularly useful when crossing
|
||||
into foreign cells that are too small to replicate
|
||||
their root.afs volume.
|
||||
|
||||
To create a regular cellular mount point, the
|
||||
issuer uses the -cell argument to specify the cell
|
||||
name, and adds the -root flag.
|
||||
|
||||
- A ReadWrite cellular mount point tells the Cache
|
||||
Manager to cross into a foreign cell and access
|
||||
the ReadWrite version of the volume (assuming that
|
||||
the volume does not have a .backup or .readonly
|
||||
extension). Use of this type of mount point is
|
||||
discouraged, because accessing ReadWrite volumes
|
||||
means the File Server has to issue callbacks, an
|
||||
extra load it is not fair to impose from outside
|
||||
the cell. In general, only a cell's own
|
||||
administrators need to access the ReadWrite
|
||||
version of a volume.
|
||||
|
||||
To create a ReadWrite cellular mount point, the
|
||||
issuer uses the -cell argument to specify the cell
|
||||
name, and adds both the -root and -rw flags.
|
||||
Because this is not recommended, no example of it
|
||||
appears below.
|
||||
|
||||
Mounting foreign volumes in foreign cells
|
||||
|
||||
In addition to mounting volumes in the local cell, the
|
||||
fs mkmount allows a user who possesses the necessary access
|
||||
rights in a foreign cell to create a regular, non-cellular
|
||||
mount point in a foreign cell's file tree while working on a
|
||||
machine in his or her local cell. In other words, the
|
||||
issuer can mount a volume from a foreign cell in that cell's
|
||||
file space as though he or she were working at a machine in
|
||||
that cell.
|
||||
|
||||
To mount a foreign volume in foreign cell, specify the cell
|
||||
name with -cell, but do not use the -root flag.
|
||||
|
||||
|
||||
|
||||
Distinguishing the types of mount points
|
||||
|
||||
The output of fs lsmount uses various symbols to distinguish
|
||||
the different types of mount points. See the Output section
|
||||
of that command's description.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-dir names the directory to be created as a mount point to
|
||||
the named volume. It should not already exist. If
|
||||
the issuer does not specify a pathname, the mount
|
||||
point is created as a subdirectory of the current
|
||||
working directory.
|
||||
|
||||
-vol names the volume to be mounted. Add the .readonly or
|
||||
.backup extension if appropriate. The volumeID is
|
||||
also acceptable.
|
||||
|
||||
Note: When creating a cellular mount point, do not
|
||||
specify the cell name as part of this argument, as was
|
||||
necessary in previous versions of AFS that did not
|
||||
have the -root flag. Instead, include the -root flag
|
||||
and use the -cell argument to specify the cell name;
|
||||
the command interpreter will automatically prepend the
|
||||
cell name to the volume name, separating them with a
|
||||
colon.
|
||||
|
||||
-cell names the cell in which the volume resides. When
|
||||
creating a cellular mount point, combine this argument
|
||||
with the -root flag. When mounting a foreign volume
|
||||
in a foreign cell, use this argument alone.
|
||||
|
||||
-rw designates the mount point as ReadWrite, which forces
|
||||
the Cache Manager to access only the ReadWrite copy of
|
||||
a volume that does not have a .backup or .readonly
|
||||
extension. Without this flag, the mount point is
|
||||
regular.
|
||||
|
||||
-fast indicates that the VL Server should not check that
|
||||
there is a VLDB entry for the volume to be mounted.
|
||||
By default, the VL Server does check and prints a
|
||||
warning message if there is no VLDB entry; the mount
|
||||
point is created in any case.
|
||||
|
||||
-root creates a cellular mount point.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
Note: These examples illustrate only the recommended
|
||||
combinations and use of arguments. The OUTPUT section of
|
||||
fs lsmount's description shows what each mount point looks
|
||||
like.
|
||||
|
||||
The following creates a regular mount point. It mounts
|
||||
user.smith at /afs/transarc.com/usr/smith.
|
||||
|
||||
|
||||
|
||||
% cd /afs/transarc.com/usr % fs mk smith user.smith
|
||||
|
||||
|
||||
|
||||
The following creates both a ReadWrite and regular mount
|
||||
point for the Transarc Corporation cell's root.cell volume,
|
||||
in that cell's file tree. It follows the convention of
|
||||
putting a period at the beginning of the ReadWrite mount
|
||||
point's name.
|
||||
|
||||
% fs mk /afs/transarc.com root.cell % fs mk
|
||||
/afs/.transarc.com root.cell -rw
|
||||
|
||||
The following mounts the root.cell volume belonging to
|
||||
Carnegie Mellon University's Andrew cell in the Transarc
|
||||
Corporation cell's file tree, creating a regular, cellular
|
||||
mount point called andrew.cmu.edu. When a Transarc
|
||||
Corporation Cache Manager encounters this mount point, it
|
||||
will cross into the Andrew cell on a ReadOnly path.
|
||||
|
||||
% fs mk /afs/andrew.cmu.edu root.cell -c andrew.cmu.edu
|
||||
-root
|
||||
|
||||
The following illustrates the creation of a mount point in a
|
||||
foreign cell, using Transarc Corporation's regular cell
|
||||
(transarc.com) as the local cell and its test cell
|
||||
(test.transarc.com) as the foreign cell. Suppose that while
|
||||
working on a machine belonging to the transarc.com cell, a
|
||||
Transarc Corporation user wants to mount a test.transarc.com
|
||||
volume called user.test5 at
|
||||
/afs/test.transarc.com/usr/test5. She has the INSERT and
|
||||
ADMINISTER rights for /afs/test.transarc.com/usr. Note that
|
||||
the effect is just the same as if the issuer were working on
|
||||
a machine belonging to the test.transarc.com cell and
|
||||
omitted the -c test.transarc.com part of the command.
|
||||
|
||||
% cd /afs/test.transarc.com/usr % fs mk test5 user.test5 -c
|
||||
test.transarc.com
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have INSERT and ADMINISTER access for the
|
||||
directory that is to contain the mount point.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs lsmount fs rmmount
|
@ -1,125 +0,0 @@
|
||||
fs monitor AFS Commands fs monitor
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs monitor -- direct reports on file system activity to
|
||||
|
||||
specified machine, or report current
|
||||
monitoring machine.
|
||||
|
||||
|
||||
fs monitor [-server <host name> or <off>] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs mo [-s <host name> or <off>] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Depending on whether the issuer provides the -server
|
||||
argument, and its value when provided:
|
||||
|
||||
EITHER sets where the Cache Manager sends messages about
|
||||
file system activity (including its transactions with the Fi
|
||||
|
||||
OR disables message sending
|
||||
|
||||
OR reports the current destination for messages.
|
||||
|
||||
The messages are of a less technical nature than those
|
||||
generated by the fs debug command. They are at the level of
|
||||
file fetches and stores.
|
||||
|
||||
In order for the messages to be displayed, the specified
|
||||
destination machine must be running a monitoring program
|
||||
that "listens" to the correct UDP socket. If the destination
|
||||
machine is not running such a program, then the messages are
|
||||
lost.
|
||||
|
||||
WARNING
|
||||
|
||||
The effect of this command endures even after the issuer
|
||||
logs out. See the EXAMPLE section below.
|
||||
|
||||
Transarc Corporation does not provide a monitoring program
|
||||
appropriate for use with this command, but such a program,
|
||||
called "Console", is available as part of the Andrew Toolkit
|
||||
developed at Carnegie Mellon University's Information
|
||||
Technology Center.
|
||||
|
||||
If no monitoring program is available, it is best to provide
|
||||
a value of off for -server.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-server has two legal values: off or a machine name host
|
||||
name.
|
||||
|
||||
If set to off, then the Cache Manager does not
|
||||
generate any reports on its role in file system
|
||||
activities. This setting is recommended if the
|
||||
machine is not running a monitoring program capable
|
||||
of intercepting and displaying the messages
|
||||
produced.
|
||||
|
||||
The issuer may otherwise specify a machine name host
|
||||
name to which the Cache Manager will send messages.
|
||||
The host name must be a complete Internet-style
|
||||
machine name, and a monitoring program should be
|
||||
running on the machine. If no such program is
|
||||
running, the messages will simply be lost.
|
||||
|
||||
If the issuer does not provide this argument, the
|
||||
current monitor setting is displayed.
|
||||
|
||||
-help prints the online help entry for this command. Do
|
||||
not provide any other arguments or flags with this
|
||||
one. See section 3.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
When no arguments are provided, the output will report the
|
||||
name of the machine to which monitoring messages are being
|
||||
sent:
|
||||
|
||||
Using host machine for monitor services.
|
||||
|
||||
If monitoring is disabled, the output reports
|
||||
|
||||
Cache monitoring is currently disabled.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows that monitoring messages are being sent
|
||||
to machineQ.transarc.com.
|
||||
|
||||
% fs mo
|
||||
Using host machineQ.transarc.com for monitor service
|
||||
|
||||
The following sets the machine's monitoring machine to
|
||||
machineB.transarc.com.
|
||||
|
||||
% fs monitor machineB.transarc.com
|
||||
fs: new monitor host set.
|
||||
|
||||
As an example of the "lingering" effect of this command,
|
||||
suppose that a user working on machineA.transarc.com issues
|
||||
the example command, and then logs out. When another user
|
||||
logs on to machineA, he or she will not see any messages
|
||||
about file system activity; instead, users of machineB will
|
||||
continue to see messages from both machineB (their local
|
||||
machine) and machineA (the remote machine). To avoid this,
|
||||
the original user on machineA should issue the fs monitor
|
||||
|
||||
|
||||
|
||||
command again before logging out, specifying host name to be
|
||||
machineA.transarc.com.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
@ -1,87 +0,0 @@
|
||||
fs newcell AFS Commands fs newcell
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs newcell -- change list of cell's database server
|
||||
|
||||
machines in kernel.
|
||||
|
||||
|
||||
+
|
||||
fs newcell -name <cell name> -servers <primary servers>
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs n -n <cell name> -s <primary servers> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Removes the Cache Manager's kernel-resident list of database
|
||||
server machines for the cell cell name, replacing it with
|
||||
primary servers.
|
||||
|
||||
This command does not make permanent changes in the
|
||||
workstation's /afs/vice/etc/CellServDB file, the contents of
|
||||
which are transferred into the kernel at each reboot. In
|
||||
other words, rebooting the workstation will overwrite the
|
||||
changes made with this command, unless the issuer changes
|
||||
CellServDB in the same way.
|
||||
|
||||
Changes made with this command do appear in the output of
|
||||
fs listcells, since that command consults the in-kernel list
|
||||
rather than CellServDB.
|
||||
|
||||
This command may be used to introduce a completely new cell
|
||||
into the kernel-resident list, but it is not possible to
|
||||
make a cell inaccessible with this command (i.e., remove it
|
||||
from the kernel-resident list by not providing any instances
|
||||
for -server). To do that, the user must alter CellServDB
|
||||
and reboot the machine.
|
||||
|
||||
WARNING
|
||||
|
||||
Some commands work correctly only when both CellServDB and
|
||||
the kernel-resident list correctly list a cell's database
|
||||
server machines. The need of such commands for correct
|
||||
information in CellServDB precludes use of this command.
|
||||
The klog command is a prominent example.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name is the complete Internet-style name of the cell for
|
||||
which the in-kernel list of database server machines
|
||||
will change. It may be the local cell or a foreign
|
||||
cell.
|
||||
|
||||
-servers
|
||||
names the database server machine(s) for the cell in
|
||||
question. Provide the complete Internet-style
|
||||
machine name for each machine.
|
||||
|
||||
-help prints the online help entry for this command. Do
|
||||
|
||||
|
||||
|
||||
not provide any other arguments or flags with this
|
||||
one. See section 3.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following changes the machine's kernel-resident list of
|
||||
database server machines for the Transarc Corporation cell
|
||||
to include fs1.transarc.com and fs2.transarc.com.
|
||||
|
||||
% fs n transarc.com fs1.transarc.com fs2.transarc.com
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged in as "root" in the UNIX file system
|
||||
of the machine on which the command is being issued.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs listcells
|
@ -1,78 +0,0 @@
|
||||
fs quota AFS Commands fs quota
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs quota -- show percent of quota used for volume
|
||||
|
||||
containing directory/file.
|
||||
|
||||
|
||||
+
|
||||
fs quota [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs q [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the percent of maximum quota currently used by the
|
||||
volume that contains each specified directory or file. This
|
||||
is the least informative but quickest fs command that
|
||||
provides quota information about a volume. The fs examine
|
||||
and fs listquota commands provide more complete information.
|
||||
|
||||
The system administrator may set quota with the fs setquota
|
||||
or fs setvol command.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file and/or directory for which quota
|
||||
information about the host volume is desired. If the
|
||||
issuer omits this argument, the current directory is
|
||||
assumed.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output reports the percent of quota used. It does not
|
||||
name the host volume.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following lists the percent quota used of the volume
|
||||
housing the current working directory:
|
||||
|
||||
% fs quota
|
||||
17% of quota used.
|
||||
|
||||
|
||||
|
||||
The following lists the percent quota used of both the
|
||||
volume housing the current working directory's parent
|
||||
directory and the volume housing the directory named
|
||||
/afs/transarc.com/usr/smith:
|
||||
|
||||
% fs quota .. /afs/transarc.com/usr/smith
|
||||
43% of quota used.
|
||||
92% of quota used.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs examine
|
||||
|
||||
fs listquota
|
||||
|
||||
fs setquota
|
||||
|
||||
fs setvol
|
@ -1,52 +0,0 @@
|
||||
fs rmmount AFS Commands fs rmmount
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs rmmount -- destroy mount point.
|
||||
|
||||
|
||||
+
|
||||
fs rmmount -dir <directory> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs rm -d <directory> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Removes the mount point called directory from the file
|
||||
system. The corresponding volume remains in the system, but
|
||||
will be inaccessible if there are no other mount points for
|
||||
it.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-dir names the mount point to be deleted from the file
|
||||
system. The last element in the pathname that the
|
||||
issuer provides must be an actual name, not "dot" (.)
|
||||
or "dot dot" (. .), which the fs command interpreter
|
||||
does not understand in this case.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following removes the mount points jones and terry from
|
||||
the current working directory (assume it is
|
||||
/afs/transarc.com/usr).
|
||||
|
||||
% fs rm jones terry
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have DELETE access for the directory containing
|
||||
the mount point.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs lsmount fs mkmount
|
@ -1,204 +0,0 @@
|
||||
fs setacl AFS Commands fs setacl
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setacl -- sets access control list for a directory.
|
||||
|
||||
|
||||
+ +
|
||||
fs setacl -dir <directory> -acl <access list entries>
|
||||
[-clear]
|
||||
[-negative] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+ +
|
||||
fs sa -d <directory> -a <access list entries> [-c] [-n]
|
||||
[-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Puts the specified access list entries on the access control
|
||||
list (ACL) of each specified directory.
|
||||
|
||||
WARNING
|
||||
|
||||
If the ACL already grants certain rights to a user or group,
|
||||
the rights specified with access list entries replace them,
|
||||
rather than just being added to them.
|
||||
|
||||
Setting negative rights is generally unnecessary and not
|
||||
recommended. Simply omitting a user or group from the
|
||||
Normal rights list is normally adequate to prevent access.
|
||||
In particular, note that it is futile to deny rights that
|
||||
are granted to system:anyuser on the same ACL; all the user
|
||||
needs to do is issue the unlog command to receive the denied
|
||||
rights.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-dir specifies each directory for which the
|
||||
access control list is to change.
|
||||
Abbreviated pathnames are interpreted
|
||||
relative to the directory in which the
|
||||
command is issued.
|
||||
|
||||
-acl defines a list of one or more entries, each
|
||||
of which specifies
|
||||
|
||||
- a user name or group name (letters
|
||||
all lowercase)
|
||||
|
||||
- the access right(s) to be
|
||||
associated with the user/group
|
||||
|
||||
in that order, separated by a space. This
|
||||
argument is unusual in requiring two parts
|
||||
for each instance. The accepted
|
||||
abbreviation of each right and the meaning
|
||||
of the right follows:
|
||||
|
||||
r READ. Allows the possessor to read the
|
||||
contents of files in the directory and
|
||||
to "stat" (issue ls -l for) file and
|
||||
|
||||
|
||||
|
||||
subdirectory elements in the directory.
|
||||
|
||||
w WRITE. Allows the possessor to modify
|
||||
the contents of files in the directory
|
||||
and to change their UNIX mode bits with
|
||||
chmod.
|
||||
|
||||
l LOOKUP. Allows the possessor to list
|
||||
the names of files and subdirectories
|
||||
in the directory (for example, by
|
||||
issuing ls). The possessor may "stat"
|
||||
(issue ls -l for) the directory itself
|
||||
(but not for files and subdirectories
|
||||
in it) and may examine the directory's
|
||||
ACL.
|
||||
|
||||
d DELETE. Allows the possessor to remove
|
||||
files from the directory.
|
||||
|
||||
i INSERT. Allows the possessor to create
|
||||
new files in the directory or move
|
||||
existing files into it.
|
||||
|
||||
k LOCK. Allows the possessor to run
|
||||
programs that need to issue the "flock"
|
||||
system call on files in the directory.
|
||||
|
||||
a ADMINISTER. Allows the possessor to
|
||||
change the directory's ACL.
|
||||
|
||||
A, B, C, D, E, F, G, H; by default, these
|
||||
have no meaning to AFS server
|
||||
processes. Administrators and
|
||||
application programs may assign
|
||||
meanings to them and place them on ACLs
|
||||
to control access to the directory's
|
||||
contents in new ways. The letters must
|
||||
be uppercase.
|
||||
|
||||
all all seven standard rights (rlidwka).
|
||||
|
||||
none no rights. Removes the user/group from
|
||||
the ACL, but may not guarantee they
|
||||
have no rights if they belong to groups
|
||||
that remain on the ACL.
|
||||
|
||||
read both r and l.
|
||||
|
||||
write
|
||||
all rights except ADMINISTER (rlidwk).
|
||||
|
||||
It is legal to mix the individual letters
|
||||
and the words within access list entries,
|
||||
but not within an individual pairing of
|
||||
user/group and rights.
|
||||
|
||||
-clear removes all existing entries on each access
|
||||
control list before placing access list
|
||||
entries on it. This should be used with
|
||||
caution: if access list entries does not
|
||||
grant all rights to the owner of the
|
||||
|
||||
|
||||
|
||||
directory, it can become awkward for the
|
||||
owner to access items in the directory. In
|
||||
particular, not having the LOOKUP right
|
||||
makes it impossible to resolve the "dot" ( .
|
||||
) and "dot dot" ( . . ) shorthand from
|
||||
within the directory.
|
||||
|
||||
-negative puts the specified access list entries in
|
||||
the Negative rights section of each access
|
||||
control list. The user/group is thus
|
||||
explicitly denied the indicated rights, even
|
||||
if entries on the accompanying Normal rights
|
||||
section of the access control list grant
|
||||
them rights. However, it is possible to
|
||||
unlog to obtain rights granted to
|
||||
system:anyuser on the Normal rights section
|
||||
of the same ACL; see the WARNING above.
|
||||
|
||||
This flag affects all directories and access
|
||||
list entries specified. Its use is not
|
||||
recommended; see the WARNING section above.
|
||||
If the issuer omits this flag, the access
|
||||
list entries go into the Normal rights
|
||||
section of the access control list.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following example adds two entries to the Normal rights
|
||||
part of the current working directory's ACL: the first entry
|
||||
grants READ and LOOKUP rights to pat:friends, while the
|
||||
other (using the write shorthand) gives all rights except
|
||||
ADMINISTER to smith.
|
||||
|
||||
% fs sa . pat:friends rl smith write
|
||||
|
||||
The following shows the effect of the -clear flag on the ACL
|
||||
of the subdirectory reports by showing the ACL before and
|
||||
after the command is issued:
|
||||
|
||||
% fs la reports Access list for reports is Normal rights:
|
||||
system:authuser rl pat:friends rlid smith rlidwk
|
||||
pat rlidwka Negative rights: terry rl
|
||||
|
||||
% fs sa -clear reports pat all smith write system:anyuser rl
|
||||
% fs la reports Access list for reports is Normal rights:
|
||||
system:anyuser rl smith rlidwk pat rlidwka
|
||||
|
||||
|
||||
|
||||
The following shows how the -dir and -acl switches are
|
||||
necessary when more than one directory is specified. The
|
||||
new entry granting READ, LOOKUP, and INSERT rights to
|
||||
pat:friends is added to the ACL for both the current
|
||||
directory and its public subdirectory.
|
||||
|
||||
% fs sa -d . public -a pat:friends rli
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have ADMINISTER rights to the directory; the
|
||||
directory's owner and members of system:administrators
|
||||
always do.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs copyacl
|
||||
|
||||
fs listacl
|
@ -1,97 +0,0 @@
|
||||
fs setcachesize AFS Commands fs setcachesize
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setcachesize -- set size of disk cache.
|
||||
|
||||
|
||||
fs setcachesize [-blocks <size in 1K byte blocks>] [-reset]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs setca [-b <size in 1K byte blocks>] [-r] [-h]
|
||||
|
||||
fs cachesize [-b <size in 1K byte blocks>] [-r] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
On machines using a disk cache, changes the amount of local
|
||||
disk space that the Cache Manager may use for its data
|
||||
cache. Specify the number in kilobyte blocks. This command
|
||||
is not operative on machines using memory caching.
|
||||
|
||||
To return the cache size to the default value specified in
|
||||
/usr/vice/etc/cacheinfo on the client's local disk, specify
|
||||
0 as the number of kilobyte blocks. The cacheinfo file is
|
||||
human-readable and visible with the cat command. The third
|
||||
and final field is the number of kilobyte blocks allocated
|
||||
to the cache at reboot. The chapter in the AFS System
|
||||
Administrator's Guide on client machine configuration
|
||||
further describes the contents of cacheinfo.
|
||||
|
||||
To return the cache size to the value set when the machine
|
||||
was last booted, use the -reset flag instead of the -blocks
|
||||
argument. This is normally the amount specified in
|
||||
cacheinfo, unless the -blocks argument was used on afsd to
|
||||
override the cacheinfo value.
|
||||
|
||||
The fs getcacheparms command displays the current actual
|
||||
cache size and the amount of space in use, both for disk and
|
||||
memory caches.
|
||||
|
||||
WARNINGS
|
||||
|
||||
This command is not operative on machines using memory
|
||||
caching, and will result in an error message.
|
||||
|
||||
On machines using a disk cache, do not set the cache size to
|
||||
exceed 90% of the actual disk space available for the cache
|
||||
directory. The cache implementation itself requires a small
|
||||
amount of room on the partition.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-blocks
|
||||
specifies the number of 1 kilobyte blocks the Cache
|
||||
Manager may devote to the cache. Specifying a value
|
||||
of "0" sets cache size to the default specified in
|
||||
cacheinfo. This implies that the smallest possible
|
||||
cache size is 1 kilobyte, not 0.
|
||||
|
||||
-reset
|
||||
returns the cache size to the value set when the
|
||||
|
||||
|
||||
|
||||
machine was last booted. This agrees with the value
|
||||
in cacheinfo unless the -blocks argument was used on
|
||||
afsd.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following sets the disk cache size to 25000 kilobyte
|
||||
blocks.
|
||||
|
||||
% fs setca 25000
|
||||
|
||||
Both of the following reset the disk cache size to the value
|
||||
in cacheinfo, assuming that the -blocks argument on afsd was
|
||||
not used.
|
||||
|
||||
% fs setcachesize 0 % fs setca -r
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged in as "root" in the UNIX file system
|
||||
of the machine on which the command is being issued.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs getcacheparms
|
@ -1,81 +0,0 @@
|
||||
fs setcell AFS Commands fs setcell
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setcell -- allow or disallow running of setuid programs
|
||||
|
||||
from specified cells.
|
||||
|
||||
|
||||
+
|
||||
fs setcell -cell <cell name> [-suid] [-nosuid] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs setce -c <cell name> [-s] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Determines whether the workstation allows programs whose
|
||||
binary files reside in the indicated cells to execute with
|
||||
setuid privilege. By default, programs originating in the
|
||||
local cell (as determined by /usr/vice/etc/ThisCell) may run
|
||||
with setuid privilege, but programs originating in foreign
|
||||
cells may not. Use the fs getcellstatus command to displays
|
||||
a cell's current status in this respect.
|
||||
|
||||
Include the -suid flag with the command to allow programs
|
||||
from the specified cells to execute with setuid privilege;
|
||||
include the -nosuid flag with the command to prohibit
|
||||
programs from the specified cells from executing with setuid
|
||||
privilege. Use either the -suid flag or the -nosuid flag.
|
||||
Omit both flags to prevent programs from the specified cells
|
||||
from executing with setuid privilege.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-cell names each cell from which to allow or
|
||||
disallow programs to execute with setuid
|
||||
privilege. Provide the complete Internet-
|
||||
style cell name of each cell (unlike the
|
||||
-cell argument common to many commands, the
|
||||
cell argument of this command does not
|
||||
accept abbreviated cell names).
|
||||
|
||||
-suid allows programs from cell name to execute
|
||||
with setuid privilege. Provide it or
|
||||
provide -nosuid. Omit both flags to prevent
|
||||
programs from cell name from executing with
|
||||
setuid privilege.
|
||||
|
||||
-nosuid prevents programs from cell name from
|
||||
executing with setuid privilege. Provide it
|
||||
or provide -suid. Omit both flags to
|
||||
prevent programs from cell name from
|
||||
executing with setuid privilege.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
|
||||
|
||||
The following enables programs whose binary files reside in
|
||||
the Transarc Cell to execute with setuid privilege in the
|
||||
local cell:
|
||||
|
||||
% fs setc transarc.com -s
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged in as "root" in the UNIX file system
|
||||
of the machine on which the command is issued.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs getcellstatus
|
@ -1,73 +0,0 @@
|
||||
fs setquota AFS Commands fs setquota
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setquota -- sets maximum quota for volume containing
|
||||
|
||||
specified directory.
|
||||
|
||||
|
||||
fs setquota [-path <dir/file path>] -max <max quota in
|
||||
kbytes> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs sq [-p <dir/file path>] -m <max quota in kbytes> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Sets the maximum size quota for the volume that contains the
|
||||
specified directory or file. The fs examine and fs
|
||||
listquota commands show the current maximum quota. The fs
|
||||
quota command shows the percent of maximum quota used.
|
||||
|
||||
The fs setvol command can be used to set the quota on
|
||||
multiple volumes at once. It can also be used to create
|
||||
messages associated with the volumes.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path names the directory or file for which quota
|
||||
on the host volume is to be set. If this
|
||||
argument is omitted, the current working
|
||||
directory is used; in this case, the -max
|
||||
switch must be used.
|
||||
|
||||
-max specifies the maximum amount of disk space
|
||||
the volume can use. Express it in kilobyte
|
||||
blocks (a value of 1024 is one megabyte). A
|
||||
value of 0 grants an unlimited quota, but
|
||||
the size of the disk partition that houses
|
||||
the volume places an absolute limit on the
|
||||
volume's maximum size.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following imposes a maximum quota of 3000 kilobytes on
|
||||
the volume that houses the directory
|
||||
/afs/transarc.com/usr/smith:
|
||||
|
||||
% fs sq /afs/transarc.com/usr/smith 3000
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must belong to the system:administrators group in the
|
||||
Protection Database.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
|
||||
|
||||
fs examine
|
||||
|
||||
fs listquota
|
||||
|
||||
fs quota
|
||||
|
||||
fs setvol
|
@ -1,232 +0,0 @@
|
||||
fs setserverprefs AFS Commands fs setserverprefs
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setserverprefs -- set Cache Manager's preferences for
|
||||
|
||||
file server machines.
|
||||
|
||||
|
||||
+
|
||||
fs setserverprefs [-servers <machine name and rank> ]
|
||||
[-file <dir/file path>] [-stdin] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs sets [-se <machine name and rank> ] [-f <dir/file
|
||||
path>]
|
||||
[-st] [-h]
|
||||
+
|
||||
fs sp [-se <machine name and rank> ] [-f <dir/file path>]
|
||||
[-st] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Sets the Cache Manager's preference for one or more file
|
||||
server machines. Each Cache Manager stores a table of file
|
||||
server machines and their respective "ranks." A file server
|
||||
machine's rank is an integer in the range from 1 to 65,534
|
||||
that determines the Cache Manager's preference for selecting
|
||||
the server machine when the Cache Manager must access a
|
||||
ReadOnly replica that resides on it. Ranks bias the Cache
|
||||
Manager to prefer to access replicas on "near" server
|
||||
machines rather than those on "distant" server machines.
|
||||
|
||||
When the Cache Manager needs to access a ReadOnly replica,
|
||||
it first contacts the Volume Location (VL) Server to
|
||||
ascertain the names of the file server machines on which the
|
||||
replica resides. It then checks its internal table to
|
||||
determine the rank associated with each of the file server
|
||||
machines. After comparing the ranks of the machines, it
|
||||
attempts to access the replica on the server machine that
|
||||
has the lowest integer rank.
|
||||
|
||||
If the Cache Manager cannot access the replica on the
|
||||
machine with the lowest rank (possibly because of a server
|
||||
process, machine, or network outage), it attempts to access
|
||||
the replica on the machine with the next lowest rank. It
|
||||
continues in this way until it either accesses the replica
|
||||
or determines that all of the file server machines on which
|
||||
the replica is housed are unavailable.
|
||||
|
||||
Each time it is initialized with the afsd command, the Cache
|
||||
Manager assigns preferences to any database server machines
|
||||
listed in the local /usr/vice/etc/CellServDB file that are
|
||||
also file server machines. It stores the preferences as
|
||||
machine IP addresses and associated ranks in the kernel of
|
||||
the client machine. (See the DETERMINING PREFERENCES
|
||||
section for more information about how the Cache Manager
|
||||
determines actual file server machine ranks.) Because they
|
||||
are stored in the kernel, the preferences are recalculated
|
||||
when the client machine is rebooted.
|
||||
|
||||
The Cache Manager assigns ranks to file server machines in
|
||||
|
||||
|
||||
|
||||
the local cell and from foreign cells as necessary. When it
|
||||
needs to access a ReadOnly volume, it first determines the
|
||||
machines on which the replica resides. It then assigns
|
||||
ranks to any of the machines that do not already have them
|
||||
and stores the ranks in the kernel, after which it uses the
|
||||
ranks as the basis of its selection of the file server
|
||||
machine from which to access the replica.
|
||||
|
||||
The fs setserverprefs command can be used to define or
|
||||
change the rank associated with a local or foreign file
|
||||
server machine. If the Cache Manager has no rank for the
|
||||
machine, the command defines the machine's initial rank. If
|
||||
the Cache Manager already has a rank for the machine, the
|
||||
command changes the rank to match the one specified by the
|
||||
issuer; the old rank is overwritten.
|
||||
|
||||
Preferences are specified as pairs of values. The first
|
||||
value is the file server machine, the second the machine's
|
||||
rank. File server machines can be specified by name or by
|
||||
IP address. Depending on the naming service available at
|
||||
the time the command is issued, abbreviated forms of machine
|
||||
names may be allowed. See the introductory About This
|
||||
Manual chapter for more information.
|
||||
|
||||
Pairs of file server machines and their ranks can be
|
||||
specified
|
||||
|
||||
- on the command line with the -servers switch
|
||||
|
||||
- from a file with the -file switch
|
||||
|
||||
- from stdin with the -stdin flag
|
||||
|
||||
The -file switch and -stdin flag are especially useful for
|
||||
configuring multiple Cache Managers in a cell with the same
|
||||
preferences. The -file switch can be used to indicate a
|
||||
file created manually or generated automatically with the fs
|
||||
getserverprefs command. Similarly, the -stdin flag can be
|
||||
used to accept preferences piped directly from another
|
||||
process (possibly from another Cache Manager with the fs
|
||||
getserverprefs command). The -servers, -file, and -stdin
|
||||
switches and flag are not mutually exclusive, so multiple
|
||||
sources of preferences are permitted.
|
||||
|
||||
It is possible for the Cache Manager or a user to assign the
|
||||
same rank to multiple file server machines housing a replica
|
||||
of the same volume. In this case, the Cache Manager uses
|
||||
methods described in the following section, ASSIGNING
|
||||
PREFERENCES, to break the tie. It then increments the ranks
|
||||
of the file server machines from which it does not access
|
||||
the replica.
|
||||
|
||||
ASSIGNING PREFERENCES
|
||||
|
||||
When initially assigning preferences, the Cache Manager
|
||||
bases the ranks on IP addresses, rather than on actual
|
||||
physical considerations such as location or distance. It
|
||||
calculates file server machine ranks according to the
|
||||
following heuristic:
|
||||
|
||||
- If the client machine is also a file server
|
||||
|
||||
|
||||
|
||||
machine, the machine receives a rank of 5000.
|
||||
|
||||
- If the client machine is in a subnet, all file
|
||||
server machines in the same subnet as the client
|
||||
machine receive an initial rank of 20000.
|
||||
|
||||
- All file server machines in the same network as
|
||||
the client machine receive an initial rank of
|
||||
30000.
|
||||
|
||||
- All file server machines on the distant ends of
|
||||
point-to-point links from the client machine
|
||||
receive an initial rank of 30000.
|
||||
|
||||
- All file server machines on networks not directly
|
||||
connected to the client machine receive a rank of
|
||||
40000.
|
||||
|
||||
- All file server machines for which no network
|
||||
locality information can be determined receive a
|
||||
default rank of 40000.
|
||||
|
||||
The Cache Manager also considers additional metrics
|
||||
associated with networks, subnets, and interfaces when it
|
||||
determines ranks.
|
||||
|
||||
If the same ReadOnly replica is stored on multiple file
|
||||
server machines that have the same rank, the Cache Manager
|
||||
employs the metrics mentioned previously to resolve the
|
||||
duplicate rank collisions. If necessary, the Cache Manager
|
||||
randomizes its ranking of the tied machines. It resolves
|
||||
the ties internally by incrementing by one the ranks of the
|
||||
machines from which it chooses not to access the replica.
|
||||
|
||||
NOTE
|
||||
|
||||
The Cache Manager consults preferences only when accessing
|
||||
ReadOnly replicas of volumes. It does not consider the
|
||||
preferences when contacting the VL Server on a database
|
||||
server machine to determine the location of a volume. Its
|
||||
access of database server machines is still random.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-servers specifies one or more pairs of file server
|
||||
machines and their respective ranks.
|
||||
Identify file server machines by name or by
|
||||
IP address. See the DESCRIPTION section for
|
||||
more information on specifying file server
|
||||
machines and their ranks.
|
||||
|
||||
-file specifies the pathname of a file that
|
||||
contains pairs of file server machines and
|
||||
their respective ranks. Identify file
|
||||
server machines by name or by IP address.
|
||||
See the DESCRIPTION section for more
|
||||
information on specifying file server
|
||||
machines and their ranks.
|
||||
|
||||
-stdin indicates that pairs of file server machines
|
||||
and their respective ranks are to be read
|
||||
|
||||
|
||||
|
||||
from stdin. Identify file server machines
|
||||
by name or by IP address. See the
|
||||
DESCRIPTION section for more information on
|
||||
specifying file server machines and their
|
||||
ranks.
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following sets preference ranks for three file server
|
||||
machines. In this example, the server machines have no
|
||||
replicas in common, so no potential collisions are
|
||||
associated with their all having the same rank.
|
||||
|
||||
% fs sets -se fs1.transarc.com 10000 fs2.transarc.com 10000
|
||||
\ 128.2.11.12 10000
|
||||
|
||||
The following defines a rank for one file server machine
|
||||
from the command line and reads ranks for additional file
|
||||
server machines from a file named prefs.txt in the current
|
||||
directory:
|
||||
|
||||
% fs sets -se fs4.transarc.com 10010 -f prefs.txt
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged in as "root" in the UNIX file system
|
||||
of the machine on which the command is issued.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs getserverprefs
|
@ -1,94 +0,0 @@
|
||||
fs setvol AFS Commands fs setvol
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs setvol -- set maximum quota and messages for each volume
|
||||
|
||||
containing specified directory.
|
||||
|
||||
|
||||
+
|
||||
fs setvol [-path <dir/file path> [-max <disk space quota
|
||||
in 1K units>]
|
||||
[-motd <message of the day>] [-offlinemsg <offline
|
||||
message>]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs sv [-p <dir/file path> ] [-ma <disk space quota in 1K
|
||||
units>]
|
||||
[-mo <message of the day>] [-o <offline message>] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Sets maximum quota for the volumes that contain each
|
||||
specified directory or file. It is also possible to use
|
||||
-motd and -offlinemsg to create messages associated with the
|
||||
volume, which appear when the fs examine command is issued.
|
||||
|
||||
The fs examine command displays all the information that can
|
||||
be altered with this command. The fs listquota command
|
||||
displays maximum quota, and the fs quota command displays
|
||||
the percent quota used.
|
||||
|
||||
The fs setquota command sets maximum quota on one volume at
|
||||
a time.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path names each file and/or directory for which
|
||||
quota and messages on the host volumes are
|
||||
to be set. Omit this switch to affect the
|
||||
volume that contains the current working
|
||||
directory.
|
||||
|
||||
-max specifies the maximum amount of disk space
|
||||
the volume can use. Express it in kilobyte
|
||||
blocks (a value of 1024 is one megabyte). A
|
||||
value of 0 grants an unlimited quota, but
|
||||
the size of the disk partition housing the
|
||||
volume places an absolute limit on the
|
||||
volume's maximum size.
|
||||
|
||||
-motd specifies a "message of the day" displayed
|
||||
with the fs examine command. It can be used
|
||||
to alert users to anything of interest
|
||||
concerning the volume.
|
||||
|
||||
-offlinemsg specifies a message displayed with the fs
|
||||
examine command. It can be used to explain
|
||||
why the volume is currently offline.
|
||||
|
||||
-help prints the online help entry for this
|
||||
|
||||
|
||||
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following imposes a 6500 kilobyte quota on the volumes
|
||||
housing the /afs/transarc.com/usr/smith and
|
||||
/afs/transarc.com/usr/pat home directories:
|
||||
|
||||
% cd /afs/transarc.com/usr % fs sv -p smith pat -ma 6500
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must belong to the system:administrators group in the
|
||||
Protection Database.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs examine
|
||||
|
||||
fs listquota
|
||||
|
||||
fs quota
|
||||
|
||||
fs setquota
|
@ -1,112 +0,0 @@
|
||||
fs sysname AFS Commands fs sysname
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs sysname -- report or set CPU/operating system type.
|
||||
|
||||
|
||||
fs sysname [-newsys <new sysname>] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs sy [-n <new sysname>] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Depending on whether the issuer provides the -newsys
|
||||
argument,
|
||||
|
||||
EITHER sets the indicator of CPU/operating system type in th
|
||||
the machine on which the command is issued
|
||||
|
||||
OR reports the current setting.
|
||||
|
||||
If the command is issued on an AFS client machine, the value
|
||||
is set/reported for the machine itself.
|
||||
|
||||
If the command is issued on an NFS client machine accessing
|
||||
AFS via the NFS/AFS Translator, then the specified CPU/OS
|
||||
value is set/reported for the NFS client machine. The
|
||||
information is in a record maintained by the AFS client
|
||||
machine serving as the NFS client's NFS/AFS translator
|
||||
machine. The translator machine maintains a separate record
|
||||
for each user logged into the NFS client. This implies that
|
||||
if a user adopts a new identity (UNIX UID) during a login
|
||||
session on the NFS clientMperhaps using suMhe or she must
|
||||
issue this command again. Setting this indicator allows the
|
||||
translator machine to provide the NFS client with the proper
|
||||
version of program binaries when the user issues commands
|
||||
for which the binaries are kept in the AFS file tree.
|
||||
|
||||
The Cache Manager's main use of this indicator is as a value
|
||||
for the "@sys" variable which can occur in AFS pathnames.
|
||||
As the Cache Manager interprets pathnames, it substitutes
|
||||
the indicator's value for any occurrence of @sys. See the
|
||||
EXAMPLES section for an example. (Note that @sys should be
|
||||
used sparingly, as it can make the effect of changing
|
||||
directories unpredictable; see the AFS System
|
||||
Administrator's Guide for further information.)
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-newsys specifies the new setting of the CPU/operating
|
||||
system indicator for the machine on which it is
|
||||
issued. If the issuer omits it, the output shows
|
||||
the current setting. Consult the AFS System
|
||||
Administrator's Guide for a complete list of the
|
||||
legal values and the CPU/OS types they represent.
|
||||
|
||||
-help prints the online help entry for this command. Do
|
||||
not provide any other arguments or flags with this
|
||||
one. See section 3.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output reports the machine's system type in the format
|
||||
|
||||
Current sysname is 'system type'
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output produced on a Sun
|
||||
SPARCStation running SunOS 4.1:
|
||||
|
||||
% fs sy Current sysname is 'sun4c_41'
|
||||
|
||||
The following defines a machine to be a DECStation running
|
||||
Ultrix 4.1:
|
||||
|
||||
% fs sysname pmax_ul4
|
||||
|
||||
When the Cache Manager on the machine encounters a pathname
|
||||
with the @sys variable in it, it substitutes pmax_ul4 for
|
||||
the variable. For instance, this machine would interpret
|
||||
the pathname
|
||||
|
||||
/afs/transarc.com/@sys/usr/bin
|
||||
as
|
||||
/afs/transarc.com/pmax_ul4/usr/bin
|
||||
and would access the volume corresponding to that directory.
|
||||
A machine whose CPU/OS type was rt_aos4 would interpret the
|
||||
same pathname as
|
||||
|
||||
/afs/transarc.com/rt_aos4/usr/bin
|
||||
|
||||
and so would access a volume different from that accessed by
|
||||
the DECStation.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None, if the machine is an NFS client. If the machine is an
|
||||
AFS client, the issuer must be logged into the local UNIX
|
||||
file system as "root."
|
||||
|
||||
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs exportafs
|
@ -1,69 +0,0 @@
|
||||
fs whereis AFS Commands fs whereis
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs whereis -- report name of file server machine(s) housing
|
||||
|
||||
specified file/directory.
|
||||
|
||||
|
||||
+
|
||||
fs whereis [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs whe [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Returns the name of the file server machines that house each
|
||||
specified directory or file. See the OUTPUT section for a
|
||||
description of the information displayed.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file or directory whose location is to
|
||||
be returned. Each specified file or directory must
|
||||
reside in AFS (not on a local disk). If the issuer
|
||||
omits this argument, the location of the working
|
||||
directory is returned.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output includes a line for each specified directory or
|
||||
file. It names the file server machine on which the volume
|
||||
that houses the specified directory or file resides. A list
|
||||
of multiple machines indicates that the directory or file is
|
||||
in a replicated volume.
|
||||
|
||||
Machine names usually have a suffix indicating their cell
|
||||
membership. If some question remains, the fs whichcell
|
||||
command names the cell in which a directory or file resides.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following indicates that the directory /afs/transarc.com
|
||||
resides in a replicated volume located on both
|
||||
fs1.transarc.com and fs3.transarc.com:
|
||||
|
||||
% fs whe /afs/transarc.com File /afs/transarc.com is on
|
||||
hosts fs1.transarc.com fs3.transarc.com
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs whichcell
|
||||
|
||||
fs wscell
|
@ -1,61 +0,0 @@
|
||||
fs whichcell AFS Commands fs whichcell
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs whichcell -- return name of cell to which specified
|
||||
|
||||
file/directory belongs.
|
||||
|
||||
|
||||
+
|
||||
fs whichcell [-path <dir/file path> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
fs whi [-p <dir/file path> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Returns the name of the cell in which the volume that houses
|
||||
each indicated directory or file resides. See the OUTPUT
|
||||
section for a description of the information displayed.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-path specifies each file and/or directory whose cell
|
||||
membership is to be returned. Each specified
|
||||
directory or file must reside in AFS (not on a local
|
||||
disk). If the issuer omits this argument, the cell of
|
||||
the working directory is returned.
|
||||
|
||||
-help prints the online help entry for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 3.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output includes a line for each specified directory or
|
||||
file, naming the cell in which the directory or file
|
||||
resides.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows that the current directory resides in a
|
||||
volume in the Transarc Corporation cell:
|
||||
|
||||
% fs whi File . lives in cell 'transarc.com'
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs whereis
|
||||
|
||||
fs wscell
|
@ -1,50 +0,0 @@
|
||||
fs wscell AFS Commands fs wscell
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
fs wscell -- return name of cell to which workstation
|
||||
|
||||
belongs.
|
||||
|
||||
|
||||
fs wscell [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
fs ws [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Returns the name of the home cell for the workstation from
|
||||
which the command is issued.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help entry for this
|
||||
command. Do not provide any other arguments
|
||||
or flags with this one. See section 3.1 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The reported cell name comes from the file
|
||||
/usr/vice/etc/ThisCell on the workstation's local disk.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following results when the fs wscell is issued on a
|
||||
machine in the Transarc Corporation cell:
|
||||
|
||||
% fs wscell
|
||||
This workstation belongs to cell 'transarc.com'
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
fs whereis
|
||||
|
||||
fs whichcell
|
207
src/man/kas.1
207
src/man/kas.1
@ -1,207 +0,0 @@
|
||||
AFS Commands
|
||||
|
||||
|
||||
NAME
|
||||
AFS Commands
|
||||
|
||||
|
||||
1. The kas Commands
|
||||
|
||||
------------------------------------------------------------
|
||||
|
||||
This chapter defines the kas commands that system
|
||||
administrators use to contact the Authentication Server. It
|
||||
assumes the reader is familiar with the concepts described
|
||||
in the AFS System Administrator's Guide.
|
||||
|
||||
The kas command interface allows system administrators to
|
||||
create, modify, examine and delete entries in the
|
||||
Authentication Database maintained by the Authentication
|
||||
Server. Individual users may use the kas setpassword
|
||||
command to change their own password (as well as the more
|
||||
standard, non-kas command, kpasswd).
|
||||
|
||||
Refer to the Command Summary at the end of this document for
|
||||
a complete list of kas commands and their syntax.
|
||||
AFS Command Reference Manual The kas Commands 2
|
||||
|
||||
|
||||
1.1 The kas Interface
|
||||
The kas command interface differs slightly from the others
|
||||
described in this manual. The Authentication Server
|
||||
authenticates issuers of kas commands directly rather than
|
||||
accepting a ticket from the Ticket Granting Service as most
|
||||
other servers do. Thus most commands require that the
|
||||
issuer provide his or her password at the time of issue.
|
||||
|
||||
|
||||
|
||||
1.1.1 Interactive Mode
|
||||
Providing the password each time could get tedious if the
|
||||
user needed to execute a whole set of commands, so kas
|
||||
provides an "interactive" mode in which it is not necessary
|
||||
to provide a password repeatedly.
|
||||
|
||||
|
||||
1.1.1.1 Entering Interactive Mode
|
||||
There are several ways to enter interactive mode:
|
||||
|
||||
- Use the kas interactive command.
|
||||
|
||||
- Type kas without any operation code. By default,
|
||||
the command interpreter establishes a connection
|
||||
with each Authentication Server in the local cell.
|
||||
They attempt to authenticate the user logged into
|
||||
the machine from which the command is issued,
|
||||
based on the password the issuer provides at the
|
||||
prompt. The issuer may specify an alternate
|
||||
identity, password, cell name and/or list of
|
||||
Authentication Servers by using the first four
|
||||
common arguments described in section 4.3 in the
|
||||
Reference Manual . Type kas followed by a user
|
||||
name and cell name, separated by an "@" sign
|
||||
(example: kas smith@transarc.com). The
|
||||
Authentication Server attempts to authenticate the
|
||||
specified user in the specified cell, and prompts
|
||||
for his or her password in the specified cell.
|
||||
This method is most useful when the issuer wishes
|
||||
to enter interactive mode with a different
|
||||
identity in a different cell.
|
||||
|
||||
|
||||
1.1.1.2 Effects of Entering Interactive Mode
|
||||
While in interactive mode:
|
||||
|
||||
|
||||
- The "ka>" prompt replaces the issuer's regular
|
||||
prompt.
|
||||
|
||||
- It is no longer necessary or legal to type kas at
|
||||
the beginning of a command. Type the operation
|
||||
code as the first part of the command.
|
||||
|
||||
- The Authentication Server does not prompt for the
|
||||
issuer's password at each command. This is the
|
||||
mode's main advantage.
|
||||
|
||||
- The issuer's identity and cell are set and cannot
|
||||
be changed without leaving interactive mode, so it
|
||||
is not legal to provide any of the common
|
||||
AFS Command Reference Manual The kas Commands 3
|
||||
|
||||
|
||||
arguments described fully in section 4.3 in the
|
||||
Reference Manual , except for -help.
|
||||
|
||||
1.2 Information in the Authentication Database
|
||||
Both individual users and servers have entries in the
|
||||
Authentication Database. The two most important fields in
|
||||
an entry are:
|
||||
|
||||
- the name
|
||||
|
||||
- the key (a scrambled form of name's password,
|
||||
suitable for use as an encryption key)
|
||||
|
||||
For individual users, the name field holds the user name as
|
||||
typed at login, and key holds a scrambled form of the
|
||||
password the user has created.
|
||||
|
||||
Server entries are the same as user entries. The entry name
|
||||
for the AFS server processes is "afs". A server entry's key
|
||||
field contains the server encryption key that the Ticket
|
||||
Granting Service (TGS) uses to seal the tickets it gives to
|
||||
clients so that they may contact the server processes.
|
||||
|
||||
1.3 Common Arguments and Flags
|
||||
When not in interactive mode, most kas commands accept the
|
||||
following optional arguments and flags. Some of these are
|
||||
unavailable in interactive mode because the information they
|
||||
provide is established while entering interactive mode, and
|
||||
cannot be changed from within interactive mode. They are
|
||||
listed in the command descriptions where they apply, and are
|
||||
described in detail below:
|
||||
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
|
||||
This argument allows the issuer to assume the identity of
|
||||
the specified user name (which is referred to as an "admin
|
||||
principal"). By default, the Authentication Server attempts
|
||||
to authenticate the user logged into the local workstation.
|
||||
|
||||
[-password_for_admin <admin password>]
|
||||
|
||||
This argument provides the Authentication Server with the
|
||||
password needed to prove that the issuer of the command (the
|
||||
admin principal) is legitimate (which it will if it matches
|
||||
the password stored in the Authentication Database for the
|
||||
issuer). Note that providing this argument on the command
|
||||
line reveals the password on the screen. Issuers may prefer
|
||||
to respond to the prompt that will appear if this argument
|
||||
is not provided, as the password does not echo visibly in
|
||||
that case.
|
||||
|
||||
[-cell <cell name>]
|
||||
|
||||
This argument specifies that the command should be run in a
|
||||
different cell, specified by cell name. By default,
|
||||
commands are executed in the local cell, as defined in
|
||||
/usr/vice/etc/ThisCell on the client machine on which the
|
||||
command is issued. The issuer may abbreviate cell name to
|
||||
the shortest form that distinguishes it from the other cells
|
||||
listed in /usr/vice/etc/CellServDB on the client machine on
|
||||
AFS Command Reference Manual The kas Commands 4
|
||||
|
||||
|
||||
which the command is issued.
|
||||
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ]
|
||||
|
||||
This argument causes the kas command interpreter to
|
||||
establish a connection with the Authentication Server
|
||||
running on each specified database server machine. It then
|
||||
chooses one of these at random to execute each subsequent
|
||||
command. The issuer may abbreviate the machine name to the
|
||||
extent the cell's name server will accept.
|
||||
|
||||
By default, the kas command interpreter establishes a
|
||||
connection with each machine listed in the local
|
||||
workstation's copy of /usr/vice/etc/CellServDB, and then
|
||||
chooses one of those at random for command execution.
|
||||
|
||||
This option is useful for testing specific servers if
|
||||
problems are encountered.
|
||||
|
||||
[-noauth]
|
||||
|
||||
This flag instructs indicated Authentication Server(s) not
|
||||
to authenticate the issuer of the command, and thus
|
||||
establishes an unauthenticated connection between the issuer
|
||||
and the Authentication Server (he or she is recognized as
|
||||
the unprivileged user anonymous). It is useful only when
|
||||
authorization checking is disabled on the file server
|
||||
machine (during the installation of a file server machine or
|
||||
when bos setauth has been used during other unusual
|
||||
circumstances). In normal circumstances, the Authentication
|
||||
Server allows only authorized (privileged) users to issue
|
||||
most kas commands, and will refuse to execute the requested
|
||||
actions even if the -noauth flag is used.
|
||||
|
||||
[-help]
|
||||
|
||||
This flag has the same function as the kas help command: it
|
||||
prints the command's online help message on the screen. No
|
||||
other arguments or flags should be provided at the same
|
||||
time. Even if they are, this flag overrides them, and the
|
||||
only effect of issuing the command is that the help message
|
||||
appears.
|
||||
|
||||
1.4 The Privilege Required for kas Commands
|
||||
The Authentication Server considers privileged those users
|
||||
who have the ADMIN flag turned on in their Authentication
|
||||
Database entry. See the kas setfields command to learn how
|
||||
to turn on the ADMIN flag. Most kas commands require that
|
||||
the issuer be privileged. All commands will prompt for a
|
||||
password, unless the issuer has entered interactive mode.
|
@ -1,64 +0,0 @@
|
||||
kas apropos AFS Commands kas apropos
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas apropos -- show each help entry containing keyword.
|
||||
|
||||
|
||||
kas apropos -topic <help string> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas a -t <help string> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line of the help entry for any kas
|
||||
command that has help string in its name or short
|
||||
description.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic
|
||||
specifies the keyword string to search for. If it is
|
||||
more than a single word, surround it with double
|
||||
quotes or other delimiters. Type all help strings for
|
||||
kas commands in all lowercase letters, except the word
|
||||
"AuthServer."
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The first line of a command's online help entry names the
|
||||
command and briefly describes what it does. The kas apropos
|
||||
command displays that first line for any kas command where
|
||||
help string is part of the command name or first line.
|
||||
|
||||
To see the remaining lines in a help entry, which provide
|
||||
the command's alias (if any) and syntax, use the kas help
|
||||
command.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following lists all kas commands that have the word
|
||||
"key" in their operation code or short online description.
|
||||
|
||||
% kas a key
|
||||
getrandomkey: get a random key
|
||||
setkey: set a user's key
|
||||
stringtokey: convert a string to a key
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. No password will be prompted for.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas help
|
@ -1,107 +0,0 @@
|
||||
kas create AFS Commands kas create
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas create -- create an entry in the Authentication
|
||||
|
||||
Database.
|
||||
|
||||
|
||||
kas create -name <name of user> [-initial_password
|
||||
<initial password>]
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ] [-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas c -na <name of user> [-i <initial password>]
|
||||
[-a <admin principal to use for authentication>] [-p <admin
|
||||
password>]
|
||||
[-c <cell name>] [-s <explicit list of authentication
|
||||
+
|
||||
servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates an entry in Authentication Database for name of
|
||||
user. The Authentication Server converts initial password
|
||||
into a form suitable for use as an encryption key, and
|
||||
places it in the entry's key field.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the name of the new
|
||||
Authentication Database entry. It will be
|
||||
the user name under which the user logs in
|
||||
to the system.
|
||||
|
||||
-initial_password specifies a character string that will
|
||||
become the user's password. The
|
||||
Authentication Server scrambles it into an
|
||||
octal key and places it in the key field
|
||||
of the Database entry. If the issuer does
|
||||
not provide it, it will be prompted for
|
||||
(if it is not provided at the prompt the
|
||||
create operation fails). The advantage of
|
||||
waiting for the prompt is that the
|
||||
password does not echo on the screen.
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
|
||||
|
||||
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows the prompts that appear when someone
|
||||
authenticated as admin creates an Authentication Database
|
||||
entry for the user smith, and does not specify smith's
|
||||
initial password on the command line. The passwords typed
|
||||
at the prompts do not echo visibly.
|
||||
|
||||
% kas cr smith Password for admin: initial_password:
|
||||
Verifying, please re-enter initial_password:
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have the ADMIN flag set in his or her
|
||||
Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas examine
|
@ -1,88 +0,0 @@
|
||||
kas debuginfo AFS Commands kas debuginfo
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas debuginfo -- produce debugging trace for the
|
||||
|
||||
Authentication Server.
|
||||
|
||||
|
||||
kas debuginfo [-hostname <authentication server host name>]
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ]
|
||||
[-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas deb [-ho <authentication server host name>]
|
||||
[-a <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-n] [-he]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays information on the standard output device (stdout)
|
||||
which is helpful in debugging the Authentication Server.
|
||||
This information is useful only for someone familiar with
|
||||
the implementation of the Authentication Server and the
|
||||
internal structure of the Authentication Database. Most
|
||||
system administrators will not find it helpful.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-hostname names the database server machine for
|
||||
which to display debugging information
|
||||
about the Authentication Server instance
|
||||
it is running.
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
|
||||
|
||||
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. A password will be prompted for unless the -noauth
|
||||
flag is provided. The issuer must type some character
|
||||
string at the prompt, but even providing the wrong one does
|
||||
not prevent the command from being executed, despite
|
||||
possible error messages.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas statistics
|
@ -1,97 +0,0 @@
|
||||
kas delete AFS Commands kas delete
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas delete -- delete entry from the Authentication
|
||||
|
||||
Database.
|
||||
|
||||
|
||||
kas delete -name <name of user>
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ] [-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas del -na <name> [-a <admin principal to use for
|
||||
authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
kas rm -na <name> [-a <admin principal to use for
|
||||
authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Removes the entry name of user from the Authentication
|
||||
Database. If name of user is a user, he or she becomes
|
||||
unable to log in. If name of user is a server, it becomes
|
||||
unreachable, because the TGS can no longer has anything with
|
||||
which to seal tickets for the server.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the name of the Database entry
|
||||
to delete
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
|
||||
|
||||
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
In the following the issuer admin enters interactive mode in
|
||||
order to make it more convenient to delete three accounts at
|
||||
once. The password typed at the prompt does not echo
|
||||
visibly.
|
||||
|
||||
% kas Password for admin: ka> del smith ka> del pat ka>
|
||||
del terry
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have the ADMIN flag set in his or her
|
||||
Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
@ -1,220 +0,0 @@
|
||||
kas examine AFS Commands kas examine
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas examine -- display information from an Authentication
|
||||
|
||||
Database entry.
|
||||
|
||||
|
||||
kas examine -name <name of user>
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ] [-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas e -na <name of user> [-a <admin principal to use for
|
||||
authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Formats and displays information from the Authentication
|
||||
Database entry for name. See the OUTPUT section for
|
||||
details.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the Database entry from which to
|
||||
display information.
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
|
||||
|
||||
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output reports, in this order:
|
||||
|
||||
- the name of the entry
|
||||
|
||||
- one or more status flags, which will only appear
|
||||
if a system administrator has used the
|
||||
kas setfields command to change a flag from its
|
||||
default value. A plus sign (+) will separate the
|
||||
flags if more than one appears. The non-default
|
||||
values which may appear, and their meanings, are:
|
||||
|
||||
* ADMIN. the user is allowed to issue
|
||||
privileged kas commands (Default: NOADMIN.)
|
||||
|
||||
* NOTGS. the Ticket Granting Service will
|
||||
refuse to issue tickets to the user (Default:
|
||||
TGS.)
|
||||
|
||||
* NOSEAL. the Ticket Granting Service cannot
|
||||
use the contents of this entry's key field as
|
||||
an encryption key (Default: SEAL.)
|
||||
|
||||
* NOCPW. the user or server cannot change
|
||||
his/her/its own password or key (Default:
|
||||
CPW.)
|
||||
|
||||
- the word "key" followed by the key version number
|
||||
in parentheses.
|
||||
|
||||
The octal key itself appears only if authorization
|
||||
checking is disabled on the database server
|
||||
machine to which the kas examine command is
|
||||
directed with the -servers argument (see the
|
||||
EXAMPLES section). The reasoning behind this
|
||||
requirement is two-fold. First, it implies that
|
||||
only someone authorized to issue the bos setauth
|
||||
command or with "root" access to the database
|
||||
server machine's local disk is able to see actual
|
||||
keys from the Authentication Database. Second, it
|
||||
makes it clear that the system is in a compromised
|
||||
state of security while keys are being displayed
|
||||
on the screen. Both turning off authorization
|
||||
checking and displaying keys on a screen are
|
||||
serious security risks.
|
||||
|
||||
In the normal cases when authorization checking is
|
||||
enabled on the database server machine, a
|
||||
"checksum" appears instead of the key. This is a
|
||||
decimal number derived by encrypting a constant
|
||||
with the key. In the case of the "afs" key, this
|
||||
number can be compared to the checksum with the
|
||||
corresponding key version number in the output of
|
||||
the bos listkeys command.
|
||||
|
||||
- the date that the user changed his/her own
|
||||
password, indicated as "last cpw" (which stands
|
||||
for "last change of password")
|
||||
|
||||
- the date on which the entry expires. If this is a
|
||||
|
||||
|
||||
|
||||
user entry, the user will be unable to
|
||||
authenticate with the Authentication Server after
|
||||
this date.
|
||||
|
||||
- the maximum length of time that tickets issued for
|
||||
this entry may be valid
|
||||
|
||||
- the date of the last modification to the entry,
|
||||
indicated as "last mod," and the user name of the
|
||||
person who issued the modifying command. Password
|
||||
changes made by the user himself/herself are
|
||||
recorded as "last cpw" instead.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
In each of the examples, the password typed at the prompt
|
||||
does not echo visibly.
|
||||
|
||||
The following shows the privileged user smith examining her
|
||||
own Authentication Database entry. Note the ADMIN flag,
|
||||
which shows that smith is privileged.
|
||||
|
||||
% kas e smith
|
||||
Password for smith:
|
||||
User data for smith (ADMIN)
|
||||
key (0) cksum is 3414844392, last cpw: Wed Jan 3 16:05:44
|
||||
entry expires on never. Max ticket lifetime 100.00 hours.
|
||||
last mod on Thu Dec 21 08:22:29 1989 by admin
|
||||
|
||||
In the following the regular user terry examines her own
|
||||
entry and tries to examine pat's.
|
||||
|
||||
% kas
|
||||
Password for terry:
|
||||
ka> ex terry
|
||||
User data for terry
|
||||
key (0) cksum is 529538018, last cpw: Fri Jan 19 9
|
||||
entry expires on never. Max ticket lifetime 100.00
|
||||
last mod on Thu Dec 21 08:43:29 1989 by admin
|
||||
ka> ex pat
|
||||
kas:examine: caller not authorized getting informati
|
||||
|
||||
|
||||
In the following an administrator logged in as the
|
||||
privileged user admin uses bos setauth to turn off
|
||||
authorization checking on the database server machine
|
||||
db1.transarc.com so that he can look at the key in the afs
|
||||
entry. He enters interactive mode to open a connection with
|
||||
the Authentication Server on db1.transarc.com only and uses
|
||||
the -noauth flag to prevent that server from attempting to
|
||||
authenticate him.
|
||||
|
||||
% bos setauth db1.transarc.com off
|
||||
% kas i -servers db1.transarc.com -noauth
|
||||
ka> examine afs -servers db1.transarc.com
|
||||
User data for afs
|
||||
key (12): \357\253\304\352a\236\253\352, last cpw:
|
||||
entry expires on never. Max ticket lifetime 100.00
|
||||
last mod on Thu Jan 11 14:53:29 1990 by admin
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
|
||||
|
||||
A user may examine his or her own entry. To examine others'
|
||||
entries, the issuer must have the ADMIN flag set in his or
|
||||
her Authentication Database entry.
|
||||
|
||||
To look at actual keys, authorization checking must be
|
||||
disabled on the database server machine with bos setauth,
|
||||
which implies being listed in /usr/afs/etc/UserList; it is
|
||||
not necessary to have the ADMIN flag in addition.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos listkeys
|
||||
|
||||
bos setauth
|
||||
|
||||
kas setfields
|
@ -1,57 +0,0 @@
|
||||
kas forgetticket AFS Commands kas forgetticket
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas forgetticket -- discard all tickets for the issuer.
|
||||
|
||||
|
||||
kas forgetticket [-name <name of server>] [-all] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas f [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Discards all tickets that the Authentication Server has
|
||||
registered for the issuer. This includes the AFS server
|
||||
ticket from each cell in which the user has authenticated,
|
||||
and any tickets that the user may have acquired during this
|
||||
kas session (either by virtue of entering the session or
|
||||
using kas getticket).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies which ticket should be discarded. Provide
|
||||
this argument OR the -all flag.
|
||||
|
||||
Note:This argument is not currently implemented: all
|
||||
tickets are discarded no matter which ticket which
|
||||
ticket name is specified here.
|
||||
|
||||
-all indicates that all tickets should be discarded.
|
||||
Provide this flag OR the -name argument. In the
|
||||
current implementation, this flag is more sensible
|
||||
because it matches what actually happens no matter
|
||||
which option the issuer chooses.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
Both of the following discard all tickets for the issuer.
|
||||
|
||||
% kas forgetticket -all % kas f
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. There is no prompt for a password, and the issuer
|
||||
does not have to have the ADMIN flag set in his or her
|
||||
Database entry. The deletion can affect only the issuer
|
||||
anyway.
|
||||
|
||||
MORE INFORMATION
|
@ -1,80 +0,0 @@
|
||||
kas getpassword AFS Commands kas getpassword
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas getpassword -- display octal key from an Authentication
|
||||
|
||||
Database entry.
|
||||
|
||||
|
||||
kas getpassword -name <name of user> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas getp -n <name of user> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Prints out the contents (an octal-format encryption key) of
|
||||
the key field for the Database entry name of user.
|
||||
|
||||
WARNING
|
||||
|
||||
This command works only if the Authentication Server has
|
||||
been compiled with a special flag; this is normally done
|
||||
only for cells in the process of converting from use of AFS
|
||||
2.0-style authentication to AFS 3.0 authentication.
|
||||
Moreover, this command does not work if issued on an AFS
|
||||
client. The issuer must be logged into a machine running
|
||||
the specially-compiled Authentication Server (a database
|
||||
server machine or other machine running an isolated
|
||||
Authentication Server).
|
||||
|
||||
The recommended way to examine the octal form of keys is
|
||||
with kas examine when authorization checking is disabled.
|
||||
That command shows a "checksum" when authorization checking
|
||||
is enabled, which may be suitable for some purposes.
|
||||
|
||||
Even when the other conditions are met, this command does
|
||||
not work for entries where the name includes a period (these
|
||||
entries are generally for the Authentication Server's
|
||||
internal use anyway).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name names the entry from which the key field should be
|
||||
printed out.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output simply prints the key after a "Key:" header. It
|
||||
does not report the key version number, but that is
|
||||
available from kas examine.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows a user using this command to examine
|
||||
afs's password.
|
||||
|
||||
|
||||
|
||||
% kas getp afs
|
||||
Key: \020\354\315\310\313\023W\370
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. There is no prompt for a password, and the issuer
|
||||
does not have to have the ADMIN flag set in his or her
|
||||
Database entry. It is assumed that any machine running the
|
||||
Authentication Server is secured by having only a limited
|
||||
number of people in its local /etc/passwd file.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas examine
|
@ -1,102 +0,0 @@
|
||||
kas getrandomkey AFS Commands kas getrandomkey
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas getrandomkey -- generate an encryption key at random.
|
||||
|
||||
|
||||
kas getrandomkey
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ]
|
||||
[-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas getr [-a <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Returns a key generated at random (i.e., not derived from
|
||||
any known password). This is useful mainly for testing and
|
||||
debugging the Authentication Server.
|
||||
|
||||
WARNINGS
|
||||
|
||||
The output of this command is visible on the issuer's
|
||||
screen, making it a potential security risk to use the key
|
||||
in an actual Authentication Database entry (such as the
|
||||
"afs" entry).
|
||||
|
||||
If the -noauth flag is used, the connection to the
|
||||
Authentication Server is not authenticated, so the randomly
|
||||
generated key crosses the network unencrypted. The
|
||||
potential security risk in using the key as an actual
|
||||
encryption key is even greater in this case.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
|
||||
|
||||
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
Following a "Key:" header, the output displays the octal and
|
||||
hexadecimal forms of the key.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows terry issuing this command.
|
||||
|
||||
% kas getr
|
||||
Password for terry:
|
||||
Key: \230\206\370v1\334\373\346 (98.86.f8.76 31.dc.f
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None, but the correct password must be provided at the
|
||||
prompt if the key is to be encrypted while crossing the
|
||||
network. If the -noauth flag is used, a password is not
|
||||
prompted for.
|
||||
|
||||
MORE INFORMATION
|
@ -1,101 +0,0 @@
|
||||
kas getticket AFS Commands kas getticket
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas getticket -- create a ticket valid for the specified
|
||||
|
||||
server.
|
||||
|
||||
|
||||
kas getticket -name <name of server>
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas gett -na <name of server> [-a <admin principal to use
|
||||
for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Instructs the Ticket Granting Service to create a ticket for
|
||||
the issuer of the command, which he or she can use for
|
||||
secured communication with name of server. The ticket is
|
||||
sealed with the contents of the key field in name of
|
||||
server's Database entry.
|
||||
|
||||
This command is functionally similar to klog. It is useful
|
||||
primarily for debugging purposes, and is not recommended as
|
||||
the normal way to obtain tickets. Also, while it is
|
||||
possible to make name of server an individual user as well
|
||||
as a server process, such a ticket is useless because the
|
||||
user's workstation will not know what to do with it.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the Database entry from which to
|
||||
use the key. It may include a cell
|
||||
specification (example:
|
||||
|
||||
kas getticket afs@transarc.com
|
||||
|
||||
gets a ticket good for all AFS servers in
|
||||
the Transarc Corporation cell).
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
|
||||
|
||||
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows the regular user terry obtaining a
|
||||
ticket for the AFS server processes in her home cell.
|
||||
|
||||
% kas gett afs Password for terry:
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. However, the issuer must provide his or her correct
|
||||
password.
|
||||
|
||||
MORE INFORMATION
|
@ -1,82 +0,0 @@
|
||||
kas help AFS Commands kas help
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas help -- show syntax of specified kas command(s) or list
|
||||
|
||||
functional description for all of them.
|
||||
|
||||
|
||||
+
|
||||
kas help [-topic <help string> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
kas h [-t <help string> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line (name and short description) of
|
||||
every kas command's help entry, if no help string is
|
||||
provided. For each operation code specified with -topic, it
|
||||
outputs the entire help entry. See the Output section
|
||||
below.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic
|
||||
specifies the operation code(s) for which syntax is to
|
||||
be provided. If the issuer omits it, the output
|
||||
instead provides a short description of all kas
|
||||
commands.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The online help entry for each kas command consists of two
|
||||
or three lines:
|
||||
|
||||
- The first line names the command and briefly
|
||||
describes what it does
|
||||
|
||||
- If the command has aliases, they will appear on
|
||||
the next line
|
||||
|
||||
- The final line, which begins with "Usage:", lists
|
||||
the command's arguments and flags in the
|
||||
prescribed order. Online help entries use the
|
||||
same symbols (brackets, etc.) as the command
|
||||
definitions in this manual. For an explanation of
|
||||
their meaning, see page v of the introductory
|
||||
About This Manual chapter.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following displays the online help entry for the
|
||||
kas setpassword command.
|
||||
|
||||
% kas help setpassword
|
||||
kas setpassword: set a user's password
|
||||
aliases: sp
|
||||
Usage: kas setpassword -name <name of user> [-new_passwo
|
||||
<new password>] [-kvno <key version number>]
|
||||
[-admin_username <admin principal to use for authenticat
|
||||
[-password_for_admin <password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ] [-
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. No password will be prompted for.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas apropos
|
@ -1,168 +0,0 @@
|
||||
kas interactive AFS Commands kas interactive
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas interactive -- enter interactive mode for
|
||||
|
||||
Authentication Server.
|
||||
|
||||
|
||||
kas interactive
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ] [-noauth]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas i [-a <admin principal to use for authentication>] [-p
|
||||
<admin password>]
|
||||
[-c <cell name>] [-s <explicit list of authentication
|
||||
+
|
||||
servers> ]
|
||||
[-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Enters interactive mode. By establishing an authenticated
|
||||
connection in this way, the issuer will not have to type his
|
||||
or her password at each command as would be necessary in
|
||||
regular mode. The authenticated connection lasts for one
|
||||
hour unless the maximum ticket lifetime for the issuer or
|
||||
the Authentication Server is shorter.
|
||||
|
||||
It is also possible to establish an unauthenticated
|
||||
connection under the identity anonymous by using the -noauth
|
||||
flag. During normal operation, there is no point to doing
|
||||
so, because the Authentication Server still does
|
||||
authorization checking and will not allow anonymous, who is
|
||||
unprivileged by definition, to perform privileged commands.
|
||||
|
||||
A possible situation in which an issuer might wish to enter
|
||||
interactive mode unauthenticated is if he or she knows that
|
||||
attempting to authenticate will cause a problem, but wants
|
||||
to list some unprivileged information. Attempting to
|
||||
authenticate could cause a problem, for instance, if the
|
||||
Authentication Server no longer knows the key used to seal
|
||||
the ticket the user has (perhaps it is no longer in
|
||||
/usr/afs/etc/KeyFile).
|
||||
|
||||
The other repercussions of entering interactive mode are:
|
||||
|
||||
- A "ka>" prompt replaces the issuer's regular
|
||||
prompt
|
||||
|
||||
- It is no longer necessary or legal to type kas at
|
||||
the beginning of a command. Type the operation
|
||||
code as the first part of the command
|
||||
|
||||
- It is not useful to include the common arguments
|
||||
described in section 4.3 in the Reference Manual :
|
||||
|
||||
|
||||
|
||||
-admin_username, -password_for_admin, -cell,
|
||||
-servers. They are ignored, because the variables
|
||||
corresponding to them are set as the issuer enters
|
||||
interactive mode, and cannot be changed without
|
||||
leaving interactive mode. It is legal to provide
|
||||
the -help flag.
|
||||
|
||||
There are two additional ways to enter interactive mode:
|
||||
|
||||
1. Type kas without any operation code. By default,
|
||||
the command interpreter establishes a connection
|
||||
with all of the Authentication Servers in the
|
||||
local cell. They attempt to authenticate the
|
||||
user logged into the machine from which the
|
||||
command is issued, based on the password the
|
||||
issuer provides at the prompt. The issuer may
|
||||
specify an alternate identity, password, cell
|
||||
name and/or list of Authentication Servers by
|
||||
using the first four common arguments described
|
||||
in section 4.3 in the Reference Manual . Type
|
||||
kas followed by a user name and cell name,
|
||||
separated by an "@" sign (example: kas
|
||||
smith@transarc.com). The Authentication Server
|
||||
attempts to authenticate the specified user in
|
||||
the specified cell, and prompts for his or her
|
||||
password in the specified cell. This method is
|
||||
most useful when the issuer wishes to enter
|
||||
interactive mode with a different identity than
|
||||
the one under which he or she is currently logged
|
||||
on.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. Using this
|
||||
argument on this command is useful only
|
||||
when authorization checking is disabled on
|
||||
|
||||
|
||||
|
||||
the file server machine (during the
|
||||
installation of a file server machine or
|
||||
when bos setauth has been used during
|
||||
other unusual circumstances). Under
|
||||
normal authorization checking
|
||||
circumstances, the Authentication Servers
|
||||
will allow only authorized (privileged)
|
||||
users to issue commands that change the
|
||||
status of a server or configuration file,
|
||||
even if the -noauth flag was used when
|
||||
entering interactive mode. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows a user entering interactive mode as the
|
||||
privileged user admin.
|
||||
|
||||
% kas i admin Password for admin: ka>
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. A password will be prompted for, and something must
|
||||
be typed in response, but the issuer needs to provide the
|
||||
correct password only if he or she wishes to issue
|
||||
privileged commands while in interactive mode. If he or she
|
||||
provides an wrong character string, the Authentication
|
||||
Server assigns the unprivileged identity anonymous.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
(kas) noauthentication (kas) quit
|
@ -1,88 +0,0 @@
|
||||
kas list AFS Commands kas list
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas list -- list all entries in the Authentication
|
||||
|
||||
Database.
|
||||
|
||||
|
||||
kas list [-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ]
|
||||
[-noauth] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas ls [-a <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Lists the names of all the entries (server and individual
|
||||
user) in the Authentication Database.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. Note
|
||||
that provided here the password is visible
|
||||
on the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
|
||||
|
||||
OUTPUT
|
||||
|
||||
Each entry appears on its own line. Some entries have been
|
||||
created by the Authentication Server for its own internal
|
||||
use (for instance, AuthServer.Admin).
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following example is for the cell small.edu, which has
|
||||
five users in it (the other entries are for the
|
||||
Authentication Server's internal use).
|
||||
|
||||
% kas list AuthServer.Admin krbtgt.SMALL.EDU afs admin
|
||||
pat smith jones terry
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have the ADMIN flag set in his or her
|
||||
Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
@ -1,80 +0,0 @@
|
||||
kas listtickets AFS Commands kas listtickets
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas listtickets -- list all tickets (tokens) for issuer.
|
||||
|
||||
|
||||
kas listtickets [-name <name of server>] [-long] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas listt [-n <name of server>] [-l] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Lists all the tickets (tokens) for the issuer, if no
|
||||
arguments are provided. If name of server is provided,
|
||||
lists only the ticket good for that server process ("afs" is
|
||||
the most common server). If the -long switch is provided,
|
||||
the output shows octal strings representing the session key
|
||||
and ticket itself.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the server name for which to list the
|
||||
ticket.
|
||||
|
||||
-long specifies that the output should display the octal
|
||||
number strings constituting the session key and
|
||||
ticket, along with other information (see the OUTPUT
|
||||
section). The session key is the one also found
|
||||
within the ticket.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this one.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output reports for whom the ticket is valid and the
|
||||
ticket's expiration date. If no cell specification appears,
|
||||
then the ticket is valid in the local cell.
|
||||
|
||||
If the -long flag is used, the output displays the octal
|
||||
numbers making up the session key and ticket, along with the
|
||||
key version number and the number of bytes in the ticket
|
||||
(this should always be 56). If a "[>> POSTDATED <<]" marker
|
||||
appears where the expiration date normally does, the ticket
|
||||
does not become valid until the indicated time. (Only
|
||||
internal calls can create a postdated ticket; there is no
|
||||
standard interface that allows users to do this.)
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following two examples are for a user with AFS UID 1020
|
||||
in the transarc.com cell and AFS UID 35 in the
|
||||
test.transarc.com cell. He is working on a machine in the
|
||||
former cell and is authenticated in both cells.
|
||||
|
||||
% kas listtickets
|
||||
|
||||
User's (AFS ID 1020) tokens for afs [Expires Wed Jan
|
||||
User's (AFS ID 35@test.transarc.com) tokens for afs@
|
||||
[Expires Wed Jan 3 13:54:26 1990]
|
||||
|
||||
% kas listtickets afs -l
|
||||
|
||||
User's (AFS ID 1020) tokens for afs [Expires Wed Jan
|
||||
SessionKey: \375\205\351\227\032\310\263\013
|
||||
Ticket: (kvno = 0, len = 56): \033\005\221S\203d\312
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. A password is not prompted for.
|
||||
|
||||
MORE INFORMATION
|
@ -1,62 +0,0 @@
|
||||
kas noauthentication AFS Commands kas noauthentication
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas noauthentication -- discard authenticated identity in
|
||||
|
||||
interactive mode.
|
||||
|
||||
|
||||
(kas) noauthentication [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
(kas) n [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Instructs the Authentication Server to close the (presumably
|
||||
authenticated) connection established when the issuer
|
||||
entered interactive mode. It opens a new unauthenticated
|
||||
connection, assigning the issuer the unprivileged identity
|
||||
anonymous. It does not actually flush the user's tokens
|
||||
from the Cache Manager's memory (as unlog or
|
||||
kas forgetticket do).
|
||||
|
||||
This command is useful only in interactive mode, in which
|
||||
case the issuer should omit the kas command suite name. If
|
||||
issued in non-interactive mode, it has no effect.
|
||||
|
||||
Like the -noauth flag available on a few kas commands (e.g.,
|
||||
kas interactive) this command is only useful in unusual
|
||||
circumstances. During normal operation, there is no point
|
||||
to throwing away an authenticated identity (becoming
|
||||
anonymous). The Authentication Server still does
|
||||
authorization checking and will not allow anonymous, who is
|
||||
unprivileged by definition, to perform privileged commands.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 4.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following discards the authentication information with
|
||||
which the user entered interactive mode.
|
||||
|
||||
kas> no
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. Because this command may be issued only while in
|
||||
interactive mode, no password is prompted for.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas interactive
|
@ -1,46 +0,0 @@
|
||||
kas quit AFS Commands kas quit
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas quit -- leave interactive mode.
|
||||
|
||||
|
||||
(kas) quit [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
(kas) q [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Leaves interactive mode. This command terminates the
|
||||
authenticated connection, so the Authentication Server will
|
||||
again require a password when another kas command is issued.
|
||||
|
||||
This command is useful only in interactive mode, in which
|
||||
case the issuer should omit the kas command suite name. If
|
||||
issued in non-interactive mode, it has no effect.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 4.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows the return of the normal command shell
|
||||
prompt when the issuer leaves interactive mode.
|
||||
|
||||
ka> quit %
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. Because this command may be issued only while in
|
||||
interactive mode, no password is prompted for.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas interactive
|
@ -1,190 +0,0 @@
|
||||
kas setfields AFS Commands kas setfields
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas setfields -- set various flags, expiration date and
|
||||
|
||||
ticket lifetime for Authentication
|
||||
Database entry.
|
||||
|
||||
|
||||
kas setfields -name <name of user>
|
||||
[-flags <hex flag value or flag name expression>]
|
||||
[-expiration <date of account expiration>]
|
||||
[-lifetime <maximum ticket lifetime>]
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ]
|
||||
[-noauth] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas sf -na <name of user> [-f <hex flag value or flag name
|
||||
expression>]
|
||||
[-e <date of account expiration>]
|
||||
[-l <maximum ticket lifetime>]
|
||||
[-ad <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Changes the Authentication Database entry for name of user
|
||||
in the manner specified by the various optional arguments,
|
||||
which may occur singly or in combination. See the ARGUMENTS
|
||||
section for a description of the values that may be set.
|
||||
|
||||
The results of this command are visible in the output of the
|
||||
kas examine command.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the entry to be affected.
|
||||
|
||||
-flags sets any one of four toggling flags in name's
|
||||
entry. The default is for none of the flags to be
|
||||
set. A value of 0 returns all four flags to their
|
||||
defaults. The following explains the four
|
||||
non-default values to set, their meanings and the
|
||||
associated defaults:
|
||||
|
||||
- ADMIN (Hex equivalent: 0x004). The name of
|
||||
user is allowed to issue privileged kas
|
||||
commands (Default: NOADMIN).
|
||||
|
||||
- NOTGS (Hex equivalent: 0x008). The Ticket
|
||||
Granting Service will refuse to issue tickets
|
||||
to name of user (Default: TGS).
|
||||
|
||||
- NOSEAL (Hex equivalent: 0x020). The Ticket
|
||||
|
||||
|
||||
|
||||
Granting Service cannot use the contents of
|
||||
this entry's key field as an encryption key
|
||||
(Default: SEAL).
|
||||
|
||||
- NOCPW (Hex equivalent: 0x040). The name of
|
||||
user cannot change his/her/its own password
|
||||
or key (Default: CPW).
|
||||
|
||||
Both upper and lower-case letters are acceptable
|
||||
in specifying values for the flags.
|
||||
|
||||
To restore the ADMIN flag to its default, specify
|
||||
NOADMIN. To restore the other flags to their
|
||||
defaults, omit the NO (i.e., type TGS, SEAL or
|
||||
CPW).
|
||||
|
||||
To set more than one flag at once, connect them
|
||||
with plus signs (example: NOTGS+ADMIN+CPW). To
|
||||
remove all the current flag settings before
|
||||
setting new ones, precede the whole list with an
|
||||
equal sign (example: =NOTGS+ADMIN+CPW).
|
||||
|
||||
-expiration
|
||||
determines when the entry itself expires, which
|
||||
will render an individual user unable to log in to
|
||||
the system, and a server unreachable. The default
|
||||
is never.
|
||||
|
||||
There are three types of legal values:
|
||||
|
||||
- never, which allows the issuer to return
|
||||
the expiration time to its default after
|
||||
having set it to a date.
|
||||
|
||||
- mm/dd/yy specifies 12:00 a.m. on the
|
||||
indicated date (month/day/year).
|
||||
Examples : 1/23/90, 10/7/89.
|
||||
|
||||
- "mm/dd/yy hh:mm" specifies a time
|
||||
"hh:mm" (hour:minutes) on the indicated
|
||||
date (month/day/year). The time should
|
||||
be in 24-hour format (for example, 20:30
|
||||
is 8:30 p.m.) Date format is the same
|
||||
as for a date alone. Surround the
|
||||
entire instance with quotes because it
|
||||
contains a space. Examples : "1/23/90
|
||||
22:30", "10/7/89 3:45".
|
||||
|
||||
Legal values for yy run from 00 to 37, which are
|
||||
interpreted as the years 2000-2037, and from 70 to
|
||||
99 which are interpreted as 1970-1999. (This
|
||||
restriction is because the Authentication Server
|
||||
converts the date into the number of seconds
|
||||
elapsed since 1 February 1970, to comply with the
|
||||
standard UNIX date representation; dates later
|
||||
than sometime in February 2038 exceed the
|
||||
representation's capacity.)
|
||||
|
||||
-lifetime specifies the upper limit on the validity lifetime
|
||||
that the TGS may stamp on a ticket issued to an
|
||||
individual or for a server. That is, if name of
|
||||
|
||||
|
||||
|
||||
user is an individual, this value is the maximum
|
||||
lifetime of a ticket issued to the user. If name
|
||||
of user is a server such as "afs," this value is
|
||||
the maximum lifetime of a ticket that the TGS
|
||||
issues to clients in order to contact the server.
|
||||
|
||||
To specify a number of hours, include a colon in
|
||||
the number (example: 1:00 means one hour).
|
||||
Otherwise, the number is assumed to be in seconds
|
||||
(so 3600 means one hour). If this argument is not
|
||||
provided, the default setting is 100:00 hours
|
||||
(360000 seconds).
|
||||
|
||||
-admin_username
|
||||
specifies the user name under which the issuer
|
||||
wishes to perform the command. If the issuer does
|
||||
not provide it, the current identity is used. See
|
||||
section 4.3 in the Reference Manual for more
|
||||
details. -password_for_admin
|
||||
specifies the issuer's password. If provided
|
||||
here, the password is visible on the screen. If
|
||||
the issuer does not provide it, it will be
|
||||
prompted for and not be visible on the screen.
|
||||
See section 4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the command, if
|
||||
not the local cell. See section 4.3 in the
|
||||
Reference Manual for more details. -servers
|
||||
specifies the database server machine(s) with
|
||||
which to establish a connection. See section 4.3
|
||||
in the Reference Manual for more details. -noauth
|
||||
establishes an unauthenticated connection between
|
||||
the Authentication Servers and issuer, whom they
|
||||
assign the unprivileged identity anonymous rather
|
||||
than attempting mutual authentication. See
|
||||
section 4.3 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 4.3 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
In the following, admin grants administrative privilege to
|
||||
smith, and makes smith's entry expire at midnight on 31
|
||||
December 1995.
|
||||
|
||||
% kas sf smith ADMIN 12/31/95 Password for admin:
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have the ADMIN flag set in his or her
|
||||
Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas examine
|
@ -1,159 +0,0 @@
|
||||
kas setkey AFS Commands kas setkey
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas setkey -- insert octal key directly into key field of
|
||||
|
||||
Database entry.
|
||||
|
||||
|
||||
kas setkey -name <name of user> -new_key <eight byte new
|
||||
key> [-kvno <keyversion number>]
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of authentication servers> ]
|
||||
[-noauth] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas setk -na <name of user> -ne <eight byte new key>
|
||||
[-k <key version number>]
|
||||
[-a <admin principal to use for authentication>] [-p <admin
|
||||
password>]
|
||||
[-c <cell name>] [-s <explicit list of authentication
|
||||
+
|
||||
servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Accepts the octal number string eight byte new key, places
|
||||
it in the key field of the Database entry for name of user
|
||||
and marks it with key version number key version number.
|
||||
This command makes most sense when name of user is a server
|
||||
process (such as "afs") rather than an individual user, as
|
||||
discussed in the Warning section. For individual users, use
|
||||
the kas setpassword command instead.
|
||||
|
||||
When changing the key in a server entry, remember to alter
|
||||
the /usr/afs/etc/KeyFile with the bos addkey command and use
|
||||
the same key version number in both places.
|
||||
|
||||
WARNING
|
||||
|
||||
Using this command to change user passwords is needlessly
|
||||
complicating, for the following reason. The Authentication
|
||||
Database stores both user passwords and server keys as octal
|
||||
strings, never as character strings. When a character
|
||||
string is provided in the kas setpassword command (see
|
||||
above), the Authentication Server calls an algorithm to
|
||||
convert the string into an octal-form encryption key, then
|
||||
stores the key in the key field of the appropriate entry.
|
||||
The kas setkey command (this one) bypasses the conversion
|
||||
algorithm, entering eight byte new key directly into the key
|
||||
field. If an octal string is simply invented, there is no
|
||||
way to discover which character string it corresponds to.
|
||||
To use this command to change a user password, the issuer
|
||||
would need to translate the password character string into
|
||||
an octal key using kas stringtokey and specify the
|
||||
resulting string as eight byte new key here. Otherwise, the
|
||||
user would not know what password to type at login.
|
||||
|
||||
The main use for this command is to set server encryption
|
||||
|
||||
|
||||
|
||||
keys, if the system administrator first executes the bos
|
||||
addkey command to add a new key to /usr/afs/etc/KeyFile.
|
||||
That command accepts only strings and converts them into
|
||||
octal keys, just like kas setpassword, but the output from
|
||||
the bos listkeys command will then reveal the converted
|
||||
octal form of the string, which is the eight byte new key
|
||||
that should be specified here.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the entry for which to replace
|
||||
the key field.
|
||||
|
||||
-new_key specifies a string of eight bytes, each
|
||||
consisting of EITHER a three-digit octal
|
||||
number preceded by a backslash OR a single
|
||||
ASCII character. The issuer must provide
|
||||
it on the command line where it is
|
||||
visible, as there is no prompt for it.
|
||||
|
||||
Outside interactive mode, surround
|
||||
octalkey with single quotes, or the shell
|
||||
will throw away the backslashes. When in
|
||||
interactive mode, do not include the
|
||||
single quotes.
|
||||
|
||||
-kvno specifies the key version number
|
||||
associated with the new key. It must be
|
||||
an integer in the range 0 through 255. In
|
||||
addition, 999 is reserved for the "bcrypt"
|
||||
key used in AFS 2.0 authentication. If
|
||||
the issuer does not provide this argument,
|
||||
it defaults to 0, which is probably not
|
||||
desirable for server keys.
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
|
||||
|
||||
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows admin setting the "afs" key with key
|
||||
version number 15.
|
||||
|
||||
% kas setk afs \222\260\334\241c\212\274W 15 Password for
|
||||
admin:
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Individual users may use this command to change their own
|
||||
keys, though this is not advised for the reasons stated in
|
||||
the WARNING section. To change server encryption keys or
|
||||
the key field in another user's entry, issuer must have the
|
||||
ADMIN flag set in his or her Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos addkey bos listkeys kas setpassword
|
@ -1,137 +0,0 @@
|
||||
kas setpassword AFS Commands kas setpassword
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas setpassword -- change key field in Database entry.
|
||||
|
||||
|
||||
kas setpassword -name <name of user>
|
||||
[-new_password <new password>]
|
||||
[-kvno <key version number>]
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ]
|
||||
[-noauth] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas sp -na <name of user> [-ne <new password>]
|
||||
[-k <key version number>]
|
||||
[-a <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-no] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Accepts a character string new password of unlimited length,
|
||||
scrambles it into a form suitable for use as an encryption
|
||||
key, and places it in the key field of name's Authentication
|
||||
Database entry.
|
||||
|
||||
There is little reason to type new password on the command
|
||||
line, where it is visible. If the issuer does not provide
|
||||
the password on the command line, a
|
||||
|
||||
new_password:
|
||||
|
||||
prompt appears, followed by a second prompt requesting a
|
||||
repetition of the new password. In both cases the password
|
||||
does not echo visibly. The second prompt guarantees that
|
||||
the issuer did not make a typing mistake when responding to
|
||||
the first prompt.
|
||||
|
||||
When adding server keys (such as "afs"), remember to add the
|
||||
new key to the /usr/afs/etc/KeyFile using the bos addkey
|
||||
command and to use the same key version number there as
|
||||
here. See the AFS System Administrator's Guide for
|
||||
instructions.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-name specifies the entry for which to replace
|
||||
the key field.
|
||||
|
||||
-new_password is the character string the user will type
|
||||
when logging in. It should be 8
|
||||
characters or less, as some non-AFS
|
||||
programs cannot handle longer passwords.
|
||||
The Authentication Server scrambles it
|
||||
into a string of octal numbers before
|
||||
storing it in the key field.
|
||||
|
||||
-kvno specifies the key version number
|
||||
associated with the new key. It must be
|
||||
an integer between 0 and 255. In
|
||||
addition, 999 is reserved for the "bcrypt"
|
||||
key used in AFS 2.0 authentication. If
|
||||
the issuer does not provide this argument,
|
||||
it defaults to 0, which is probably not
|
||||
desirable for server keys.
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the
|
||||
current identity is used. See section 4.3
|
||||
in the Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. If
|
||||
provided here, the password is visible on
|
||||
the screen. If the issuer does not
|
||||
provide it, it will be prompted for and
|
||||
not be visible on the screen. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. See
|
||||
section 4.3 in the Reference Manual for
|
||||
more details. -noauth
|
||||
establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command.
|
||||
Do not provide any other arguments or
|
||||
flags with this one. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows privileged user admin changing pat's
|
||||
password (presumably because pat forgot the former password
|
||||
or got locked out of his account in some other way.
|
||||
|
||||
|
||||
|
||||
% kas sp pat
|
||||
Password for admin:
|
||||
new_password:
|
||||
Verifying, please re-enter new_password:
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
An individual user may change his or her own password,
|
||||
although use of the kpasswd command is recommended instead.
|
||||
To change another user's password or the password (server
|
||||
encryption key) for server processes such as "afs", issuer
|
||||
must have the ADMIN flag set in his or her Authentication
|
||||
Database entry.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos addkey kas setkey
|
@ -1,124 +0,0 @@
|
||||
kas statistics AFS Commands kas statistics
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas statistics -- display statistics from one
|
||||
|
||||
Authentication Server process.
|
||||
|
||||
|
||||
kas statistics
|
||||
[-admin_username <admin principal to use for
|
||||
authentication>]
|
||||
[-password_for_admin <admin password>] [-cell <cell name>]
|
||||
[-servers <explicit list of authentication
|
||||
+
|
||||
servers> ]
|
||||
[-noauth] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas sta [-a <admin principal to use for authentication>]
|
||||
[-p <admin password>] [-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of authentication servers> ] [-n] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays statistics from one of the cell's database server
|
||||
machines. It is recommended that the issuer use -servers to
|
||||
specify one machine name. Otherwise, the command
|
||||
interpreter displays statistics for a machine chosen at
|
||||
random from all the database server machines with which it
|
||||
has established connections.
|
||||
|
||||
WARNING
|
||||
|
||||
If this command is issued in interactive mode, it is not
|
||||
possible to specify a file server machine because the
|
||||
-servers argument is inoperative. If the issuer is
|
||||
interested in a particular file server machine, it is best
|
||||
to leave interactive mode.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-admin_username specifies the user name under which the
|
||||
issuer wishes to perform the command. If
|
||||
the issuer does not provide it, the current
|
||||
identity is used. See section 4.3 in the
|
||||
Reference Manual for more details.
|
||||
-password_for_admin
|
||||
specifies the issuer's password. Note that
|
||||
provided here the password is visible on the
|
||||
screen. If the issuer does not provide it,
|
||||
it will be prompted for and not be visible
|
||||
on the screen. See section 4.3 in the
|
||||
Reference Manual for more details. -cell
|
||||
specifies the cell in which to run the
|
||||
command, if not the local cell. See section
|
||||
4.3 in the Reference Manual for more
|
||||
details. -servers
|
||||
specifies the database server machine(s)
|
||||
with which to establish a connection. It is
|
||||
recommended that the issuer use this
|
||||
|
||||
|
||||
|
||||
argument and specify a single machine.
|
||||
|
||||
-noauth establishes an unauthenticated connection
|
||||
between the Authentication Servers and
|
||||
issuer, whom they assign the unprivileged
|
||||
identity anonymous rather than attempting
|
||||
mutual authentication. See section 4.3 in
|
||||
the Reference Manual for more details.
|
||||
-help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 4.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The information includes:
|
||||
|
||||
- server's network address number and last startup
|
||||
date
|
||||
|
||||
- number of requests and aborted requests for
|
||||
various services: authentication, ticket
|
||||
granting, password setting, entry listing, etc
|
||||
|
||||
- number of entries with ADMIN flag
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following show the output when someone authenticated as
|
||||
the privileged user admin issues this command about
|
||||
fs1.transarc.com.
|
||||
|
||||
% kas stat -s fs1.transarc.com
|
||||
56 allocs, 46 frees, 0 password changes
|
||||
Hash table utilization = 0.100000%
|
||||
From host c037cf05 started at Tue Mar 20 12:42:02 19
|
||||
of 88 requests for Authenticate, 18 were aborted.
|
||||
of 14 requests for GetTicket, 0 were aborted.
|
||||
of 4 requests for CreateUser, 1 were aborted.
|
||||
of 12 requests for SetFields, 4 were aborted.
|
||||
of 3 requests for DeleteUser, 0 were aborted.
|
||||
of 23 requests for GetEntry, 4 were aborted.
|
||||
of 18 requests for ListEntry, 0 were aborted.
|
||||
of 2 requests for GetStats, 1 were aborted.
|
||||
of 2 requests for GetRandomKey, 0 were aborted.
|
||||
Used 6.015 seconds of CPU time.
|
||||
1 admin accounts
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must have the ADMIN flag set in his or her
|
||||
Authentication Database entry.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas debuginfo
|
@ -1,70 +0,0 @@
|
||||
kas stringtokey AFS Commands kas stringtokey
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kas stringtokey -- convert a character string into an octal
|
||||
|
||||
string.
|
||||
|
||||
|
||||
kas stringtokey -string <password string> [-cell <cell
|
||||
name>] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kas str -s <password string> [-c <cell name>] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Converts the character string password string into an octal
|
||||
string suitable for use as an encryption key. This is
|
||||
useful for showing what form a given password would take in
|
||||
the cell.
|
||||
|
||||
The algorithm that the Authentication Server uses to
|
||||
generate keys combines password string with the cell's name
|
||||
during the generation, so use of cell name allows the issuer
|
||||
to see what a string would look like when scrambled into a
|
||||
key in a certain cell.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-string specifies the password-like character string
|
||||
to be converted into a key.
|
||||
|
||||
-cell specifies the cell name to be used in
|
||||
converting password string into a key. If
|
||||
the issuer does not provide it, the default
|
||||
is the cell in which the command is issued.
|
||||
Provide a complete Internet-style name.
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 4.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output is of the form:
|
||||
|
||||
Converting password string in realm 'cell name yield
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows a user in the Transarc Corporation cell
|
||||
deriving the octal key equivalent of the string "new_pswd".
|
||||
|
||||
% kas str new_pswd
|
||||
Converting new_pswd in realm 'TRANSARC.COM' yields
|
||||
key='\255\364b\354\221s\235\313'.
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
kas getrandomkey kas setkey
|
319
src/man/klog.1
319
src/man/klog.1
@ -1,319 +0,0 @@
|
||||
klog AFS Commands klog
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
klog -- authenticate with Authentication Server to obtain
|
||||
|
||||
token.
|
||||
|
||||
|
||||
klog [-x] [-principal <user name>] [-password <user's
|
||||
password>]
|
||||
[-tmp] [-cell <cell name>] [-servers <explicit list of
|
||||
+
|
||||
servers> ]
|
||||
[-pipe] [-lifetime <ticket lifetime in hh[:mm[:ss]]>]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
klog [-x] [-pr <user name>] [-pa <user's password>] [-t]
|
||||
[-c <cell name>]
|
||||
+
|
||||
[-s <explicit list of servers> ] [-pi]
|
||||
[-l <ticket lifetime in hh[:mm[:ss]]>] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Authenticates the issuer in the indicated cell. The issuer
|
||||
obtains a token accepted by the AFS server processes in that
|
||||
cell. The Cache Manager stores the token in a credential
|
||||
structure associated with the issuer. If the issuer already
|
||||
has a token for the cell, the token resulting from this
|
||||
command replaces it in the credential structure.
|
||||
|
||||
By default, the token generated is appropriate for the local
|
||||
cell (the one to which the local machine belongs): the
|
||||
command interpreter contacts an Authentication Server in the
|
||||
local cell, chosen at random from the list in
|
||||
/usr/vice/etc/CellServDB, and requests a token for the
|
||||
issuer logged into the local machine. Use the -principal,
|
||||
-cell and/or -servers arguments to specify a different
|
||||
identity, cell or set of Authentication Servers
|
||||
respectively. See the ARGUMENTS section for further
|
||||
explanation.
|
||||
|
||||
This command does not change the identity under which the
|
||||
issuer is logged into the local UNIX file system.
|
||||
|
||||
The issuer (or user indicated with -principal) does not have
|
||||
to appear in the local password file (/etc/passwd or
|
||||
equivalent) to issue this command; in previous versions of
|
||||
this command, users had to add the -x flag if they did not
|
||||
appear in that file.
|
||||
|
||||
During a single login on a given machine, a user can be
|
||||
authenticated in multiple cells simultaneously, but can have
|
||||
only one token at a time for each cell (i.e., can only
|
||||
authenticate under one identity per cell).
|
||||
|
||||
The lifetime of the token resulting from this command is the
|
||||
smallest of the following:
|
||||
|
||||
- the lifetime requested by the issuer with the
|
||||
|
||||
|
||||
|
||||
-lifetime argument. If the issuer does not
|
||||
include this argument, the value defaults to 720
|
||||
hours (30 days).
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
"afs" entry in the Authentication Database. The
|
||||
default is 100 hours. Administrators can inspect
|
||||
this value using kas examine, and change it using
|
||||
kas setfields.
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
issuer's Authentication Database entry. The
|
||||
default is 25 hours for user entries created by
|
||||
the AFS 3.1 or later version of the Authentication
|
||||
Server, and 100 hours for user entries created by
|
||||
the AFS 3.0 version of the Authentication Server.
|
||||
Administrators and the user himself/herself can
|
||||
inspect this value using kas examine, and
|
||||
administrators can change it using kas setfields.
|
||||
|
||||
- the "maximum ticket lifetime" recorded in the
|
||||
"krbtgt.CELLNAME" entry in the Authentication
|
||||
Database; this entry corresponds to the ticket-
|
||||
granting ticket used internally in generating the
|
||||
token. The default is 720 hours (30 days).
|
||||
|
||||
If none of these defaults have been changed, then the
|
||||
standard token lifetime is 25 hours for users whose
|
||||
Authentication Database entries were created by the AFS 3.1
|
||||
or later version of the Authentication Server, and 100 hours
|
||||
for users whose Authentication Database entries were created
|
||||
by the AFS 3.0 version of the Authentication Server. The
|
||||
user can issue klog to request a token with a different
|
||||
lifetime.
|
||||
|
||||
The maximum lifetime for any token is 720 hours (30 days),
|
||||
and the minimum is 5 minutes. Between these values, token
|
||||
lifetimes are not granted on a linear scale; only certain
|
||||
values are possible.
|
||||
|
||||
Lifetimes between 5 minutes and 10 hours 40 minutes are
|
||||
granted at 5 minute intervals, rounding up. For example, if
|
||||
the issuer requests a lifetime of 12 minutes, the token's
|
||||
actual lifetime is 15 minutes.
|
||||
|
||||
For token lifetimes greater than 10 hours 40 minutes,
|
||||
consult the following table, which presents the possible
|
||||
times in units of hours:minutes:seconds. The number in
|
||||
parentheses is a translation to daysd hoursh; the minutes
|
||||
and seconds are the same as in the corresponding hourly
|
||||
time. For example, 282:22:17 means 282 hours, 22 minutes
|
||||
and 17 seconds, which translates to 11d 18h (11 days and 18
|
||||
hours, etc.). If the issuer requests a lifetime between two
|
||||
values, the token's lifetime is rounded up to the higher
|
||||
value.
|
||||
|
||||
11:24:15 (0d 11h) 33:14:21 (1d 09h)
|
||||
12:11:34 (0d 12h) 35:32:15 (1d 11h)
|
||||
13:02:09 (0d 13h) 37:59:41 (1d 13h)
|
||||
13:56:14 (0d 13h) 40:37:19 (1d 16h)
|
||||
14:54:03 (0d 14h) 43:25:50 (1d 19h)
|
||||
|
||||
|
||||
|
||||
15:55:52 (0d 15h) 46:26:01 (1d 22h)
|
||||
17:01:58 (0d 17h) 49:38:40 (2d 01h)
|
||||
18:12:38 (0d 18h) 53:04:37 (2d 05h)
|
||||
19:28:11 (0d 19h) 56:44:49 (2d 08h)
|
||||
20:48:57 (0d 20h) 60:40:15 (2d 12h)
|
||||
22:15:19 (0d 22h) 64:51:57 (2d 16h)
|
||||
23:47:38 (0d 23h) 69:21:04 (2d 21h)
|
||||
25:26:21 (1d 01h) 74:08:46 (3d 02h)
|
||||
27:11:54 (1d 03h) 79:16:23 (3d 07h)
|
||||
29:04:44 (1d 05h) 84:45:16 (3d 12h)
|
||||
31:05:22 (1d 07h) 90:36:53 (3d 18h)
|
||||
|
||||
WARNING
|
||||
|
||||
This command does not create a new "process authentication
|
||||
group" (commonly abbreviated PAG; see the description of the
|
||||
pagsh command in this chapter to learn about PAGs). Users
|
||||
in cells not using the AFS version of login should issue
|
||||
pagsh before issuing this command, so that the tokens get
|
||||
stored in a credential structure that is identified by PAG
|
||||
rather than UNIX UID. The potential security problem with a
|
||||
credential structure identified by UID is that anyone
|
||||
already logged in as "root" on a machine is allowed to
|
||||
assume any other identity by issuing su. If the credential
|
||||
structure is identified by UID rather than PAG, then when
|
||||
"root" assumes another UID it can use the token, too. Use
|
||||
of a PAG as an identifier eliminates that possibility.
|
||||
|
||||
If the issuer entered the current session by issuing the AFS
|
||||
login command, his or her credential structure is already
|
||||
identified by a PAG. Issuing klog during the same session
|
||||
creates a new token associated with the existing PAG.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-x appears only for backwards compatibility. Its
|
||||
former function is now the default behavior of
|
||||
this command, as mentioned in the DESCRIPTION
|
||||
section.
|
||||
|
||||
-principal
|
||||
is the user name under which the issuer wishes to
|
||||
authenticate. By default, the Authentication
|
||||
Server attempts to authenticate the user logged
|
||||
into the local machine's UNIX file system. This
|
||||
argument allows the issuer to specify a different
|
||||
user name.
|
||||
|
||||
-password specifies the issuer's password (or that of user
|
||||
name if principal is provided). Use of this
|
||||
argument is STRONGLY DISCOURAGED, as it makes the
|
||||
password visible on the command line. If the
|
||||
issuer omits this argument, klog prompts for the
|
||||
password and does not echo it visibly:
|
||||
|
||||
Password: <user's password>
|
||||
|
||||
-tmp indicates that a copy of the "ticket-granting
|
||||
ticket" should be placed in a file on the local
|
||||
machine's /tmp directory. The file is called
|
||||
/tmp/tktUnix_UID (example for user with UNIX UID
|
||||
|
||||
|
||||
|
||||
1000: /tmp/tkt1000).
|
||||
|
||||
The ticket-granting ticket is an intermediate
|
||||
ticket that the Ticket Granting Service requires
|
||||
of clients who desire server tickets (the extra
|
||||
level of indirection increases security). Putting
|
||||
the ticket-granting ticket into /tmp allows
|
||||
standard Kerberos applications to access it and
|
||||
use it for obtaining server tickets. If this flag
|
||||
is omitted, the Cache Manager discards the
|
||||
ticket-granting ticket after it obtains the AFS
|
||||
server ticket.
|
||||
|
||||
-cell specifies the cell in which the issuer wishes to
|
||||
authenticate, by directing the command to that
|
||||
cell's Authentication Servers. During a single
|
||||
login on a given machine, a user may be
|
||||
authenticated in multiple cells simultaneously,
|
||||
but can have only one token at a time for each of
|
||||
them (i.e., can only authenticate under one
|
||||
identity per cell per machine).
|
||||
|
||||
If this argument is omitted, the command is
|
||||
executed in the local cell, as defined in
|
||||
/usr/vice/etc/ThisCell on the client machine on
|
||||
which the command is issued. The issuer may
|
||||
abbreviate cell name to the shortest form that
|
||||
distinguishes it from the other cells listed in
|
||||
/usr/vice/etc/CellServDB on the client machine on
|
||||
which the command is issued.
|
||||
|
||||
-servers causes the command interpreter to establish a
|
||||
connection with the Authentication Server running
|
||||
on each specified database server machine. It
|
||||
then chooses one of these at random to execute the
|
||||
command. The command accepts shortened machine
|
||||
names, but exactly which abbreviations are
|
||||
acceptable depends on the state of the cell's name
|
||||
server at the time the command is issued.
|
||||
|
||||
If this argument is omitted, the command
|
||||
interpreter establishes a connection with each
|
||||
machine listed for the indicated cell in the local
|
||||
workstation's copy of /usr/vice/etc/CellServDB,
|
||||
and then chooses one of those at random for
|
||||
command execution.
|
||||
|
||||
This option is useful for testing specific servers
|
||||
if problems are encountered.
|
||||
|
||||
-pipe indicates that the command should run without
|
||||
printing anything on the screen, including prompts
|
||||
or error messages. The klog command interpreter
|
||||
Server expects to receive the password from
|
||||
standard input (stdin). The issuer is discouraged
|
||||
from using this argument; it is for use by
|
||||
application programs rather than human users.
|
||||
|
||||
-lifetime indicates the lifetime that the issuer wishes the
|
||||
token to have. The value provided is considered
|
||||
in the lifetime calculation described in the
|
||||
|
||||
|
||||
|
||||
DESCRIPTION section above, along with the maximum
|
||||
ticket lifetimes mentioned there. The DESCRIPTION
|
||||
section also explains how the actual lifetime of
|
||||
the token is determined, since not all times are
|
||||
possible. If this argument is not provided, it
|
||||
defaults to 720 hours. The format for specifying
|
||||
the lifetime is
|
||||
|
||||
hh[:mm[:ss]]
|
||||
|
||||
Legal values for hh (hours) range from 00 through
|
||||
720. Legal values for mm and ss (minutes and
|
||||
seconds) range from 00 through 59.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
Most often, this command is issued without arguments. The
|
||||
appropriate password is for the person currently logged into
|
||||
the local UNIX file system. The ticket's lifetime is
|
||||
calculated as described in the DESCRIPTION section above (if
|
||||
no defaults have been changed, it is 25 hours for a user
|
||||
whose Authentication Database entry was created by the AFS
|
||||
3.1 or later version of the Authentication Server, 100 hours
|
||||
for a user whose Authentication Database entry was created
|
||||
with the AFS 3.0 version).
|
||||
|
||||
% klog Password:
|
||||
|
||||
The following allows the issuer working on a machine in the
|
||||
Transarc cell to authenticate as admin in the Transarc test
|
||||
cell, even though he or she is logged into the Transarc
|
||||
machine under a different name.
|
||||
|
||||
% klog admin -c test.transarc.com Password: <admin's
|
||||
password>
|
||||
|
||||
In the following, the issuer requests a ticket lifetime of
|
||||
104 hours 30 minutes (4 days 8 hours 30 minutes). Presuming
|
||||
that this lifetime is allowed by the maximum ticket
|
||||
lifetimes and other factors described in the DESCRIPTION
|
||||
section, the token will have an actual lifetime of
|
||||
110:44:28, which the next largest possible value.
|
||||
|
||||
% klog -life 104:30 Password:
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None. An entry for the issuer must exist in the
|
||||
Authentication Database, and the issuer must supply the
|
||||
correct password.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
pagsh
|
178
src/man/knfs.1
178
src/man/knfs.1
@ -1,178 +0,0 @@
|
||||
knfs AFS Commands knfs
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
knfs -- enable authenticated access to AFS from non-
|
||||
|
||||
supported NFS client using NFS/AFS
|
||||
Translator.
|
||||
|
||||
|
||||
knfs -host <host name> [-id <user ID (decimal)>]
|
||||
[-unlog] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
knfs [-ho <host name>] [-i <user ID (decimal)>] [-u]
|
||||
[-he]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
When issued on an NFS/AFS Translator machine, creates a PAG
|
||||
associated with the indicated NFS client machine (host
|
||||
name), and optionally, the user ID (user ID) that the issuer
|
||||
is using on host name. It associates the issuer's existing
|
||||
AFS token(s) with a new credential structure identified by
|
||||
the new PAG.
|
||||
|
||||
Issue this command only over a connection (perhaps
|
||||
established at the console or via telnet) to the AFS client
|
||||
machine serving as the NFS/AFS translator machine for host
|
||||
name, never on the NFS client machine itself. Before
|
||||
issuing it, obtain AFS tokens on the translator machine for
|
||||
every cell to be contacted during the login session on host
|
||||
name. The Cache Manager on the translator machine then uses
|
||||
the credential structure identified by the new PAG when
|
||||
accessing AFS on behalf of the issuer working on the NFS
|
||||
client machine. (If the issuer dos not use the -id
|
||||
argument, he or she may actually be sharing the credential
|
||||
structure with other users on the NFS client machine; see
|
||||
the WARNINGS section for details.)
|
||||
|
||||
This command allows the issuer to obtain authenticated
|
||||
access to AFS (via the NFS/AFS Translator) while working on
|
||||
an NFS client machine (host name) of a system type for which
|
||||
AFS is not available. Users working on NFS client machines
|
||||
of system types for which AFS is available (and for which
|
||||
the cell has purchased a license) do not need this command,
|
||||
because the klog command is available for those machine
|
||||
types.
|
||||
|
||||
The -unlog flag discards the tokens in the credential
|
||||
structure identified by the PAG, but does not destroy the
|
||||
credential structure itself. The Cache Manager on the
|
||||
translator machine retains the credential structure until
|
||||
the next reboot, and uses it each time the issuer accesses
|
||||
AFS through the translator machine. The credential
|
||||
structure only has tokens in it if the issuer re-issues knfs
|
||||
on the translator machine each time he or she logs into the
|
||||
NFS client machine.
|
||||
|
||||
WARNINGS
|
||||
|
||||
Although the -id argument is optional, not using it can
|
||||
|
||||
|
||||
|
||||
create potential security problems and confusion about which
|
||||
users are using which tokens, as described in the following.
|
||||
|
||||
The security problems arise because if the issuer does not
|
||||
use -id, then his or her tokens are associated with a
|
||||
"generic" credential structure identified by a PAG that is
|
||||
associated only with host name, not with the specific
|
||||
issuer. Every user working on host name who also does not
|
||||
use the -id argument shares the same generic credential
|
||||
structure and so uses the issuer's tokens. This includes
|
||||
users on host name who do not issue knfs at all. If another
|
||||
user subsequently issues knfs without -id, his or her tokens
|
||||
replace the previous issuer's tokens in the credential
|
||||
structure, and everyone shares the new tokens instead.
|
||||
Similarly, when an issuer discards tokens with the -unlog
|
||||
flag and does not use -id, then everyone using the generic
|
||||
credential structure becomes unauthenticated at the same
|
||||
time.
|
||||
|
||||
The sharing of tokens that result from not using -id is
|
||||
acceptable from a security standpoint only if
|
||||
|
||||
- host name is used by only one person
|
||||
|
||||
- it is acceptable that all of host name's users who
|
||||
do not have their own credential structure (do not
|
||||
use -id) have the same access to AFS files. They
|
||||
should be aware that they are subject to token
|
||||
sharing.
|
||||
|
||||
The DESCRIPTION section mentioned that using the -unlog flag
|
||||
does not destroy the credential structure, but only discards
|
||||
the tokens associated with it. The Cache Manager on the
|
||||
translator machine retains the credential structure until
|
||||
the next reboot and uses it whenever the issuer accesses AFS
|
||||
through the translator machine. One implication is that
|
||||
once the issuer issues knfs using the -id argument, he or
|
||||
she cannot use the generic credential structure until the
|
||||
machine is rebooted.
|
||||
|
||||
This command does not make it possible for users working on
|
||||
non-supported machine types to issue AFS commands. This is
|
||||
possible only on NFS clients of a system type for which AFS
|
||||
is available (and for which the cell has purchased AFS).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-host names the NFS client machine the issuer is
|
||||
working on. A full name is safest, but
|
||||
abbreviated forms are acceptable depending
|
||||
on the state of the cell's name server at
|
||||
the time the command is issued.
|
||||
|
||||
-id specifies the issuer's user ID on the NFS
|
||||
client (a UNIX UID or equivalent), which NFS
|
||||
passes to the translator machine to identify
|
||||
the user.
|
||||
|
||||
-unlog discards the tokens in the credential
|
||||
structure identified by the PAG associated
|
||||
with -host and, optionally, -id.
|
||||
|
||||
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows a typical use of this command. The
|
||||
issuer smith is working on nfs-client1.transarc.com and has
|
||||
user ID 1020 on that machine. He is accessing AFS through
|
||||
the translator machine called translator4.transarc.com. He
|
||||
telnets to translator4 and uses AFS login as smith in the
|
||||
Transarc cell. He the uses klog to obtain tokens in the
|
||||
Transarc test cell (test.transarc.com) as admin. The knfs
|
||||
command instructs the Cache Manager on translator4 to
|
||||
associate both tokens with the PAG identified by nfs-client1
|
||||
and user ID 1020. He exits the telnet connection and works
|
||||
normally on nfs-client1.
|
||||
|
||||
% telnet translator4.transarc.com
|
||||
. . .
|
||||
login: smith
|
||||
Password:
|
||||
AFS 3.2 (R) login
|
||||
% klog admin -c test.transarc.com
|
||||
Password:
|
||||
% knfs nfs-client1.transarc.com 1020
|
||||
% exit
|
||||
|
||||
The following shows smith telnetting again to translator4
|
||||
and discarding his tokens.
|
||||
|
||||
% telnet translator4.transarc.com
|
||||
. . .
|
||||
login: smith
|
||||
Password:
|
||||
AFS 3.2 (R) login
|
||||
% knfs nfs-client1.transarc.com 1020 -unlog
|
||||
% exit
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None, but issuer must provide correct password(s) when
|
||||
obtaining tokens on translator machine.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
klog login (AFS version) pagsh
|
@ -1,151 +0,0 @@
|
||||
kpasswd AFS Commands kpasswd
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
kpasswd -- change password in Authentication Database.
|
||||
|
||||
|
||||
kpasswd [-x] [-principal <user name>]
|
||||
[-password <user's current password>]
|
||||
[-newpassword <user's new password>] [-cell <cell name>]
|
||||
+
|
||||
[-servers <explicit list of servers> ] [-pipe] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
kpasswd [-x] [-pr <user name>] [-pa <user's password>]
|
||||
[-n <user's new password>] [-c <cell name>] [-s <explicit
|
||||
+
|
||||
list of servers> ]
|
||||
[-pi] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Changes password for indicated user in Authentication
|
||||
Database. By default, the change occurs in the local cell's
|
||||
Authentication Database for the user logged into the local
|
||||
machine's UNIX file system.
|
||||
|
||||
The issuer (or user indicated with -principal) does not have
|
||||
to appear in the local password file (/etc/passwd or
|
||||
equivalent) to issue this command; in previous versions of
|
||||
this command, users had to add the -x flag if they did not
|
||||
appear in that file.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-x appears only for backwards compatibility.
|
||||
Its former function is now the default
|
||||
behavior of this command, as mentioned in
|
||||
the DESCRIPTION section.
|
||||
|
||||
-principal names the Authentication Database entry in
|
||||
which to change the password. If this
|
||||
argument is omitted, the change is in the
|
||||
entry of the person logged into the local
|
||||
machine's UNIX file system.
|
||||
|
||||
-password specifies the current password. It is NOT
|
||||
recommended that the issuer provide this
|
||||
argument on the command line. If it is
|
||||
omitted, the new password is prompted for
|
||||
and does not echo visibly:
|
||||
|
||||
Old password: <user's password>
|
||||
|
||||
-newpassword specifies the new password, which the
|
||||
kpasswd command interpreter converts into an
|
||||
encryption key (string of octal numbers)
|
||||
before sending it to the Authentication
|
||||
Server for storage in the user's
|
||||
Authentication Database entry. Unlike the
|
||||
UNIX passwd command, kpasswd does not
|
||||
restrict passwords to 8 characters; it
|
||||
|
||||
|
||||
|
||||
accepts passwords of virtually any length.
|
||||
All AFS commands that require passwords
|
||||
(klog, the kas suite, kpasswd, and the AFS
|
||||
version of login) can handle passwords
|
||||
longer than 8 characters, but some non-AFS
|
||||
programs cannot. This is a consideration if
|
||||
non-AFS programs handle AFS passwords in the
|
||||
local environment.
|
||||
|
||||
It is NOT recommended that the issuer
|
||||
provide this argument on the command line.
|
||||
If it is omitted, it is prompted for and
|
||||
does not echo visibly:
|
||||
|
||||
New password (RETURN to abort): <new pas
|
||||
Retype new password: <new password>
|
||||
|
||||
-cell specifies the cell in which to change the
|
||||
password, by directing the command to that
|
||||
cell's Authentication Servers. By default,
|
||||
the command is executed in the local cell,
|
||||
as defined in /usr/vice/etc/ThisCell on the
|
||||
client machine on which the command is
|
||||
issued. The issuer may abbreviate cell name
|
||||
to the shortest form that distinguishes it
|
||||
from the other cells listed in
|
||||
/usr/vice/etc/CellServDB on the client
|
||||
machine on which the command is issued.
|
||||
|
||||
-servers causes the command interpreter to establish
|
||||
a connection with the Authentication Server
|
||||
running on each specified database server
|
||||
machine. It then chooses one of these at
|
||||
random to execute the command. The issuer
|
||||
may abbreviate the machine name to the
|
||||
extent the cell's name server will accept.
|
||||
|
||||
By default, the command interpreter
|
||||
establishes a connection with each machine
|
||||
listed for the indicated cell in the local
|
||||
workstation's copy of
|
||||
/usr/vice/etc/CellServDB, and then chooses
|
||||
one of those at random for command
|
||||
execution.
|
||||
|
||||
This option is useful for testing specific
|
||||
servers if problems are encountered.
|
||||
|
||||
-pipe indicates that the command should run
|
||||
without printing anything on the screen,
|
||||
including prompts or error messages. The
|
||||
kpasswd command interpreter expects to
|
||||
receive all necessary arguments, each on a
|
||||
separate line, from standard input (stdin).
|
||||
The issuer is discouraged from including
|
||||
this argument; it is for use by application
|
||||
programs rather than human users.
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows the typical use of this command, when
|
||||
the issuer wishes to change his or her own password.
|
||||
|
||||
% kpasswd
|
||||
Changing password for 'user' in cell 'cellname'.
|
||||
Old password:
|
||||
New password (RETURN to abort):
|
||||
Verifying, please re-enter new_password:
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must provide correct current password.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
klog
|
||||
|
||||
kas setpassword
|
@ -1,926 +0,0 @@
|
||||
package AFS Commands package
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
package -- configure local disk.
|
||||
|
||||
|
||||
package [-config <base name of configuration file>]
|
||||
[-fullconfig <full name of config file> OR stdin for
|
||||
standard input]
|
||||
[-overwrite] [-noaction] [-silent] [-verbose]
|
||||
[-rebootfiles]
|
||||
[-debug] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
package [-c <base name of configuration file>]
|
||||
[-f <full name of config file> OR stdin for standard input]
|
||||
[-o] [-n] [-s] [-v] [-r] [-d] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Configures the machine's local disk to comply with the
|
||||
indicated configuration file. By default, package does
|
||||
nothing to elements on disk that have no counterpart in the
|
||||
configuration file, but the issuer can have package remove
|
||||
any element found in a directory on disk that is not also
|
||||
found in that directory in the configuration file. See the
|
||||
"R" update code in the definition of the "D" line.
|
||||
|
||||
If an element named in the configuration file already exists
|
||||
on disk but is not identical to the configuration file
|
||||
element, then package updates the existing disk version.
|
||||
For example, if an element exists on disk as a symbolic link
|
||||
but is defined as a directory or file in the configuration
|
||||
file, then package will replace the symbolic link with a
|
||||
directory or file. The same holds for directory or file
|
||||
elements on disk that appear in the configuration file as a
|
||||
symbolic link. Similarly, if the contents of a file do not
|
||||
match those in the "source" file referred to in the
|
||||
configuration file, then package overwrites the existing
|
||||
file with the contents of the source file. The issuer can
|
||||
specify different updating behavior through the use of
|
||||
"update codes" on the lines in the configuration file. See
|
||||
the definition of the "F" line.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-config specifies the pathname of the configuration
|
||||
file to use, ending in the file's "base
|
||||
name", which omits the suffix that indicates
|
||||
the machine type. Package can determine a
|
||||
machine's type and automatically select the
|
||||
appropriate version of the base file name.
|
||||
An example of the proper value for this
|
||||
argument is staff rather than
|
||||
staff.rt_aix221.
|
||||
|
||||
If only a file name is provided, package
|
||||
looks for it in the current working
|
||||
directory. It also interprets partial
|
||||
pathnames relative to that directory.
|
||||
|
||||
Provide this argument OR -fullconfig.
|
||||
|
||||
|
||||
|
||||
-fullconfig specifies the configuration file to use. It
|
||||
accepts two types of values:
|
||||
|
||||
- the full pathname of the
|
||||
configuration file to use,
|
||||
complete with an extension
|
||||
indicating the machine-type
|
||||
(examples: staff.rt_aos4,
|
||||
staff.dkload.pmax_ul3)
|
||||
|
||||
- the string stdin, which indicates
|
||||
that the issuer will provide
|
||||
configuration information via
|
||||
standard input (stdin), either as
|
||||
a piped file or by typing the
|
||||
configuration file at the
|
||||
keyboard. Type ^D (Control-D) to
|
||||
conclude the input.
|
||||
|
||||
Provide this argument OR -config.
|
||||
|
||||
-overwrite tells package to overwrite elements on the
|
||||
local disk with the source version indicated
|
||||
in the configuration file, even if the disk
|
||||
version's "user" w mode bit is turned off.
|
||||
Files protected by the I update code are not
|
||||
overwritten; see the "F" line definition.
|
||||
|
||||
-noaction indicates that package should not actually
|
||||
perform the command, but instead should
|
||||
print a list (at standard out) of any
|
||||
problems it would encounter in executing the
|
||||
command. If the -verbose flag is added,
|
||||
package produces a trace of all the actions
|
||||
it would perform in executing the command,
|
||||
but does not actually perform them.
|
||||
|
||||
-silent suppresses some of the trace messages that
|
||||
package produces at standard out by default.
|
||||
It still reports on major problems
|
||||
encountered.
|
||||
|
||||
-verbose indicates that package should produce a more
|
||||
detailed trace of its actions (at standard
|
||||
out). The trace records on the transfer and
|
||||
ownership/mode bit setting of each element
|
||||
in the configuration file.
|
||||
|
||||
-rebootfiles indicates that package should not overwrite
|
||||
any element marked with the Q update-mode
|
||||
code in the configuration file. This
|
||||
effectively prevents the machine from
|
||||
rebooting automatically again when package
|
||||
is invoked from /etc/rc.
|
||||
|
||||
-debug enables debugging output, which is directed
|
||||
to standard out (stdout) unless the issuer
|
||||
directs it into a file. By default, no
|
||||
debugging output is produced.
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
|
||||
|
||||
|
||||
not provide any other arguments or flags
|
||||
with this one.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
This command is usually invoked in an initialization file
|
||||
such as /etc/rc, rather than typed at the command shell
|
||||
prompt.
|
||||
|
||||
The following invokes the version of the staff configuration
|
||||
file appropriate for this machine's system type, and
|
||||
produces verbose output.
|
||||
|
||||
/etc/package -c staff -v
|
||||
|
||||
The following tells package to use the configuration file
|
||||
whose basename is stored in /.package on the local machine.
|
||||
This can be convenient because the administrator can put it
|
||||
(the same command) in every machine's /etc/rc file and still
|
||||
configure machines differently, by putting the appropriate
|
||||
basename in /.package.
|
||||
|
||||
/etc/package -c `cat /.package` -v
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged into the machine's UNIX file system as
|
||||
the super user "root."
|
||||
|
||||
|
||||
|
||||
Configuration File "B" Line -- define block special device.
|
||||
|
||||
|
||||
B <device name> <major device number> <minor device
|
||||
number>
|
||||
<owner name> <group name> <mode bits>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Defines a block special device, such as a disk, that deals
|
||||
with input in units of multi-byte blocks.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
B should be a capital letter and tells the
|
||||
command interpreter that this line defines a
|
||||
block special device.
|
||||
|
||||
device name names the block special device being defined.
|
||||
|
||||
major device number
|
||||
specifies the device's major device number.
|
||||
To learn the correct value, consult
|
||||
documentation provided by the machine and/or
|
||||
operating system's manufacturer.
|
||||
|
||||
minor device number
|
||||
specifies the device's minor device number.
|
||||
To learn the correct value, consult
|
||||
documentation provided by the
|
||||
machine/operating system's manufacturer.
|
||||
|
||||
owner name names the owner for the device in the UNIX
|
||||
file system (the user who will appear in the
|
||||
device's "owner" field in the output from
|
||||
ls -l).
|
||||
|
||||
group name names the group for the device in the UNIX
|
||||
file system (the group that will appear in
|
||||
the device's group field in the output from
|
||||
ls -lg).
|
||||
|
||||
mode bits defines the mode bits that protect the device
|
||||
in the UNIX file system. Legal values are
|
||||
the standard three- or four-digit decimal
|
||||
numbers corresponding to combinations of
|
||||
rights. Example: 755 corresponds to
|
||||
rwxr-xr-x.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following defines disk /dev/hd0a with major and minor
|
||||
device numbers 1 and 0.
|
||||
|
||||
B /dev/hd0a 1 0 root wheel 644
|
||||
|
||||
|
||||
|
||||
Configuration File "C" Line -- define character special
|
||||
|
||||
device.
|
||||
|
||||
|
||||
C <device name> <major device number> <minor device
|
||||
number>
|
||||
<owner name> <group name> <mode bits>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Defines a character special device, such as a terminal or
|
||||
tty, that deals with input in single character units.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
C should be a capital letter and tells the
|
||||
command interpreter that this line defines a
|
||||
character special device.
|
||||
|
||||
device name names the character special device being
|
||||
defined.
|
||||
|
||||
major device number
|
||||
specifies the device's major device number.
|
||||
To learn the correct value, consult
|
||||
documentation provided by the
|
||||
machine/operating system's manufacturer.
|
||||
|
||||
minor device number
|
||||
specifies the device's minor device number.
|
||||
To learn the correct value, consult
|
||||
documentation provided by the
|
||||
machine/operating system's manufacturer.
|
||||
|
||||
owner name names the owner for the device in the UNIX
|
||||
file (the user who will appear in the
|
||||
device's "owner" field in the output from
|
||||
ls -l).
|
||||
|
||||
group name names the group for the device in the UNIX
|
||||
file system (the group that will appear in
|
||||
the device's group field in the output from
|
||||
ls -lg).
|
||||
|
||||
mode bits defines the mode bits that protect the device
|
||||
in the UNIX file system. Legal values are
|
||||
the standard three- or four-digit decimal
|
||||
numbers corresponding to combinations of
|
||||
rights. Example: 644 corresponds to rw-r--
|
||||
r--.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following defines tty /dev/ttyp5 with major and minor
|
||||
device numbers 6 and 5.
|
||||
|
||||
C /dev/ttyp5 6 5 root wheel 666
|
||||
|
||||
|
||||
|
||||
Configuration File "D" Line -- define directory.
|
||||
|
||||
|
||||
D[<update code>] <directory> <owner name> <group name> <mode
|
||||
bits>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Names a directory to be created on the local disk. If a
|
||||
directory of this name already exists, package does nothing.
|
||||
However, if an element of the same name exists on disk as a
|
||||
symbolic link, package replaces the symbolic link with an
|
||||
actual directory.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
D should be a capital letter and tells the command
|
||||
interpreter that this line creates a directory.
|
||||
|
||||
update code
|
||||
is optional and if provided should follow the
|
||||
letter D directly, without an intervening space.
|
||||
Choose one of the two legal values:
|
||||
|
||||
- X, which indicates that the directory is a
|
||||
lost+found directory (used by the fsck
|
||||
program).
|
||||
|
||||
- R, which indicates that package should
|
||||
remove any files from the local disk
|
||||
directory that do not appear in the
|
||||
configuration file. It will also remove any
|
||||
subdirectories of the directory, and files
|
||||
in them, that do not appear in the
|
||||
configuration file.
|
||||
|
||||
owner name
|
||||
names the owner for the directory in the UNIX file
|
||||
system (the user who will appear in the
|
||||
directory's "owner" field in the output from
|
||||
ls -l).
|
||||
|
||||
group name
|
||||
names the group for the directory in the UNIX file
|
||||
system (the group that will appear in the
|
||||
directory's group field in the output from
|
||||
ls -lg).
|
||||
|
||||
mode bits defines the mode bits that protect the directory
|
||||
in the UNIX file system. Legal values are the
|
||||
standard three- or four-digit decimal numbers
|
||||
corresponding to combinations of rights. Example:
|
||||
755 corresponds to rwxr-xr-x.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following defines the /usr directory.
|
||||
|
||||
DR /usr root wheel 755
|
||||
|
||||
|
||||
|
||||
Configuration File "F" Line -- create/update file.
|
||||
|
||||
|
||||
F[<update code>] <file> <source file> [<owner name> <group
|
||||
name>
|
||||
<mode bits>]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Names a file to be created on the local disk. Its contents
|
||||
come from the indicated source file, which may reside either
|
||||
in AFS or on the local disk itself. If package cannot
|
||||
locate the source file, it aborts.
|
||||
|
||||
If a file of this name already exists on disk, then its
|
||||
contents are updated with (overwritten by) the contents of
|
||||
the source file, unless the I update code is used to prevent
|
||||
that. Other update codes also modify the way in which the
|
||||
update takes place; see the ARGUMENTS section.
|
||||
|
||||
If a symbolic link or directory exists on disk under this
|
||||
name, package replaces it with the indicated file.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
F should be a capital letter and tells the command
|
||||
interpreter that this line creates/updates a file.
|
||||
|
||||
update code
|
||||
determines the manner in which the source file is
|
||||
used to update the contents of the file, if the
|
||||
latter already exists on the local disk. This
|
||||
argument is optional and if provided should follow
|
||||
the letter F directly, without an intervening
|
||||
space. Any number of the update-mode codes may
|
||||
combined with one another, in any order. The
|
||||
legal values are:
|
||||
|
||||
- A, which indicates that the pathname in the
|
||||
source file slot is the complete pathname of
|
||||
the source file, including the filename. By
|
||||
default, the source file pathname does not
|
||||
include a file name at the endMinstead,
|
||||
package appends the name in the file slot to
|
||||
the source file pathname in order to
|
||||
determine the source file's full name.
|
||||
Thus, this code allows the name of the file
|
||||
being created to differ from the name of the
|
||||
source file. See also the EXAMPLE(S)
|
||||
section.
|
||||
|
||||
- I, which indicates that the file should not
|
||||
be overwritten if it already exists on the
|
||||
local disk. If it does not exist, then
|
||||
package creates it, and copies the contents
|
||||
of the source file into it.
|
||||
|
||||
- O, which indicates that package should save
|
||||
the existing local disk version of the file
|
||||
with a .old extension, before overwriting
|
||||
its contents with the source file's.
|
||||
|
||||
|
||||
|
||||
- Q, which indicates that if package
|
||||
overwrites the file, then it should exit
|
||||
with status code 4. If the standard
|
||||
package-related changes have been made to
|
||||
/etc/rc, then status code 4 will cause an
|
||||
automatic reboot of the machine. This is
|
||||
useful in cases where the machine must
|
||||
reboot in order for updates to the file to
|
||||
have any effect (/vmunix is a common
|
||||
example).
|
||||
|
||||
file specifies the complete pathname of the file to be
|
||||
created or updated on the local disk.
|
||||
|
||||
source file
|
||||
specifies the file (in AFS or on the local disk)
|
||||
whose contents should be used to create or update
|
||||
the disk file.
|
||||
|
||||
If the A update code appears on the line, this
|
||||
slot should specify the source file's complete
|
||||
pathname. Otherwise, this slot should specify
|
||||
only the part of the pathname that precedes the
|
||||
name of the local disk file. As an example,
|
||||
suppose that the configuration file is for a
|
||||
Transarc cell machine running AIX 2.2.1, so that
|
||||
the source for the local disk file called
|
||||
/bin/grep is /afs/transarc.com/rt_aix221/bin/grep.
|
||||
If the A does not appear, then the proper filler
|
||||
for the source file slot is
|
||||
/afs/transarc.com/rt_aix221. See also the
|
||||
EXAMPLE(S) section.
|
||||
|
||||
owner name
|
||||
names the owner for the file in the UNIX file
|
||||
system (the user who will appear in the file's
|
||||
"owner" field in the output from ls -l).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
file's owner is set to match the source file's
|
||||
owner. If this slot is empty, the group name and
|
||||
mode bits slots must also be empty.
|
||||
|
||||
group name
|
||||
names the group for the file in the UNIX file
|
||||
system (the group that will appear in the file's
|
||||
group field in the output from ls -lg).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
file's group is set to match the source file's
|
||||
group. If this slot is empty, the owner name and
|
||||
mode bits slots must also be empty.
|
||||
|
||||
mode bits defines the mode bits that protect the file in the
|
||||
UNIX file system. Legal values are the standard
|
||||
three- or four-digit decimal numbers corresponding
|
||||
to combinations of rights. Example: 755
|
||||
corresponds to rwxr-xr-x.
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
file's mode bits are set to match the source
|
||||
|
||||
|
||||
|
||||
file's mode bits. If this slot is empty, the
|
||||
owner name and group name slots must also be
|
||||
empty.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following, appropriate for a machine running AIX 2.2.1
|
||||
in the Transarc cell, creates/updates the file /bin/grep on
|
||||
the local disk, using /afs/transarc.com/rt_aix221/bin/grep
|
||||
as the source.
|
||||
|
||||
|
||||
F /bin/grep /afs/transarc.com/rt_aix221 root wheel 7
|
||||
|
||||
The next example specifies an absolute pathname for the
|
||||
source file, as indicated by the A update code. The Q code
|
||||
makes package return status code 4 as it exits, prompting a
|
||||
reboot of the machine if the standard package-related
|
||||
changes have been made to /etc/rc. This example also leaves
|
||||
the owner name, group name and mode bits slots empty, so
|
||||
that the disk file adopts the source file's values for those
|
||||
slots.
|
||||
|
||||
|
||||
FAQ /usr/vice/etc/ThisCell /afs/transarc.com/common/
|
||||
|
||||
|
||||
|
||||
Configuration File "L" Line -- create symbolic link.
|
||||
|
||||
|
||||
L[<update code>] <link> <actual file> [<owner name>
|
||||
<group name> <mode bits>]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a symbolic link to a directory or file that exists
|
||||
either in AFS or elsewhere on the local disk. If package
|
||||
cannot access the actual directory/file, it aborts.
|
||||
|
||||
If a file or directory currently exists on the local disk
|
||||
under this name, package replaces it with a symbolic link.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
L should be a capital letter and tells the command
|
||||
interpreter that this is a symbolic link
|
||||
definition.
|
||||
|
||||
update code
|
||||
modulates the way that package creates the
|
||||
symbolic link, as discussed for each code. It is
|
||||
optional and if provided should follow the letter
|
||||
L directly, without an intervening space. The two
|
||||
legal update-mode codes may combined with one
|
||||
another, in either order. The legal values are:
|
||||
|
||||
- A, which indicates that the pathname in the
|
||||
actual file slot is the complete pathname of
|
||||
the actual file, including the filename. By
|
||||
default, the actual file pathname does not
|
||||
include a file name at the endMinstead,
|
||||
package appends the name in the link slot to
|
||||
the actual file pathname in order to
|
||||
determine the actual file's full name.
|
||||
Thus, this code allows the name of the
|
||||
symbolic link being created to differ from
|
||||
the name of the actual file. See also the
|
||||
EXAMPLE(S) section.
|
||||
|
||||
- I, which indicates that the symbolic link
|
||||
should not be overwritten if it already
|
||||
exists on the local disk. If it does not
|
||||
exist, then package creates it.
|
||||
|
||||
link specifies the complete pathname of the symbolic
|
||||
link to be created on the local disk.
|
||||
|
||||
actual file
|
||||
specifies the file (in AFS or on the local disk)
|
||||
to which the symbolic link refers.
|
||||
|
||||
If the A update code appears on the line, this
|
||||
slot should specify the actual file's complete
|
||||
pathname. Otherwise, this slot should specify
|
||||
only the part of the pathname that precedes the
|
||||
name of the local disk link. As an example,
|
||||
suppose that the configuration file is for a
|
||||
Transarc cell machine running Ultrix 3.0, so that
|
||||
|
||||
|
||||
|
||||
/etc/ftpd is a symbolic link to
|
||||
/afs/transarc.com/vax_ul3/etc/ftpd. If the A does
|
||||
not appear, then the proper filler for this slot
|
||||
is /afs/transarc.com/vax_ul3, not
|
||||
/afs/transarc.com/vax_ul3/etc/ftpd. See also the
|
||||
EXAMPLE(S) section.
|
||||
|
||||
owner name
|
||||
names the owner for the symbolic link in the UNIX
|
||||
file system (the user who will appear in the
|
||||
symbolic link's "owner" field in the output from
|
||||
ls -l).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
symbolic link's owner is set to match the UNIX
|
||||
user name of the issuer of the package command
|
||||
(i.e., "root"). If this slot is empty, the group
|
||||
name and mode bits slots must also be empty.
|
||||
|
||||
group name
|
||||
names the group for the symbolic link in the UNIX
|
||||
file system (the group that will appear in the
|
||||
symbolic link's group field in the output from
|
||||
ls -lg).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
symbolic link's group is set to match the group
|
||||
for the issuer of the package command (defined in
|
||||
the issuer's /etc/rc entry. If this slot is
|
||||
empty, the owner name and mode bits slots must
|
||||
also be empty.
|
||||
|
||||
mode bits defines the mode bits that protect the symbolic
|
||||
link in the UNIX file system. Legal values are
|
||||
the standard three- or four-digit decimal numbers
|
||||
corresponding to combinations of rights. Example:
|
||||
755 corresponds to rwxr-xr-x.
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
symbolic link's mode bits are set to 777
|
||||
(rwxrwxrwx). If this slot is empty, the owner
|
||||
name and group name slots must also be empty.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following, appropriate for a machine running Ultrix 3.0
|
||||
in the Transarc cell, creates a symbolic link from /etc/ftpd
|
||||
on the local disk to the file
|
||||
/afs/transarc.com/vax_ul3/etc/ftpd in AFS.
|
||||
|
||||
|
||||
L /etc/ftpd /afs/transarc.com/vax_ul3 root wheel 644
|
||||
|
||||
The next example uses an absolute pathname (as indicated by
|
||||
the A update code), because the symbolic link and actual
|
||||
file names differ. This example also leaves the owner name,
|
||||
group name and mode bits slots empty, so that the symbolic
|
||||
link adopts values for those slots from the actual file.
|
||||
|
||||
|
||||
LA /etc/printcap /afs/transarc.com/common/etc/printca
|
||||
|
||||
|
||||
|
||||
Configuration File "S" Line -- define socket.
|
||||
|
||||
|
||||
S <socket name> [<owner name> <group name> <mode bits>]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Defines a socket (a communications device for UDP and TCP/IP
|
||||
connections).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
S should be a capital letter and tells the command
|
||||
interpreter that this is a socket definition.
|
||||
|
||||
socket name
|
||||
names the socket being defined.
|
||||
|
||||
owner name
|
||||
names the owner for the socket in the UNIX file
|
||||
system (the user who will appear in the socket's
|
||||
"owner" field in the output from ls -l).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
socket's owner is set to match the UNIX user name
|
||||
of the issuer of the package command (i.e.,
|
||||
"root"). If this slot is empty, the group name
|
||||
and mode bits slots must also be empty.
|
||||
|
||||
group name
|
||||
names the group for the socket in the UNIX file
|
||||
system (the group that will appear in the socket's
|
||||
group field in the output from ls -lg).
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
socket's group is set to match the group for the
|
||||
issuer of the package command (defined in the
|
||||
issuer's /etc/rc entry. If this slot is empty,
|
||||
the owner name and mode bits slots must also be
|
||||
empty.
|
||||
|
||||
mode bits defines the mode bits that protect the socket in
|
||||
the UNIX file system. Legal values are the
|
||||
standard three- or four-digit decimal numbers
|
||||
corresponding to combinations of rights. Example:
|
||||
755 corresponds to rwxr-xr-x.
|
||||
|
||||
This slot may be left empty, in which case the
|
||||
socket's mode bits are set to 777 (rwxrwxrwx), as
|
||||
modulated by the cell's umask. If this slot is
|
||||
empty, the owner name and group name slots must
|
||||
also be empty.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following defines the socket /dev/printer:
|
||||
|
||||
|
||||
S /dev/printer root wheel 777
|
||||
|
||||
|
||||
|
||||
Configuration File %define -- define variable or declare
|
||||
|
||||
string.
|
||||
|
||||
|
||||
%define <variable> <value> %define <declaration>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
If followed by two arguments, defines the second argument as
|
||||
the value of the first, which may appear as a variable (in
|
||||
the form ${variable}) in the same or other prototype/library
|
||||
files. The second argument is substituted for occurrences
|
||||
of the variable wherever it occurs.
|
||||
|
||||
If followed by a single argument, declares the argument to
|
||||
be defined, making it available for use as a controller in
|
||||
%ifdef and %ifndef statements. That is, %ifdef statements
|
||||
mentioning this variable will resolve as "true," %ifndef
|
||||
statements as "false."
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
variable as the first of two arguments, specifies the
|
||||
name of the variable for which a value is
|
||||
defined. This argument may appear in
|
||||
variable form (i.e., as ${variable}) in this
|
||||
or other prototype/library files.
|
||||
|
||||
value as the second of two arguments, specifies
|
||||
the value to be assigned to variable-form
|
||||
occurrences of the first argument.
|
||||
|
||||
declaration as the single argument, declares the
|
||||
indicated string to be defined.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following defines the value for the variable
|
||||
${diskmode}. This variable is used elsewhere in the
|
||||
template to fill the <owner name>, <group name> and
|
||||
<mode bit> slots on a "D", "F" or "L" line.
|
||||
|
||||
|
||||
%define diskmode root wheel 644
|
||||
|
||||
The following declares the string "afsd" to be defined.
|
||||
|
||||
|
||||
%define afsd
|
||||
|
||||
|
||||
|
||||
Configuration File %ifdef -- specify action to perform if
|
||||
|
||||
value is declared or defined.
|
||||
|
||||
|
||||
%ifdef <declaration>
|
||||
+
|
||||
<action> [%else [<declaration>]
|
||||
+
|
||||
<alternate action> ] %endif <declaration>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Specifies the action(s) to perform if the indicated
|
||||
declaration has been made with a single-argument %define
|
||||
statement, or if the indicated variable has a value.
|
||||
|
||||
The optional %else statement specifies alternate action(s)
|
||||
to perform if the indicated declaration has never been made,
|
||||
or has been undone with %undef.
|
||||
|
||||
It is possible to nest any number of %ifdef and %ifndef
|
||||
statements.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
declaration specifies the string that must be declared,
|
||||
or variable that must be defined, if the
|
||||
action is to be performed. Its second
|
||||
occurrence (following %else) is optional,
|
||||
serving only to clarify which %ifdef the
|
||||
%else belongs to. The first and third
|
||||
occurrences (the latter following %endif)
|
||||
are required.
|
||||
|
||||
action specifies each action to perform if the
|
||||
%ifdef statement resolves to "true." Each
|
||||
action should appear on a separate line.
|
||||
Both "%-statements" and definition lines are
|
||||
acceptable actions.
|
||||
|
||||
alternate action
|
||||
specifies each action to perform if the
|
||||
%ifdef statement resolves to "false." Each
|
||||
action should appear on a separate line.
|
||||
Both "%-statements" and definition lines are
|
||||
acceptable actions.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following specifies that if the string rt_aos4 is
|
||||
currently declared, then the three indicated library files
|
||||
will be included in the configuration file resulting from
|
||||
compilation of this prototype file.
|
||||
|
||||
%ifdef rt_aos4
|
||||
%include ${wsadmin}/lib/rt_aos4.readonly
|
||||
%include ${wsadmin}/lib/rt_aos4.generic
|
||||
%include ${wsadmin}/lib/rt_aos4.generic.dev
|
||||
%endif rt_aos4
|
||||
|
||||
|
||||
|
||||
Configuration File %ifndef -- specify action to perform if
|
||||
|
||||
value is not declared or defined.
|
||||
|
||||
|
||||
%ifndef <declaration>
|
||||
+
|
||||
<action> [%else [<declaration>]
|
||||
+
|
||||
<alternate action> ] %endif <declaration>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Specifies the action(s) to perform if the indicated
|
||||
declaration has never been made or has been undone with an
|
||||
%undef statement, or if the indicated variable does not have
|
||||
a value.
|
||||
|
||||
The optional %else statement specifies alternate action(s)
|
||||
to perform if the indicated declaration/definition has been
|
||||
made, or if the variable does have a value.
|
||||
|
||||
It is possible to nest any number of %ifdef and %ifndef
|
||||
statements.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
declaration specifies which string must not be declared,
|
||||
or which variable must not be defined, in
|
||||
order for action to be performed. Its
|
||||
second occurrence (following %else) is
|
||||
optional, serving only to clarify which
|
||||
%ifdef the %else belongs to. The first and
|
||||
third occurrences (the latter following
|
||||
%endif) are required.
|
||||
|
||||
action specifies each action to perform if the
|
||||
%ifndef statement resolves to "true" (i.e.,
|
||||
the string is not declared or variable is
|
||||
not defined). Each action should appear on
|
||||
a separate line. Both "%-statements" and
|
||||
definition lines are acceptable actions.
|
||||
|
||||
alternate action
|
||||
specifies each action to perform if the
|
||||
%ifndef statement resolves to "false" (i.e.,
|
||||
the string is declared or variable does have
|
||||
a defined value). Each action should appear
|
||||
on a separate line. Both "%-statements" and
|
||||
definition lines are acceptable actions.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate for the Transarc Corporation
|
||||
cell, defines "transarc.com" as the value of the ${cell}
|
||||
variable if it does not already have a value.
|
||||
|
||||
|
||||
%ifndef cell
|
||||
%define cell transarc.com
|
||||
%endif cell
|
||||
|
||||
|
||||
|
||||
Configuration File %include -- include library file.
|
||||
|
||||
|
||||
%include <file pathname>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Causes contents of indicated library file to be included in
|
||||
configuration file resulting from compilation of this
|
||||
prototype file.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
file pathname specifies the complete pathname of the
|
||||
library file to be included. The pathname
|
||||
may include variables.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following includes the file base.generic from the lib
|
||||
subdirectory of the directory in which the cell keeps
|
||||
package related files. The ${wsadmin} variable will be
|
||||
resolved to an actual pathname (such as
|
||||
/afs/transarc.com/wsadmin) during compilation.
|
||||
|
||||
|
||||
%include ${wsadmin}/lib/base.generic
|
||||
|
||||
|
||||
|
||||
Configuration File %undef -- declare value to be defined no
|
||||
|
||||
longer.
|
||||
|
||||
|
||||
%undef <declaration>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Specifies that the indicated string is no longer defined.
|
||||
Any %ifndef statements involving this string will then
|
||||
resolve as "true," %ifdef statements as "false."
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
declaration specifies the string that should no longer
|
||||
is no longer defined.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following declares the string "afsd" not to be defined.
|
||||
|
||||
|
||||
%undef afsd
|
@ -1,85 +0,0 @@
|
||||
pagsh AFS Commands pagsh
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
pagsh -- create new process authentication group (PAG).
|
||||
|
||||
|
||||
pagsh
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a new command shell (owned by the issuer of the
|
||||
command) and associates a new "process authentication group"
|
||||
(PAG) with the shell and the user. A PAG is a number
|
||||
guaranteed to identify the issuer of commands in the new
|
||||
shell uniquely to the local Cache Manager. The PAG is used,
|
||||
instead of the issuer's UNIX UID, to identify him or her in
|
||||
the credential structure that the Cache Manager creates to
|
||||
track each user.
|
||||
|
||||
Any additional tokens issued to the user (presumably for
|
||||
other cells) become associated with the PAG, rather than
|
||||
with the user's UNIX UID. This method for distinguishing
|
||||
users has two advantages.
|
||||
|
||||
- It means that processes spawned by the user
|
||||
inherit the PAG and so share the token; thus they
|
||||
gain access to AFS as the authenticated user. In
|
||||
many environments, for example, printer and other
|
||||
daemons run under identities (such as "root") that
|
||||
the AFS server processes recognize only as
|
||||
anonymous. Unless PAGs are used, such daemons
|
||||
cannot access files protected against
|
||||
system:anyuser.
|
||||
|
||||
- It closes a potential security loophole: UNIX
|
||||
allows anyone already logged in as "root" on a
|
||||
machine to assume any other identity by issuing
|
||||
su. If the credential structure were identified
|
||||
by a UNIX UID rather than a PAG, then assuming the
|
||||
same UID would mean being able to use the token,
|
||||
too. Use of a PAG as an identifier eliminates
|
||||
that possibility.
|
||||
|
||||
WARNINGS AND REQUIREMENTS
|
||||
|
||||
Each PAG created uses two of the memory slots that the
|
||||
kernel uses to record the UNIX groups associated with a
|
||||
user. If none of these slots are available, the pagsh
|
||||
command fails. This is not a problem with most operating
|
||||
systems, which make at least 16 slots available per user.
|
||||
|
||||
Users in cells not using the AFS version of login should
|
||||
issue this command before issuing klog. If they do not,
|
||||
then the Cache Manager stores the token in a credential
|
||||
structure identified by UNIX UID rather than PAG. This
|
||||
creates the potential security loophole described in the
|
||||
DESCRIPTION section.
|
||||
|
||||
If the command is to be issued on NFS client machines for
|
||||
which AFS is available, the pagsh binary accessed by the NFS
|
||||
client must be owned by, and grant setuid privilege to,
|
||||
"root." The complete set of mode bits should be -rwsr-xr-x.
|
||||
|
||||
|
||||
|
||||
This is not a requirement when the command is issued on AFS
|
||||
client machines.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following shows the only possible use of the command.
|
||||
|
||||
% pagsh
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
klog
|
||||
|
||||
login (AFS version)
|
117
src/man/runntp.1
117
src/man/runntp.1
@ -1,117 +0,0 @@
|
||||
runntp AFS Commands runntp
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
runntp -- initialize Network Time Protocol Daemon.
|
||||
|
||||
|
||||
/usr/afs/bin/runntp [-localclock] [-precision <small
|
||||
negative integer>]
|
||||
+
|
||||
[-logfile <pathname>] [<machine name> ]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the Network Time Protocol Daemon and related
|
||||
programs on the local machine. It also constructs the
|
||||
ntp.conf configuration file.
|
||||
|
||||
This command is intended as a convenient interface to the
|
||||
standard ntpd program, to be used on AFS file server
|
||||
machines.
|
||||
|
||||
WARNING
|
||||
|
||||
A cell in which the NTPD was running before the introduction
|
||||
of AFS does not need to use runntp. It is an error to run
|
||||
two NTPDs on one machine.
|
||||
|
||||
This command is not normally issued at the command shell
|
||||
prompt, but rather placed into a file server machine's
|
||||
/usr/afs/local/BosConfig with the bos create command.
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites, so the command and switch names must be
|
||||
typed in full.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-localclock
|
||||
tells NTPD to use the local machine's internal
|
||||
clock as a possible source of the correct time in
|
||||
case a network partition separates the machine
|
||||
from the specified machine name(s). Cells
|
||||
connected to the Internet should not normally use
|
||||
this flag. In cells that experience frequent
|
||||
separations from the network (voluntary or
|
||||
otherwise), it should be used only on the system
|
||||
control machine.
|
||||
|
||||
-precision
|
||||
specifies the precision of the local clock. This
|
||||
argument is not normally provided. As ntpd
|
||||
initializes, it determines the precision of the
|
||||
local clock on its own. If the argument is
|
||||
provided, it should be a small integer preceded by
|
||||
a hyphen to show that it is negative. The value
|
||||
is used as an exponent on the number 2, and the
|
||||
result interpreted as the frequency, in fractions
|
||||
of a second, at which the local clock tics
|
||||
(advances).
|
||||
|
||||
For example, a value of -6, which translates to
|
||||
|
||||
|
||||
|
||||
-6
|
||||
2 or 1/64, means that the local clock tics once
|
||||
every 1/64th of a second, or has a precision of
|
||||
about 60 tics per second. A value of -7
|
||||
translates to about 100 tics per second. A value
|
||||
of -10 translates to about 1000 tics per second (a
|
||||
millisecond clock).
|
||||
|
||||
-logfile indicates the pathname of the file in which to
|
||||
store log output from NTPD. Indicate a location
|
||||
on the file server machine's local disk, not in
|
||||
AFS; a suitable location might be
|
||||
/usr/afs/logs/ntp.log. The log records
|
||||
information about which machines are serving as
|
||||
time sources and peers, what adjustments have been
|
||||
made to reduce drift, and so on. Use ntpd's
|
||||
debugging mechanism to control the amount of
|
||||
information produced. If this argument is
|
||||
omitted, the information is discarded.
|
||||
|
||||
machine name
|
||||
is the complete Internet-style host name of each
|
||||
machine the local machine should consult for the
|
||||
correct time. Preferably the machines are outside
|
||||
the cell.
|
||||
|
||||
In general, this argument is necessary only on the
|
||||
system control machine. If the issuer omits it,
|
||||
then the local machine consults its
|
||||
/usr/afs/etc/CellServDB file and uses the machines
|
||||
listed there as time sources.
|
||||
|
||||
See the AFS Installation Guide or consult AFS
|
||||
Product Support at Transarc for advice on
|
||||
selecting appropriate time sources.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList to place this
|
||||
command in /usr/afs/local/BosConfig, because that is the
|
||||
privilege required to issue bos create.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos create
|
||||
|
||||
UNIX manual page for ntp
|
||||
|
||||
UNIX manual page for ntpd
|
||||
|
||||
UNIX manual page for ntpdc
|
@ -1,101 +0,0 @@
|
||||
salvager AFS Commands salvager
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
salvager -- initialize Salvager in BosConfig or manually.
|
||||
|
||||
|
||||
/usr/afs/bin/salvager [-f] [-o] [<partition name>
|
||||
[<volumeID>]]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the Salvager component of the fs process, which
|
||||
corrects corruption in ReadWrite volumes where possible.
|
||||
Unlike most other AFS file server processes, this process
|
||||
can also be started from the command line. It produces a
|
||||
trace of its actions in /usr/afs/logs/SalvageLog.
|
||||
|
||||
If the Salvager detects corruption in ReadOnly or Backup
|
||||
volumes, it removes them rather than attempting to correct
|
||||
the corruption; it records the removal in SalvageLog. If
|
||||
desired, the issuer can recreate the ReadOnly or Backup
|
||||
version by issuing vos release or vos backup, respectively.
|
||||
|
||||
The Salvager normally salvages only those ReadWrite volumes
|
||||
that are marked as having been active when a crash occurred.
|
||||
To have it salvage all relevant ReadWrite volumes, add the
|
||||
-f flag.
|
||||
|
||||
The number of volumes the Salvager attempts to salvage
|
||||
depends on the combination of arguments and flags used. To
|
||||
salvage:
|
||||
|
||||
- volumes on all /vicepx partitions on a file server
|
||||
machine, provide no arguments
|
||||
|
||||
- volumes on a certain partition, specify the
|
||||
partition's full (/vicepx-style) name as partition
|
||||
name
|
||||
|
||||
- one particular ReadWrite volume, specify its
|
||||
partition as partition name and its volumeID
|
||||
number as volumeID
|
||||
|
||||
WARNING
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites, so the command and switch names must be
|
||||
typed in full.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-f inspects all volumes for corruption, not just
|
||||
those that are marked as having been active
|
||||
when a crash occurred.
|
||||
|
||||
-o enables the Salvager to remove volumes that are
|
||||
too damaged to be removed in the normal manner.
|
||||
Do not Use this argument unless a member of the
|
||||
AFS Product Support staff has directed its use.
|
||||
In normal cases, use the -force flag on the
|
||||
vos zap command instead. If this flag is
|
||||
provided, it should be combined with partition
|
||||
|
||||
|
||||
|
||||
name and volumeID.
|
||||
|
||||
partition name
|
||||
specifies which partition the Salvager should
|
||||
inspect for corruption. If it is omitted,
|
||||
every /vicepx partition on the file server
|
||||
machine is inspected.
|
||||
|
||||
volumeID number
|
||||
specifies the volumeID number of the Read Write
|
||||
volume to salvage.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following command instructs the Salvager to attempt to
|
||||
salvage the volume with volume ID 258347486 on /vicepg on
|
||||
the local machine.
|
||||
|
||||
% /usr/afs/bin/salvager /vicepg 258347486
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be logged into the local UNIX file system as
|
||||
"root" to issue this command to the shell.
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList to place this
|
||||
command in /usr/afs/local/BosConfig, because that is the
|
||||
privilege required to issue bos create.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos create
|
||||
|
||||
bos salvage
|
363
src/man/scout.1
363
src/man/scout.1
@ -1,363 +0,0 @@
|
||||
scout AFS Commands scout
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
scout -- monitor File Server process on one or more file
|
||||
|
||||
server machines.
|
||||
|
||||
|
||||
+
|
||||
scout -server <File Server name(s) to monitor>
|
||||
[-basename <base server name>]
|
||||
[-frequency <poll frequency, in seconds>] [-host]
|
||||
+
|
||||
[-attention <specify attention (highlighting) level> ]
|
||||
[-debug <turn debugging on to the named file>] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
scout -s <File Server name(s) to monitor>
|
||||
[-b <base server name>]
|
||||
[-f <poll frequency, in seconds>] [-ho]
|
||||
+
|
||||
[-a <specify attention (highlighting) level> ]
|
||||
[-d <turn debugging on to the named file>] [-he]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays statistics gathered from the File Server process
|
||||
running on each machine specified with -server. The OUTPUT
|
||||
section explains the meaning of the statistics and describes
|
||||
how they appear on the screen.
|
||||
|
||||
REQUIREMENTS
|
||||
|
||||
In addition to the scout binary, the machine must be able to
|
||||
access the "curses" graphics package, since scout's display
|
||||
abilities rely on it. Most UNIX distributions include
|
||||
curses as a standard utility.
|
||||
|
||||
Both "dumb" terminals and windowing systems that emulate
|
||||
terminals can display scout's statistics. The scout display
|
||||
makes use of reverse video and cursor addressing, so for the
|
||||
display to look its best, the display environment should
|
||||
support those features (most windowing systems do, most dumb
|
||||
terminals do not). To let scout know what type of
|
||||
environment is being used, the user should set the
|
||||
environment variable TERM to the correct terminal type, or
|
||||
one with characteristics similar to the actual ones. For
|
||||
machines running AIX, the recommended setting for TERM is
|
||||
vt100, as long as the terminal is similar to that. For
|
||||
other operating systems, the wider range of acceptable
|
||||
values includes xterm, xterms, vt100, vt200 and wyse85.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-server names each File Server process to monitor, by
|
||||
identifying the file server machine it is running
|
||||
on. Complete Internet-style host names are best,
|
||||
unless the -basename argument is used. In that
|
||||
case, specify only the unique initial part of each
|
||||
machine name, omitting the domain/cell name suffix
|
||||
(or "basename") common to all the names.
|
||||
Shortened unambiguous names are legal when the
|
||||
-basename argument is not used, but in that case
|
||||
their correct resolution depends on the state of
|
||||
the cell's naming service at the time the command
|
||||
is issued.
|
||||
|
||||
-basename specifies the basename (domain/cell name) suffix
|
||||
common to all of the file server machine names
|
||||
specified with -server, and is automatically
|
||||
appended to them. This argument is normally the
|
||||
name of the cell to which the machines belong. Do
|
||||
not include the period that separates this suffix
|
||||
from the distinguishing part of each file server
|
||||
machine name, but do include any periods that
|
||||
occur within the suffix itself. (For example, in
|
||||
the Transarc Corporation cell, the proper value
|
||||
would be "transarc.com", not ".transarc.com".)
|
||||
|
||||
-frequency
|
||||
indicates how often scout should probe the File
|
||||
Server processes. Specify a number of seconds
|
||||
greater than 0. The default is 60 seconds.
|
||||
|
||||
-host causes the banner line to display the name of the
|
||||
machine that is running scout. The default is not
|
||||
to display the machine name in the banner.
|
||||
|
||||
-attention
|
||||
defines a list of one or more entries, each of
|
||||
which pairs a type of statistic and a threshold
|
||||
value. When the value of the statistic exceeds
|
||||
the indicated threshold value, scout highlights
|
||||
the value. The pairs may appear in any order.
|
||||
Legal values for the pairs are
|
||||
|
||||
- conn <connections>. Indicates the maximum
|
||||
number of connections that the File Server
|
||||
may have open to client machines before the
|
||||
value is highlighted. Highlighting goes
|
||||
away when the value goes back below the
|
||||
threshold. By default, no threshold is set.
|
||||
|
||||
Example of a legal value: conn 300
|
||||
|
||||
- fetch <bytes fetched>. Indicates the
|
||||
maximum number of bytes of data that clients
|
||||
can have fetched from the File Server before
|
||||
the value is highlighted. Highlighting goes
|
||||
away when the value goes back below the
|
||||
threshold, but this is possible only if the
|
||||
File Server is restarted, at which time the
|
||||
value returns to 0. By default, no
|
||||
|
||||
|
||||
|
||||
threshold is set.
|
||||
|
||||
Example of a legal value: fetch 45000
|
||||
|
||||
- store <bytes stored>. Indicates the maximum
|
||||
number of bytes of data that clients can
|
||||
have sent to the File Server for storage
|
||||
before the value is highlighted.
|
||||
Highlighting goes away when the value goes
|
||||
back below the threshold, but this is
|
||||
possible only if the File Server is
|
||||
restarted, at which time the value returns
|
||||
to 0. By default, no threshold is set.
|
||||
|
||||
Example of a legal value: store 120000
|
||||
|
||||
- ws <number of active client machines>.
|
||||
Indicates the maximum number of "active"
|
||||
client machines the File Server can be
|
||||
serving before the value is highlighted.
|
||||
"Active" machines are defined as those that
|
||||
have communicated with the File Server in
|
||||
the last 15 minutes. Highlighting goes away
|
||||
when the value goes back below the
|
||||
threshold. By default, no threshold is set.
|
||||
|
||||
Example of a legal value: ws 65
|
||||
|
||||
- disk <percent full>%. Indicates the maximum
|
||||
percentage of the disk that can be full
|
||||
before the value is highlighted; in that
|
||||
case legal values are the integers between 0
|
||||
and 99.
|
||||
|
||||
Examples of legal values: disk 90% and disk
|
||||
72%.
|
||||
|
||||
OR
|
||||
|
||||
disk <minimum blocks free>. Indicates the
|
||||
minimum number of kilobyte blocks that must
|
||||
be available on the partition if the value
|
||||
is not to be highlighted.
|
||||
|
||||
Examples of legal values: disk 1500 and
|
||||
disk 5000.
|
||||
|
||||
Specify one type of value or the other.
|
||||
Highlighting goes away when the value goes
|
||||
back below the percent threshold or above
|
||||
the blocks-free threshold. By default, the
|
||||
threshold is 95%.
|
||||
|
||||
-debug enables debugging output and directs it into the
|
||||
specified file. Providing a complete pathname is
|
||||
best; otherwise it is interpreted relative to the
|
||||
current working directory. By default, no
|
||||
debugging output is produced.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
|
||||
|
||||
|
||||
one.
|
||||
|
||||
OUTPUT
|
||||
|
||||
Scout can display statistics either in a dedicated window or
|
||||
on a plain screen if a windowing environment is not
|
||||
available. For best results, the window or screen should
|
||||
have the ability to print in reverse video.
|
||||
|
||||
The scout screen has three main parts: the banner line, the
|
||||
statistics display region and the message/probe line.
|
||||
|
||||
The Banner Line
|
||||
|
||||
The word "Scout" appears in the banner line at the top of
|
||||
the window or screen, to indicate that scout is running.
|
||||
Additional information may appear in the banner line if the
|
||||
system administrator includes the appropriate
|
||||
flags/arguments on the command line. By default, this
|
||||
information does not appear.
|
||||
|
||||
- The name of the machine executing scout. The
|
||||
-hostname flag causes scout to display this
|
||||
machine name in the banner line. This is useful
|
||||
in cases where the administrator wants to run
|
||||
scout on several machines, but view the output on
|
||||
only one machine (to achieve this, he or she could
|
||||
open several windows on a machine, then telnet to
|
||||
a different machine in each one in order to run
|
||||
scout there).
|
||||
|
||||
An example: if a user runs scout on the machine
|
||||
client1.transarc.com and use the -hostname flag,
|
||||
the banner line will read
|
||||
|
||||
|
||||
[client1.transarc.com] Scout
|
||||
|
||||
- The ``basename'' of the file server machines being
|
||||
monitored. Scout identifies a File Server process
|
||||
by the name of the file server machine it is
|
||||
running on. If all of the machine names in a
|
||||
scout window end in the same string (share the
|
||||
same basename), then it is useful to display the
|
||||
basename in one place rather than on every machine
|
||||
name. The -basename argument causes scout to
|
||||
display the indicated basename on the banner line.
|
||||
The issuer then leaves the basename off of each
|
||||
file server machine name provided, specifying only
|
||||
the distinguishing prefix rather than the complete
|
||||
machine name.
|
||||
|
||||
An example, if a user specifies a value of
|
||||
transarc.com for -basename, the banner line will
|
||||
read
|
||||
|
||||
|
||||
Scout for transarc.com
|
||||
|
||||
The Statistics Display Region
|
||||
|
||||
In this region, which takes up the majority of the window,
|
||||
|
||||
|
||||
|
||||
Scout displays the statistics gathered for each File Server
|
||||
process. Each process appears on its own line.
|
||||
|
||||
The region is divided into six columns, labeled as indicated
|
||||
and displaying the following information:
|
||||
|
||||
- Conn: number of connections with clients. The
|
||||
first column displays the number of RPC
|
||||
connections open between the File Server process
|
||||
and client machines. This number should equal or
|
||||
exceed the number in the Ws column (explained
|
||||
below). It can exceed it because each process
|
||||
access group (PAG) requires a separate RPC
|
||||
connection, and one client machine can handle
|
||||
several PAGs. The administrator can use the
|
||||
-attention argument to specify the value at which
|
||||
entries in the column should be highlighted.
|
||||
|
||||
- Fetch: bytes fetched from File Server. The second
|
||||
column displays the number of bytes of data that
|
||||
client machines have fetched from the File Server
|
||||
process. This number is reset to zero each time
|
||||
the File Server process restarts. The
|
||||
administrator can use the -attention argument to
|
||||
specify the value at which entries in the column
|
||||
should be highlighted.
|
||||
|
||||
- Store: bytes stored by the File Server. The third
|
||||
column displays the number of bytes of data that
|
||||
client machines have sent to the File Server
|
||||
process for storage. This number is reset to zero
|
||||
each time the File Server process restarts. The
|
||||
administrator can use the -attention argument to
|
||||
specify the value at which entries in the column
|
||||
should be highlighted.
|
||||
|
||||
- Ws: number of "active" client machines. The
|
||||
fourth column displays the number of client
|
||||
machines (workstations) that have communicated
|
||||
with the File Server process within the last 15
|
||||
minutes. This number is likely to be smaller than
|
||||
the number in the Conn column, because a single
|
||||
client machine can have several connections open
|
||||
to one File Server. The administrator can use the
|
||||
-attention argument to specify the value at which
|
||||
entries in the column should be highlighted.
|
||||
|
||||
- File server machine name. The fifth, unlabeled,
|
||||
column displays the name of the file server
|
||||
machine on which the File Server process is
|
||||
running. If a name is too long to fit in the
|
||||
field, it is truncated and an asterisk (*) appears
|
||||
as the last character in the name. Using the
|
||||
-basename argument is a good way to avoid
|
||||
truncation, but only if all machine names end in a
|
||||
common string. Entries in this column become
|
||||
highlighted if the File Server process does not
|
||||
respond to scout's probes.
|
||||
|
||||
- Disk attn: disk usage. The sixth column displays
|
||||
how many kilobyte blocks are available on each AFS
|
||||
|
||||
|
||||
|
||||
disk partition on the file server machine. The
|
||||
display for each partition has the form
|
||||
|
||||
|
||||
x:free_blocks
|
||||
|
||||
where x indicates the partition name. For
|
||||
example, a:8949 specifies that partition /vicepa
|
||||
has 8,949 free kilobyte blocks. The available
|
||||
space may be displayed for up to 10 partitions.
|
||||
If the window is not wide enough for all of the
|
||||
partition entries to appear on a single line,
|
||||
scout automatically creates multiple lines,
|
||||
"stacking" the partition entries into sub-columns
|
||||
within the Disk attn column.
|
||||
|
||||
The label on the Disk attn column indicates the
|
||||
threshold at which values are highlighted. By
|
||||
default, the label is
|
||||
|
||||
|
||||
Disk attn: > 95% used
|
||||
|
||||
because by default scout highlights the entry for
|
||||
any partition that is over 95% full. The
|
||||
administrator may use the -attention argument to
|
||||
change this default to either another percentage
|
||||
or a minimum number of free blocks.
|
||||
|
||||
The Message/Probe Line
|
||||
|
||||
The bottom line of the scout screen indicates how many times
|
||||
scout has "probed" the File Server processes for statistics.
|
||||
The columns in the Statistics Display region above this line
|
||||
display the result of the latest probe. By default, scout
|
||||
probes the File Servers every 60 seconds, but the
|
||||
administrator can use the -frequency argument to specify a
|
||||
different number of seconds.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
See the chapter on scout in the AFS System Administrator's
|
||||
Guide, which illustrates the on-screen displays that result
|
||||
from different combinations of switches and flags.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
@ -1,85 +0,0 @@
|
||||
tokens AFS Commands tokens
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
tokens -- display all tokens.
|
||||
|
||||
|
||||
tokens
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Instructs the Cache Manager on the local machine to display
|
||||
all tokens (tickets) it has for the issuer. AFS server
|
||||
processes require that their clients present a token as
|
||||
evidence that they have authenticated in the server's local
|
||||
cell.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The output lists one token for each cell in which the user
|
||||
is authenticated. The output indicates:
|
||||
|
||||
- the user's AFS UID, if it is available for display
|
||||
|
||||
- the server for which the token is valid (normally,
|
||||
"afs"). This includes a cell specification.
|
||||
|
||||
- the day and time the token expires
|
||||
|
||||
An --End of list-- message appears at the end of the output.
|
||||
If the user is not authenticated in any cell, this message
|
||||
is all that appears.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the output when the issuer is not
|
||||
authenticated in any cell.
|
||||
|
||||
|
||||
% tokens
|
||||
Tokens held by the Cache Manager:
|
||||
|
||||
[ 1] --End of list--
|
||||
|
||||
The following shows the output when the issuer is
|
||||
authenticated in Transarc Corporation cell, where he or she
|
||||
has AFS UID 1000.
|
||||
|
||||
|
||||
% tokens
|
||||
Tokens held by the Cache Manager:
|
||||
|
||||
[ 1]User's (AFS ID 1000) tokens for afs@transarc.co
|
||||
[Expires Jan 2 10:
|
||||
[ 2] --End of list--
|
||||
|
||||
The following shows the output when the issuer is
|
||||
authenticated in Transarc Corporation cell, Andrew cell at
|
||||
Carnegie Mellon University and Athena cell at MIT. The user
|
||||
has different AFS UIDs in the three cells. Tokens for last
|
||||
cell are expired:
|
||||
|
||||
|
||||
|
||||
% tokens
|
||||
Tokens held by the Cache Manager:
|
||||
|
||||
[ 1]User's (AFS ID 1000) tokens for afs@transarc.co
|
||||
[Expires Jan 3 10:00]
|
||||
[ 2]User's (AFS ID 4286) tokens for afs@andrew.cmu.
|
||||
[Expires Jan 3 1:34]
|
||||
[ 3]User's (AFS ID 22) tokens for afs@athena.mit.ed
|
||||
[>>Expired<<]
|
||||
[ 4] --End of list--
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
klog
|
||||
|
||||
unlog
|
@ -1,70 +0,0 @@
|
||||
unlog AFS Commands unlog
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
unlog -- discard all tokens.
|
||||
|
||||
|
||||
+
|
||||
unlog [<cell name> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
This command does not use the conventions of the AFS command
|
||||
suites. Therefore "unlog" and "-help" must be typed in
|
||||
full.
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Instructs the Cache Manager on the local machine to discard
|
||||
the specified token(s) currently held for the issuer. If no
|
||||
cell names are provided, the Cache Manager discards the
|
||||
token for the local cell and all tokens for foreign cells.
|
||||
|
||||
WARNINGS
|
||||
|
||||
Specifying one or more cell names may cause brief
|
||||
"authentication outages," during which the issuer has no
|
||||
valid tokens in any cell. This is because the command
|
||||
actually discards all tokens and then restores those that
|
||||
the issuer did not specify with cell name (and so presumably
|
||||
wishes to retain). The authentication outage may interrupt
|
||||
the operation of jobs that require authentication.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
cellname specifies each cell for which the Cache
|
||||
Manager should discard the token. If
|
||||
omitted, all tokens are discarded.
|
||||
Abbreviated cell names are acceptable, but
|
||||
which abbreviations are legal depends on the
|
||||
naming service available in the cell at the
|
||||
time the command is issued.
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following discards all tokens.
|
||||
|
||||
% unlog
|
||||
|
||||
The following discards only the tokens for the transarc.com
|
||||
and athena.mit.edu cells.
|
||||
|
||||
% unlog transarc.com athena
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
|
||||
|
||||
klog
|
||||
|
||||
tokens
|
@ -1,182 +0,0 @@
|
||||
upclient AFS Commands upclient
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
upclient -- initialize client portion of Update Server.
|
||||
|
||||
|
||||
/usr/afs/bin/upclient <source machine> [-t <checking
|
||||
frequency>] [-clear] [-crypt] <directory to
|
||||
+
|
||||
check>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the client portion of the Update Server. It
|
||||
checks periodically that the files in the specified
|
||||
directories on the local machine match those files in the
|
||||
corresponding directory on the source machine. If a file
|
||||
does not match, this process overwrites the local file with
|
||||
the file from the source machine.
|
||||
|
||||
The -clear and -crypt flags determine whether or not
|
||||
upclient requests that upserver encrypt the contents of the
|
||||
files it is distributing before transferring them across the
|
||||
network. The request applies to the files in all
|
||||
directories requested by upclient (whereas upserver supports
|
||||
different levels of encryption for different directories).
|
||||
The upserver will comply with a request only if it protects
|
||||
the directory to the same extent as specified in its
|
||||
initialization command (i.e., will not fill an upclient's
|
||||
request for -clear transfer if the upserver is set for
|
||||
-crypt).
|
||||
|
||||
By default, the upclient in the United States edition of AFS
|
||||
requests encryption. The upclient in the international
|
||||
edition of AFS does not request encryption, because the
|
||||
international edition does not provide encryption
|
||||
capability. The -crypt flag is not available in the
|
||||
international edition of this command.
|
||||
|
||||
WARNING
|
||||
|
||||
This command is not normally issued at the command shell
|
||||
prompt, but rather placed into a file server machine's
|
||||
/usr/afs/local/BosConfig with the bos create command. If it
|
||||
is ever issued at the command shell prompt, the issuer must
|
||||
be working on a file server machine. The upclient process
|
||||
uses the local KeyFile when generating a key for mutually
|
||||
authenticating with the upserver process; they always
|
||||
mutually authenticate, whether or not the data they pass is
|
||||
encrypted.
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites, so the command and switch names must be
|
||||
typed in full.
|
||||
|
||||
The -crypt flag is not available in the international
|
||||
edition of AFS.
|
||||
|
||||
Cells using the international edition of AFS should not use
|
||||
the Update Server to distribute the contents of
|
||||
/usr/afs/etc. The contents of this directory are sensitive,
|
||||
and the international edition of AFS does not provide any
|
||||
|
||||
|
||||
|
||||
facility for encrypting files before transfer across the
|
||||
network.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
source machine
|
||||
names either the cell's system control machine
|
||||
(if directory to check is /usr/afs/etc) or the
|
||||
binary distribution machine for the local
|
||||
machine's CPU/operating system type (if
|
||||
directory to check is /usr/afs/bin).
|
||||
|
||||
-t specifies how often the upclient process should
|
||||
check directory to check, in number of seconds.
|
||||
If omitted, this argument default to 300 (5
|
||||
minutes). This number effectively determines
|
||||
how long it will take for changes made on
|
||||
source machine to propagate to this machine.
|
||||
|
||||
-clear indicates that upclient requests upserver to
|
||||
transfer information in unencrypted form. Use
|
||||
this flag to change the default for the United
|
||||
States edition of AFS.
|
||||
|
||||
-crypt indicates that upclient requests upserver to
|
||||
transfer information in encrypted form. With
|
||||
the United States edition of AFS, use this flag
|
||||
to set the default explicitly. This flag is
|
||||
not available with the international edition of
|
||||
AFS.
|
||||
|
||||
directory to check
|
||||
names each directory to check for modified
|
||||
files. The usual choices are:
|
||||
|
||||
- /usr/afs/bin, in which case the
|
||||
recommended name for the process
|
||||
(assigned with the -instance argument
|
||||
on bos create) is upclientbin. The
|
||||
source machine should be the binary
|
||||
distribution machine for the local
|
||||
machine's CPU/operating system type.
|
||||
It is recommended that the -clear
|
||||
flag be used for /usr/afs/bin, since
|
||||
binaries are not particularly
|
||||
sensitive and encrypting them can
|
||||
take a long time.
|
||||
|
||||
- /usr/afs/etc, in which case the
|
||||
recommended name for the process
|
||||
(assigned with the -instance argument
|
||||
on bos create) is upclientetc. The
|
||||
source machine should be the system
|
||||
control machine.
|
||||
|
||||
Note: This option is discouraged for
|
||||
the international edition of AFS.
|
||||
See the WARNING above.
|
||||
|
||||
- both /usr/afs/bin and /usr/afs/etc,
|
||||
in which case the recommended name
|
||||
|
||||
|
||||
|
||||
for the process (assigned with the
|
||||
-instance argument on bos create) is
|
||||
upclient. The source machine should
|
||||
be the system control machine and
|
||||
also the binary distribution machine
|
||||
for this machine's CPU/operating
|
||||
system type.
|
||||
|
||||
Note: This option is discouraged for
|
||||
the international edition of AFS.
|
||||
See the WARNING above.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following bos create command creates an upclient process
|
||||
on fs4.transarc.com that refers to fs1.transarc.com as the
|
||||
source for both /usr/afs/bin and /usr/afs/etc (thus
|
||||
fs1.transarc.com is both the system control machine and the
|
||||
binary distribution machine of fs4.transarc.com's type).
|
||||
The updates are transferred every 120 seconds. The command
|
||||
requests /usr/afs/bin in unencrypted form. It does not
|
||||
specify a level of encryption for /usr/afs/etc, so the
|
||||
default is used:
|
||||
|
||||
- with the United States edition of AFS, upclient
|
||||
requests /usr/afs/etc in encrypted form.
|
||||
|
||||
- with the international edition of AFS, upclient
|
||||
requests /usr/afs/etc in unencrypted form, because
|
||||
encryption of user-level data is not possible.
|
||||
Thus, this command is not suitable with the
|
||||
international editionMthe Update Server should not
|
||||
be used to update /usr/afs/etc.
|
||||
|
||||
Type the command on a single line.
|
||||
|
||||
% bos create fs4.transarc.com upclient simple
|
||||
"/usr/afs/bin/upclient fs1.transarc.com -t 120
|
||||
/usr/afs/etc -clear /usr/afs/bin"
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList to place this
|
||||
command in /usr/afs/local/BosConfig, because that is the
|
||||
privilege required to issue bos create.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos create
|
||||
|
||||
upserver
|
@ -1,107 +0,0 @@
|
||||
upserver AFS Commands upserver
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
upserver -- initialize server portion of Update Server.
|
||||
|
||||
|
||||
+ +
|
||||
/usr/afs/bin/upserver [<directory> ] [-crypt <directory> ]
|
||||
+
|
||||
[-clear <directory> ]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Initializes the server portion of the Update Server
|
||||
(upserver process), specifying which of its local disk
|
||||
directories the process is willing to distribute in response
|
||||
to requests from the client portion of the Update Server
|
||||
(upclient process) running on other machines. If no
|
||||
directories are specified, the server portion can distribute
|
||||
the contents of any directory on its local disk.
|
||||
|
||||
The command also determines whether the upserver is willing
|
||||
to distribute a directory's contents in unencrypted form or
|
||||
not. By default, the encryption level is -clear, meaning
|
||||
that upserver transfers the directory's contents in
|
||||
unencrypted form unless an upclient requests encryption.
|
||||
When -crypt is specified for a directory, the upserver will
|
||||
refuse an upclient's request for unencrypted transfer. With
|
||||
the United States edition of AFS, the effect of -crypt is to
|
||||
guarantee that upserver transfers a directory's contents
|
||||
only in encrypted form. With the international edition, the
|
||||
effect of -crypt is to prevent upserver from ever
|
||||
transferring the directory's contents, because the upclient
|
||||
has no way to comply with the requirement that it request
|
||||
the contents in encrypted form (the -crypt flag on upclient
|
||||
is not available in the international edition). Use -crypt
|
||||
and -clear to toggle the level of encryption for directories
|
||||
as appropriate (the EXAMPLES section illustrates their use).
|
||||
|
||||
WARNING
|
||||
|
||||
This command is not normally issued at the command shell
|
||||
prompt, but rather placed into a file server machine's
|
||||
/usr/afs/local/BosConfig with the bos create command. If it
|
||||
is ever issued at the command shell prompt, the issuer must
|
||||
be working on a file server machine. The upserver process
|
||||
uses the local KeyFile when handling keys for mutually
|
||||
authenticating with the upclient process and encrypting
|
||||
data. The two processes always mutually authenticate,
|
||||
whether or not data is encrypted.
|
||||
|
||||
This command does not use the syntax conventions of the AFS
|
||||
command suites, so the command and switch names must be
|
||||
typed in full.
|
||||
|
||||
Cells using the international edition of AFS should not use
|
||||
the Update Server to distribute the contents of
|
||||
/usr/afs/etc. The contents of this directory are sensitive,
|
||||
and the international edition of AFS does not provide any
|
||||
facility for encrypting them before transfer across the
|
||||
network. One way to prevent this distribution is to mark
|
||||
/usr/afs/etc with -crypt.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
directory names each directory to be distributed in
|
||||
unencrypted form (because they appear before the
|
||||
first -crypt or -clear flag). If omitted, all
|
||||
directories on the machine's local disk are
|
||||
eligible for distribution.
|
||||
|
||||
-crypt precedes a list of one or more directories which
|
||||
upserver will distribute only in encrypted form.
|
||||
|
||||
-clear precedes a list of one or more directories which
|
||||
upserver may distribute in unencrypted form (but
|
||||
if upclient requests them in encrypted form, then
|
||||
upserver encrypts them). This argument is
|
||||
necessary only if the issuer has previously used
|
||||
-crypt on the command line and wishes to switch
|
||||
back to unencrypted form.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The last parameter (enclosed in quotes) in the following
|
||||
bos create command causes the upserver to distribute
|
||||
/usr/afs/bin in unencrypted form and /usr/afs/etc in
|
||||
encrypted form.
|
||||
|
||||
% bos create fs1.transarc.com upserver simple
|
||||
"/usr/afs/bin/upserver /usr/afs/bin -crypt /usr/afs/etc"
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList to place this
|
||||
command in /usr/afs/local/BosConfig, because that is the
|
||||
privilege required to issue bos create.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
bos create
|
||||
|
||||
upclient
|
@ -1,79 +0,0 @@
|
||||
AFS Commands
|
||||
|
||||
1. The uss Commands and Template Lines
|
||||
|
||||
------------------------------------------------------------
|
||||
|
||||
The uss commands help administrators create user accounts in
|
||||
their system more easily and efficiently. Without them,
|
||||
administering accounts can become time consuming. Creating
|
||||
an account "by hand" requires issuing at least six separate
|
||||
commands to five different AFS servers, whereas a single
|
||||
uss add command can accomplish all the equivalent actions
|
||||
once the issuer sets up the necessary template. Even
|
||||
better, a single issue of the the uss bulk command can
|
||||
create multiple accounts at once, after the necessary
|
||||
preparations have been made.
|
||||
|
||||
Refer to chapter 11 in the Reference Manual for a complete
|
||||
summary list of uss commands and their syntax.
|
||||
|
||||
1.1 Common Arguments and Flags
|
||||
Most uss commands accept the following optional arguments
|
||||
and flags. They are listed in the command descriptions
|
||||
where they apply, and are described here in detail:
|
||||
|
||||
[-cell <cell name>]
|
||||
|
||||
This argument specifies that the command should be run in
|
||||
the cell specified by cell name. By default, commands are
|
||||
executed in the local cell, as defined in
|
||||
/usr/vice/etc/ThisCell on the client machine on which the
|
||||
command is issued. The issuer may abbreviate cell name to
|
||||
the shortest form that distinguishes it from the other cells
|
||||
listed in /usr/vice/etc/CellServDB on the client machine on
|
||||
which the command is issued.
|
||||
|
||||
[-admin <administrator to authenticate>]
|
||||
|
||||
This argument names the user name whom the Authentication
|
||||
Servers should authenticate for purposes of creating an
|
||||
Authentication Database entry. If the issuer does not
|
||||
provide it, the authentication is attempted for the
|
||||
effective user name (the one under which the issuer is
|
||||
logged into the local machine's UNIX file system). With or
|
||||
without this argument, UNIX commands invoked by this command
|
||||
(for instance, /etc/chown) are executed under the effective
|
||||
user name.
|
||||
l
|
||||
AFS Command Reference ManuaThe uss Commands and Template Li
|
||||
|
||||
|
||||
[-dryrun]
|
||||
|
||||
This flag indicates that the command interpreter should not
|
||||
actually execute the command, but should report all the
|
||||
actions it would perform if executing it. This flag is
|
||||
useful for verifying that the account will be configured as
|
||||
the issuer wishes. It does not, however, necessarily reveal
|
||||
failures that will result if the uss command interpreter
|
||||
encounters any circumstances that make it impossible to
|
||||
carry out a requested action. Combining this flag with
|
||||
-verbose yields more information.
|
||||
|
||||
[-help]
|
||||
|
||||
This flag has the same function as the bos help command: it
|
||||
prints the command's online help message on the screen. No
|
||||
other arguments or flags should be provided at the same
|
||||
time. Even if they are, this flag overrides them, and the
|
||||
only effect of issuing the command is that the help message
|
||||
appears.
|
||||
|
||||
|
||||
|
||||
1.1.1 The Privilege Required for uss Commands
|
||||
The issuer of a uss command must have all the rights
|
||||
required for performing the equivalent actions individually.
|
||||
See the PRIVILEGE REQUIRED section of each command
|
||||
description for details.
|
@ -1,286 +0,0 @@
|
||||
uss add AFS Commands uss add
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
uss add -- create user account.
|
||||
|
||||
|
||||
uss add -user <login name> [-realname <full name in
|
||||
quotes>]
|
||||
[-pass <initial passwd>] [-server <file server for home
|
||||
volume>]
|
||||
[-partition <file server's disk partition for home volume>]
|
||||
[-mount <home directory mount point>]
|
||||
[-uid <uid to assign the user>]
|
||||
[-template <pathname of template file>]
|
||||
+
|
||||
[-verbose] [-var <auxiliary argument pairs (num val)> ]
|
||||
[-cell <cell name>] [-admin <administrator to
|
||||
authenticate>]
|
||||
[-dryrun] [-overwrite] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
uss ad -us <login name> [-r <full name in quotes>]
|
||||
[-pas <initial passwd>] [-s <file server for home volume>]
|
||||
[-par <file server's disk partition for home volume>]
|
||||
[-m <home directory mount point>] [-ui <uid to assign the
|
||||
user>]
|
||||
[-t <pathname of template file>] [-ve] [-va <auxiliary
|
||||
+
|
||||
argument pairs (num val)> ]
|
||||
[-c <cell name>] [-a <administrator to authenticate>] [-d]
|
||||
[-o] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates entries in the Protection Database and
|
||||
Authentication Database for the user name login name. If
|
||||
initial passwd is provided, it is stored as the user's
|
||||
password in the Authentication Database after conversion
|
||||
into a form suitable for use as an encryption key. , or the
|
||||
By default, the Protection Server automatically allocates an
|
||||
AFS UID for the new user; the issuer may specify an
|
||||
alternate with the -uid argument.
|
||||
|
||||
The other results of the command depend on what appears in
|
||||
the template file specified with pathname of template file.
|
||||
The issuer must provide any argument whose corresponding
|
||||
variable appears in the template (the ARGUMENTS section
|
||||
below maps the arguments and variables). If the issuer
|
||||
provides an argument for which the corresponding variable
|
||||
does not appear in the template, the value is ignored.
|
||||
Failure to provide a value for a variable causes the account
|
||||
creation to fail at the point where the command interpreter
|
||||
first encounters the variable in the template.
|
||||
|
||||
Syntax definitions for the lines in the template follow
|
||||
descriptions of the uss commands.
|
||||
|
||||
WARNING
|
||||
|
||||
If this command is issued on a machine running Ultrix and
|
||||
the template file being used is not 0-length, the user must
|
||||
|
||||
|
||||
|
||||
use the -admin argument to adopt a privileged AFS identity
|
||||
while remaining "root" in the local machine's UNIX file
|
||||
system. Ultrix allows only "root" to issue the /etc/chown
|
||||
command that uss add invokes to set the owner of files and
|
||||
directories created by template lines. At the same time,
|
||||
AFS allows only a privileged administrator to issue the AFS
|
||||
commands invoked; "root" is not normally a privileged AFS
|
||||
administrator.
|
||||
|
||||
Other operating systems allow users other than "root" to
|
||||
issue /etc/chown, but users may still find it convenient to
|
||||
adopt different identities in the AFS and UNIX file systems.
|
||||
Being authenticated in AFS as a privileged user is required
|
||||
under all operating systems.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-user specifies the user name that the user will type at
|
||||
the login prompt. It also becomes the name of the
|
||||
user's Protection and Authentication Database
|
||||
entries.
|
||||
|
||||
Corresponding variable in template: $USER.
|
||||
|
||||
-realname specifies the user's real name. Surround it with
|
||||
double quotes as delimiters, since it contains
|
||||
spaces and possibly punctuation. If not provided,
|
||||
it defaults to the user name provided with -user.
|
||||
|
||||
Corresponding variable in template: $NAME. The
|
||||
most common use for this variable is when creating
|
||||
a file to be incorporated as an entry in the
|
||||
cell's /etc/passwd file.
|
||||
|
||||
-pass defines the user's initial password. Many UNIX
|
||||
applications and utilities require that this be no
|
||||
longer than eight characters; the AFS commands
|
||||
that handle passwords accept strings of virtually
|
||||
unlimited length. If not provided, this argument
|
||||
defaults to the string changeme.
|
||||
|
||||
Corresponding variable in the template: none.
|
||||
|
||||
-server specifies the file server machine on which the
|
||||
user's volume will reside.
|
||||
|
||||
Corresponding variable in template: $SERVER.
|
||||
|
||||
-partition
|
||||
specifies the partition on file server for home
|
||||
volume on which the user's volume will reside.
|
||||
|
||||
Corresponding variable in template: $PART.
|
||||
|
||||
-mount specifies the pathname to the user's home
|
||||
directory. If the issuer does not provide a full
|
||||
pathname, it is interpreted relative to the
|
||||
working directory.
|
||||
|
||||
Corresponding variable in template: $MTPT, but on
|
||||
the "V" line only. Occurrences of $MTPT on lines
|
||||
|
||||
|
||||
|
||||
following the "V" line take their value from the
|
||||
"V" line's <mount point> field. Thus the exact
|
||||
value of this command line argument becomes the
|
||||
value for post-"V" line occurrences of $MTPT only
|
||||
if $MTPT appears alone in the <mount point> field.
|
||||
|
||||
-uid specifies the AFS UID to be assigned to the new
|
||||
user. It should be a positive integer. The
|
||||
issuer may wish to pre-verify with pts listmax
|
||||
that the intended number is greater than the
|
||||
current largest AFS UID: if the requested AFS UID
|
||||
is already in use, the account creation will
|
||||
terminate with an error. If the issuer does not
|
||||
provide this argument, the Protection Server
|
||||
assigns an AFS UID automatically; as with manual
|
||||
account creation, automatic allocation is
|
||||
preferred.
|
||||
|
||||
Corresponding variable in template: $UID.
|
||||
|
||||
-template specifies which template the command interpreter
|
||||
should consult. If the issuer does not provide
|
||||
this argument, the command interpreter looks for a
|
||||
template called uss.template in the following
|
||||
directories, which it searches in this order:
|
||||
|
||||
1. the working directory
|
||||
|
||||
2. /afs/cellname/common/uss, where
|
||||
cellname names the local cell
|
||||
|
||||
3. /etc
|
||||
|
||||
If the issuer provides a name other than
|
||||
uss.template without a pathname, the command
|
||||
interpreter looks for it in the directories just
|
||||
listed, in the same order. If the issuer provides
|
||||
a full or partial pathname, the command
|
||||
interpreter consults the specified file without
|
||||
consulting the directories just listed; it
|
||||
interprets partial pathnames relative to the
|
||||
working directory.
|
||||
|
||||
If the template is 0-length, the new account will
|
||||
consist solely of Protection and Authentication
|
||||
Database entries.
|
||||
|
||||
-verbose causes the command interpreter to produce a more
|
||||
detailed trace of the actions it is executing. By
|
||||
default, only warnings and error messages appear.
|
||||
|
||||
-var specifies values for each of the number variables
|
||||
$1 through $9 found in the template. The number
|
||||
variables allow the issuer to provide values for
|
||||
variables not built-in to the uss add command.
|
||||
|
||||
Corresponding variables in template: $1 through
|
||||
$9.
|
||||
|
||||
|
||||
|
||||
Each instance of this argument has two parts,
|
||||
separated by a space:
|
||||
|
||||
- an integer between 1 and 9, not preceded
|
||||
by the dollar sign. Each number matches
|
||||
the variable in the template.
|
||||
|
||||
- a value
|
||||
|
||||
See the chapter on uss in the AFS System
|
||||
Administrator's Guide for further explanation.
|
||||
|
||||
-cell specifies the cell in which to run the command.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details. -admin
|
||||
names the user whom the Authentication Servers
|
||||
should authenticate for purposes of creating an
|
||||
Authentication Database entry. See section 7.1 in
|
||||
the Reference Manual for more details. Note:
|
||||
Issuers of this command on machines running Ultrix
|
||||
must use this argument in order to adopt an
|
||||
privileged AFS identity while remaining "root" in
|
||||
the local machine's UNIX file system. See the
|
||||
preceding WARNING.
|
||||
|
||||
-dryrun indicates that the command interpreter should not
|
||||
actually execute the command, but should report
|
||||
all the actions it would perform if executing it.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
-overwrite
|
||||
instructs the command interpreter to overwrite any
|
||||
directories, files and links that exist in the
|
||||
file system and for which it also finds
|
||||
definitions on template "D", "E", "F", "L" and "S"
|
||||
lines. If this flag is omitted, the command
|
||||
interpreter prompts once for confirmation that the
|
||||
issuer really wants to overwrite all such
|
||||
elements.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 7.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
When the template is 0-length, the following creates a
|
||||
"dummy" account called admin with entries in the Protection
|
||||
and Authentication Databases only.
|
||||
|
||||
% uss add admin
|
||||
|
||||
The combination of the following "V" line in the template
|
||||
uss.tpl and uss add command creates Protection and
|
||||
Authentication Database entries for user name smith. It
|
||||
would also create a volume called user.smith with a quota of
|
||||
2500 kilobyte blocks, mounted at
|
||||
/afs/transarc.com/usr/smith, the ACL for which gives smith
|
||||
all rights. See the description of the "V" line for an
|
||||
|
||||
|
||||
|
||||
explanation of its fields. Note that only the template's
|
||||
name is provided, not its pathname, as it is assumed it
|
||||
resides in one of the three expected directories.
|
||||
|
||||
V user.$USER $SERVER.transarc.com /vice$PART $1
|
||||
/afs/transarc.com/usr/$USER $UID $USER all
|
||||
|
||||
% uss add smith "John Smith" js_pswd fs2 b -t uss.tpl -v 1
|
||||
2500
|
||||
|
||||
The chapter on uss in the AFS System Administrator's Guide
|
||||
presents more extended examples of template lines and
|
||||
commands.
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer (or person named with -admin flag) must belong to the
|
||||
system:administrators group in the Protection Database and
|
||||
must have the ADMIN flag in his or her Authentication
|
||||
Database entry. If the template contains a "V" line, the
|
||||
issuer must be listed in /usr/afs/etc/UserList and must have
|
||||
at least ADMINISTER and INSERT rights in the directory where
|
||||
the mount point is to be created. If the template includes
|
||||
lines that create other types of objects (directories, files
|
||||
or links), the issuer must have the privilege(s) necessary
|
||||
to create them.
|
||||
|
||||
Under Ultrix, only "root" can issue the /etc/chown command
|
||||
invoked when a file or directory is created. See the
|
||||
WARNING section.
|
@ -1,59 +0,0 @@
|
||||
uss apropos AFS Commands uss apropos
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
uss apropos -- show each help entry containing keyword.
|
||||
|
||||
|
||||
uss apropos -topic <help string> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
uss ap -t <help string> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line of the help entry for any uss
|
||||
command that has help string in its name or short
|
||||
description.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic specifies the keyword string to search for. If it
|
||||
is more than a single word, surround it with
|
||||
double quotes or other delimiters. Type all help
|
||||
strings for uss commands in all lowercase letters.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 7.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The first line of a command's online help entry names the
|
||||
command and briefly describes what it does. The uss apropos
|
||||
command displays that first line for any uss command where
|
||||
help string is part of the command name or first line.
|
||||
|
||||
To see the remaining lines in a help entry, which provide
|
||||
the command's alias (if any) and syntax, use the uss help
|
||||
command.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following lists all uss commands that have the word
|
||||
"create" in their operation code or short online
|
||||
description.
|
||||
|
||||
% uss apropos create
|
||||
add: create a new user
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
uss help
|
@ -1,325 +0,0 @@
|
||||
uss bulk AFS Commands uss bulk
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
uss bulk -- execute multiple uss commands.
|
||||
|
||||
|
||||
uss bulk -file <bulk input file> [-template <pathname of
|
||||
template file>]
|
||||
[-verbose] [-cell <cell name>]
|
||||
[-admin <administrator to authenticate>] [-dryrun]
|
||||
[-overwrite]
|
||||
[-help]
|
||||
|
||||
uss b -f <bulk input file> [-t <pathname of template
|
||||
file>] [-v] [-c <cell name>]
|
||||
[-a <administrator to authenticate>] [-d] [-o] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Executes the uss commands listed in bulk input file, which
|
||||
must already exist. If bulk input file has add commands in
|
||||
it that create complete (rather than authentication-only)
|
||||
accounts, then the issuer must also specify a template using
|
||||
pathname of template file.
|
||||
|
||||
WARNING
|
||||
|
||||
The following warning applies when all of the following are
|
||||
true:
|
||||
|
||||
- this command is issued on machines running Ultrix
|
||||
|
||||
- the bulk file contains add lines
|
||||
|
||||
- the template file used for the account creations
|
||||
is not 0-length.
|
||||
|
||||
In this set of circumstances, the issuer must use the -admin
|
||||
argument to adopt a privileged AFS identity while remaining
|
||||
"root" in the local machine's UNIX file system. Ultrix
|
||||
allows only "root" to issue the /etc/chown command that the
|
||||
add command invokes to set the owner of files and
|
||||
directories created by template lines. At the same time,
|
||||
AFS allows only a privileged administrator to issue the AFS
|
||||
commands invoked; "root" is not normally a privileged AFS
|
||||
administrator.
|
||||
|
||||
Other operating systems allow users other than "root" to
|
||||
issue /etc/chown, but users may still find it convenient to
|
||||
adopt different identities in the AFS and UNIX file systems.
|
||||
Being authenticated in AFS as a privileged user is required
|
||||
under all operating systems.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-file names the file containing the uss commands to
|
||||
execute. If the issuer does not provide a
|
||||
pathname, the command interpreter assumes the file
|
||||
is in the working directory. The BULK FILE FORMAT
|
||||
section details the proper format for command
|
||||
lines in the bulk file.
|
||||
|
||||
-template names the template file for any add commands that
|
||||
|
||||
|
||||
|
||||
appear in the bulk input file. If the issuer does
|
||||
not provide a pathname, the command interpreter
|
||||
assumes the template file is in the working
|
||||
directory. See the AFS System Administrator's
|
||||
Guide for a definition of template format.
|
||||
|
||||
-verbose causes the command interpreter to produce (on
|
||||
stdout) a more detailed trace of the actions it is
|
||||
executing. By default, only warnings and error
|
||||
messages appear.
|
||||
|
||||
-cell specifies the cell in which to run the command.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details. -admin
|
||||
names the user whom the Authentication Servers
|
||||
should authenticate for purposes of creating an
|
||||
Authentication Database entry. See section 7.1 in
|
||||
the Reference Manual for more details. Note: When
|
||||
the bulk file contains add lines, issuers of the
|
||||
uss bulk command on machines running Ultrix must
|
||||
use this argument in order to adopt an privileged
|
||||
AFS identity while remaining "root" in the local
|
||||
machine's UNIX file system. See the preceding
|
||||
WARNING.
|
||||
|
||||
-dryrun indicates that the command interpreter should not
|
||||
actually execute the command, but should report
|
||||
all the actions it would perform if executing it.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
-overwrite
|
||||
instructs the command interpreter (when add lines
|
||||
appear in the bulk file) to overwrite any
|
||||
directories, files and links that exist in the
|
||||
file system related to the user for which it also
|
||||
finds definitions on template "D", "E", "F", "L"
|
||||
and "S" lines. If this flag is omitted, the
|
||||
command interpreter prompts, once for each add
|
||||
line in the bulk file, for confirmation that the
|
||||
issuer really wants to overwrite those elements.
|
||||
This flag should not be used if the bulk file does
|
||||
not contain add lines.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 7.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
BULK FILE FORMAT
|
||||
|
||||
Five types of command lines can appear in the bulk file:
|
||||
add, delete, exec, savevolume, and delvolume. Each command
|
||||
line should have a carriage return only at the end, even
|
||||
though it may cover several lines on the screen.
|
||||
|
||||
|
||||
|
||||
The add line
|
||||
|
||||
Each add line is the equivalent of a uss add command issued
|
||||
on the command line. Begin the line with "add" only, not
|
||||
"uss add", and provide the arguments in the same order they
|
||||
would appear on the uss add command line, separating each
|
||||
with a colon. Only the first argument, corresponding to the
|
||||
command line argument -user, is required. To omit a value
|
||||
for an argument (presumably because it is optional or the
|
||||
template specifies a constant value for it), type nothing
|
||||
between two colons. After the last argument provided, end
|
||||
the line with either a colon and carriage return, or a
|
||||
carriage return alone.
|
||||
|
||||
The eighth through seventeenth fields are for assigning
|
||||
values to the number variables, with the fields listed in
|
||||
increasing numerical order. The issuer must indicate either
|
||||
a value or an empty field (nothing between two colons) for
|
||||
every variable that precedes the last one being assigned an
|
||||
actual value. It is acceptable, but not necessary, to
|
||||
indicate empty fields for any number variables following the
|
||||
last one actually assigned a value.
|
||||
|
||||
The following concrete representation uses the same
|
||||
identifiers for arguments as the uss add definition. The "{
|
||||
}" notation indicates that each entry between vertical bars
|
||||
is one possible choice. Remember that an instruction like
|
||||
this would appear on a single line in the actual bulk file.
|
||||
|
||||
add <login name>[:<full name>][:<initial passwd>][:<file
|
||||
[:<file server's disk partition for home volume>][:<home
|
||||
[:<uid to assign the user>][:{<var1> | :<var1>:<var2> | :
|
||||
. . . . et cetera through. . . .
|
||||
| :<var1>:<var2>:<var3>:<var4>:<var5>:<var6>:<var7>:<var8
|
||||
|
||||
Do not surround full name with double quotes in the bulk
|
||||
file, even though its counterpart on the regular uss add
|
||||
command line must be so surrounded.
|
||||
|
||||
The EXAMPLES section below may help to clarify the format of
|
||||
the add line.
|
||||
|
||||
The delete line
|
||||
|
||||
Each delete line is the equivalent of a uss delete command
|
||||
issued on the command line. Begin the line with "delete"
|
||||
only, not "uss delete", and provide the arguments in the
|
||||
same order they would appear on the uss delete command line,
|
||||
separating each with a colon. Provide values for at least
|
||||
the first two arguments (corresponding to -user and
|
||||
-mountpoint on the command line). The third field,
|
||||
corresponding to -savevolume, is optional; there are three
|
||||
possible values:
|
||||
|
||||
- if the word savevolume appears, the volume and
|
||||
VLDB entry will not be removed
|
||||
|
||||
- if the word delvolume appears, the volume and VLDB
|
||||
entry will be removed
|
||||
|
||||
- if the field is blank, then the volume will be
|
||||
|
||||
|
||||
|
||||
treated according to the prevailing default (see
|
||||
the following description of the savevolume and
|
||||
delvolume lines to learn how to set the default).
|
||||
|
||||
After the last argument provided, end the line with either a
|
||||
colon and carriage return or a carriage return alone.
|
||||
|
||||
The following concrete representation uses the same
|
||||
identifiers for arguments as does the uss delete definition.
|
||||
The "{ }" notation indicates that each entry between a
|
||||
vertical line is one possible choice. Remember that an
|
||||
instruction like this would appear on a single line in the
|
||||
actual bulk file. The EXAMPLES section illustrates use of
|
||||
this line.
|
||||
|
||||
delete <account name>:<full mount point pathname>
|
||||
[:{savevolume | delvolume | }]
|
||||
|
||||
The exec line
|
||||
|
||||
This line causes the indicated UNIX shell command to be
|
||||
executed. Its format is
|
||||
|
||||
exec <command string to execute>
|
||||
|
||||
The savevolume and delvolume lines
|
||||
|
||||
The savevolume and delvolume lines set the default treatment
|
||||
of volumes in delete lines that follow them in the bulk
|
||||
file. The savevolume line prevents the removal of volume
|
||||
and VLDB entry for all subsequent delete lines. The
|
||||
delvolume line causes the removal of volume and VLDB entry
|
||||
for all subsequent delete lines. The default treatment if
|
||||
neither line appears in a bulk file is to remove the volume
|
||||
and VLDB; delete lines that appear before the first
|
||||
savevolume line are also treated this way.
|
||||
|
||||
An explicit savevolume or delvolume instruction in the third
|
||||
field of an individual delete line overrides the default in
|
||||
effect at the time. If nothing appears in the third field,
|
||||
the default is obeyed.
|
||||
|
||||
Neither command takes arguments (the word savevolume or
|
||||
delvolume should appear by itself on the line). The effect
|
||||
of either line lasts until the end of the bulk file, or
|
||||
until its opposite appears in the file. Multiple instances
|
||||
of each command can be used to toggle back and forth between
|
||||
removal and non-removal of volumes.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following shows the proper format for an add line in the
|
||||
bulk file when only the first (required) argument is
|
||||
provided, and when the first three arguments are provided.
|
||||
In the first case, the user's "real name" is set to anderson
|
||||
and password to changeme (the defaults).
|
||||
|
||||
add anderson
|
||||
add smith:John Smith:js_pswd
|
||||
|
||||
The following add line example supposes that the Transarc
|
||||
|
||||
|
||||
|
||||
Corporation cell uses a template with the following "V" line
|
||||
in it:
|
||||
|
||||
V user.$USER $SERVER.transarc.com /vicep$PART 2000
|
||||
/afs/transarc.com/usr/$3/$USER $UID $USER all
|
||||
|
||||
To create an account for users John Smith from the Marketing
|
||||
Department and Pat Jones from the Finance Department, the
|
||||
appropriate add commands in the bulk file might be:
|
||||
|
||||
add smith:John Smith::fs1:a:::::marketing
|
||||
add jones:Pat Jones::fs3:c:::::finance
|
||||
|
||||
The effect would be to establish an account called smith in
|
||||
the Protection and Authentication Databases, with an initial
|
||||
password changeme and a value for $UID provided by the
|
||||
Protection Server. His volume, user.smith, would reside on
|
||||
partition "/vicepa" of file server machine
|
||||
"fs1.transarc.com" and would be mounted at
|
||||
/afs/transarc.com/usr/marketing/smith. He would own his
|
||||
home directory and have full access to it. The account for
|
||||
jones would be similar, except that it would reside on
|
||||
partition "/vicepc" of file server machine
|
||||
"fs3.transarc.com" and would be mounted at
|
||||
/afs/transarc.com/usr/finance/jones.
|
||||
|
||||
Notice that the fields corresponding to <home directory
|
||||
mount point>, <uid to assign the user>, <var1> and <var2>
|
||||
are empty (between a and marketing on the first example
|
||||
line) since their corresponding variables do not appear in
|
||||
the template file. The <initial passwd> field is also
|
||||
empty.
|
||||
|
||||
The issuer could, if he or she choose, specify values/empty
|
||||
fields for all nine number variables. In this case, the
|
||||
bulk file lines shown above would look like:
|
||||
|
||||
add smith:John Smith::fs1:a:::::marketing::::::
|
||||
add jones:Pat Jones::fs3:c:::::finance::::::
|
||||
|
||||
The following shows a complete bulk file containing a set of
|
||||
delete lines combined with a savevolume line. Because
|
||||
smith, pat, and rogers appear before the savevolume command
|
||||
and their third field is blank, the volume will be removed.
|
||||
The volume for terry will not be removed, but johnson's will
|
||||
be because the delvolume in the third field overrides the
|
||||
current default.
|
||||
|
||||
delete smith:/afs/transarc.com/usr/smith
|
||||
delete pat:/afs/transarc.com/usr/pat
|
||||
delete rogers:/afs/transarc.com/usr/rogers
|
||||
savevolume
|
||||
delete terry:/afs/transarc.com/usr/terry
|
||||
delete johnson:/afs/transarc.com/usr/johnson:delvolu
|
||||
|
||||
The following exec example supposes that the bulk file
|
||||
contains a set of add lines followed by delete lines. The
|
||||
operator places this line between the two sets to flag when
|
||||
the additions are finished and the deletions beginning.
|
||||
|
||||
exec echo "Additions completed; beginning deletions.
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer (or person named by -admin argument) must have the
|
||||
privileges necessary to run all of the commands in the bulk
|
||||
file individually.
|
||||
|
||||
MORE INFORMATION
|
@ -1,116 +0,0 @@
|
||||
Template "D" line AFS Commands Template "D" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "D" line -- create a directory.
|
||||
|
||||
|
||||
D <pathname> <mode> <owner> <access list>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a directory anywhere in the file system. It
|
||||
intended use is to create a subdirectory in the home
|
||||
directory defined on the preceding "V" line.
|
||||
|
||||
The "D" line should appear after the "V" line if any
|
||||
variables in it take their values from the "V" line
|
||||
(notably, $MTPT). Any number of "D" lines may appear in a
|
||||
template.
|
||||
|
||||
WARNING
|
||||
|
||||
Using the "D" line to create directories outside AFS (e.g.,
|
||||
in the UNIX file system of the workstation where the uss
|
||||
command is being issued) introduces two complications:
|
||||
|
||||
- The first complication arises if the issuer wishes
|
||||
to set the <owner> field to something other than
|
||||
his or her own user name or UNIX UID. The default
|
||||
owner of a UNIX file system directory is the user
|
||||
who created it (in this case, the issuer of the
|
||||
uss command). Changing this default, which uss
|
||||
will attempt if anything other than the issuer's
|
||||
name appears in the <owner> field, requires
|
||||
issuing the chown command, which in turn requires
|
||||
being the super-user "root". If the issuer wishes
|
||||
to specify an alternate owner, he or she must be
|
||||
"root" in the UNIX file system and use the -admin
|
||||
flag in order to be recognized in AFS as a
|
||||
privileged administrator. See the description of
|
||||
the -admin argument for uss add and uss bulk.
|
||||
|
||||
- The second complication is that it is not possible
|
||||
to associate an ACL with a non-AFS directory, so
|
||||
uss will always print a warning message about
|
||||
that. It will create the directory nonetheless,
|
||||
and the <access list> field must always be
|
||||
provided.
|
||||
|
||||
The preferred method for automatic placement of directories
|
||||
on the local disk is the package program, which runs as
|
||||
"root".
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
D should be a capital letter and tells the command
|
||||
interpreter that this is a directory-creation
|
||||
instruction.
|
||||
|
||||
pathname is the full pathname of the directory.
|
||||
|
||||
mode sets the UNIX mode bits for the directory.
|
||||
Provide a four-digit decimal number in this field,
|
||||
|
||||
|
||||
|
||||
such as 0755 or 0744. Keep in mind that the
|
||||
"user" x bit must be turned on for a directory.
|
||||
|
||||
owner names the directory's owner (in the UNIX file
|
||||
system sense). If the directory is being placed
|
||||
in AFS, the $UID variable should appear in this
|
||||
field. If the directory is being placed into the
|
||||
UNIX file system rather than AFS, this field must
|
||||
contain the user name or UNIX UID of the uss
|
||||
command's issuer, or the account creation will
|
||||
abort at that point.
|
||||
|
||||
access list
|
||||
defines the access control list for the new home
|
||||
directory. It must be included for non-AFS
|
||||
directories, even though it is ignored in that
|
||||
case. The list may define one or more pairs, each
|
||||
consisting of
|
||||
|
||||
- a user name or Protection Database group
|
||||
name
|
||||
|
||||
- the access rights
|
||||
|
||||
separated by a space. See the fs setacl command
|
||||
to learn about the access rights available with
|
||||
AFS.
|
||||
|
||||
At the least, the new user needs to be given all
|
||||
access rights. This could be achieved with
|
||||
|
||||
$USER all
|
||||
|
||||
Unlike the "V" line, there are no default pairs on
|
||||
the ACL of a directory created with a "D" line.
|
||||
However, as with the "V" line it is not possible
|
||||
to grant any rights to the issuer of the uss
|
||||
command. As the last step in account creation,
|
||||
the uss command interpreter automatically deletes
|
||||
that person from any access control lists set
|
||||
during the creation process.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following creates a public directory in the user's home
|
||||
directory, makes the user own the directory and gives
|
||||
him/her all access rights.
|
||||
|
||||
D $MTPT/public 0755 $UID $USER all
|
@ -1,98 +0,0 @@
|
||||
uss delete AFS Commands uss delete
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
uss delete -- delete user account from system.
|
||||
|
||||
|
||||
uss delete -user <login name>
|
||||
-mountpoint <mount point for user's volume> [-savevolume]
|
||||
[-verbose] [-cell <cell name>]
|
||||
[-admin <administrator to authenticate>] [-dryrun] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
uss d -u <login name> -m <mount point for user's volume>
|
||||
[-s] [-v] [-c <cell name>]
|
||||
[-a <administrator to authenticate>] [-d] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Deletes an AFS user account from the system by deleting the
|
||||
user's
|
||||
|
||||
- Protection Database entry
|
||||
|
||||
- Authentication Database entry
|
||||
|
||||
- volume and VLDB entry, unless the issuer includes
|
||||
the -savevolume flag to prevent the deletion. If
|
||||
the volume is to be deleted, the issuer may first
|
||||
wish to transfer its contents to tape for possible
|
||||
restoration.
|
||||
|
||||
- the home directory mount point from the file tree.
|
||||
This happens even if the -savevolume flag is
|
||||
provided.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-user specifies the user name to remove from the
|
||||
Protection and Authentication Databases.
|
||||
|
||||
-mountpoint
|
||||
specifies the pathname to the user's home
|
||||
directory. The volume mounted at that location is
|
||||
deleted from the system. If the issuer does not
|
||||
provide a full pathname, it is interpreted
|
||||
relative to the working directory.
|
||||
|
||||
-savevolume
|
||||
prevents the user's volume and VLDB entry from
|
||||
being deleted from the system.
|
||||
|
||||
-verbose causes the command interpreter to produce on
|
||||
standard output (stdout) a more detailed trace of
|
||||
the actions it is executing. By default, only
|
||||
warnings and error messages appear.
|
||||
|
||||
-cell specifies the cell in which to run the command.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details. -admin
|
||||
names the user whom the Authentication Servers
|
||||
should authenticate for purposes of creating an
|
||||
|
||||
|
||||
|
||||
Authentication Database entry. See section 7.1 in
|
||||
the Reference Manual for more details. -dryrun
|
||||
indicates that the command interpreter should not
|
||||
actually execute the command, but should report
|
||||
all the actions it would perform if executing it.
|
||||
See section 7.1 in the Reference Manual for more
|
||||
details.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 7.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following removes smith's user account from the
|
||||
transarc.com cell, but prevents deletion of the user.smith
|
||||
volume.
|
||||
|
||||
% uss del smith /afs/transarc.com/usr/smith -save
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer (or person named by -admin argument) must belong to
|
||||
the system:administrators group in the Protection Database,
|
||||
must have the ADMIN flag in his or her Authentication
|
||||
Database entry, and must have at least ADMINISTER and DELETE
|
||||
rights in the directory from which the mount point is to be
|
||||
removed. To remove volumes (i.e., if the -savevolume flag
|
||||
is not used), the issuer must be listed in
|
||||
/usr/afs/etc/UserList.
|
@ -1,88 +0,0 @@
|
||||
Template "E" line AFS Commands Template "E" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "E" line -- create a single-line file.
|
||||
|
||||
|
||||
E <pathname> <mode> <owner> "<contents>"
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a file anywhere in the file system by echoing what
|
||||
appears in the <contents> field into the new file. Its
|
||||
intended use is the creation of files in the new user home
|
||||
directory or its subdirectories.
|
||||
|
||||
The "E" line's advantage over the "F" line is that variables
|
||||
may appear in the <contents> field. The command interpreter
|
||||
replaces the variables with appropriate values before
|
||||
creating the file. (In contrast, the contents of a file
|
||||
created using the "F" line are the same for everyone.)
|
||||
However, the "E" line restricts the contents of the new file
|
||||
to a single line, since no carriage returns (newline
|
||||
characters) can occur in the <contents> field.
|
||||
|
||||
An "E" line should appear in the template after the "D" line
|
||||
that creates the directory the file is to reside in. Any
|
||||
number of "E" lines may appear in a template.
|
||||
|
||||
WARNING
|
||||
|
||||
Using the "E" line to create a file outside AFS (e.g., in
|
||||
the UNIX file system of the client machine where the uss
|
||||
command is being issued) introduces a potential complication
|
||||
if the issuer wishes to set the <owner> field to something
|
||||
other than his or her own user name or UNIX UID. The
|
||||
default owner of a UNIX file system directory is the user
|
||||
who created it (in this case, the issuer of the uss
|
||||
command). Changing this default, which uss will attempt if
|
||||
anything other than the issuer's name appears in the <owner>
|
||||
field, requires issuing the chown command, which in turn
|
||||
requires being the super-user "root". If the issuer wishes
|
||||
to specify an alternate owner, he or she must be "root" in
|
||||
the UNIX file system and use the -admin flag in order to be
|
||||
recognized in AFS as a privileged administrator. See the
|
||||
description of the -admin argument for uss add and uss bulk.
|
||||
|
||||
The preferred method for automatic placement of files on the
|
||||
local disk is the package program, which runs as "root".
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
E should be a capital letter and tells the command
|
||||
interpreter that this is a file-creation
|
||||
instruction.
|
||||
|
||||
pathname is the full pathname of the file to be created.
|
||||
|
||||
mode sets the UNIX mode bits for the file. Provide a
|
||||
four-digit decimal number in this field, such as
|
||||
0666 or 0644.
|
||||
|
||||
owner names the file's owner (in the UNIX file system
|
||||
|
||||
|
||||
|
||||
sense). If the file is being placed in AFS, the
|
||||
$UID variable should appear in this field. If the
|
||||
file is being placed into the UNIX file system
|
||||
rather than AFS, this field must contain the user
|
||||
name or UNIX UID of the uss command's issuer, or
|
||||
the account creation will abort at that point.
|
||||
|
||||
contents defines the one-line string that is to become the
|
||||
contents of the new file. Surround it with double
|
||||
quotes in case it contains spaces. It may contain
|
||||
variables, which the command interpreter will
|
||||
resolve before creating the file, but may not
|
||||
contain carriage returns (newline characters).
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following creates an file in the current working
|
||||
directory called user_name.etcp containing an entry suitable
|
||||
for incorporating into the cell's global /etc/passwd file.
|
||||
|
||||
E $USER.etcp 0644 root "$USER:X:$UID:10:$NAME:$MTP
|
@ -1,82 +0,0 @@
|
||||
Template "F" line AFS Commands Template "F" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "F" line -- create a file by copying a prototype.
|
||||
|
||||
|
||||
F <pathname> <mode> <owner> <prototype>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a file anywhere in the file system by copying the
|
||||
contents of an existing "prototype" file into the new file.
|
||||
Its intended use is creation of standard files in the new
|
||||
user's home directory or a subdirectory of it. Include one
|
||||
"F" line for each file to be created.
|
||||
|
||||
"F" lines should appear in the template after the "D" lines
|
||||
that define the subdirectories they go in. Any number of
|
||||
"F" lines may appear in a template.
|
||||
|
||||
WARNING
|
||||
|
||||
Using the "F" line to create a file outside AFS (e.g., in
|
||||
the UNIX file system of the client machine where the uss
|
||||
command is being issued) introduces a potential complication
|
||||
if the issuer wishes to set the <owner> field to something
|
||||
other than his or her own user name or UNIX UID. The
|
||||
default owner of a UNIX file system directory is the user
|
||||
who created it (in this case, the issuer of the uss
|
||||
command). Changing this default, which uss will attempt if
|
||||
anything other than the issuer's name appears in the <owner>
|
||||
field, requires issuing the chown command, which in turn
|
||||
requires being the super-user "root". If the issuer wishes
|
||||
to specify an alternate owner, he or she must be "root" in
|
||||
the UNIX file system and use the -admin flag in order to be
|
||||
recognized in AFS as a privileged administrator. See the
|
||||
description of the -admin argument for uss add and uss bulk.
|
||||
|
||||
The preferred method for automatic placement of files on the
|
||||
local disk is the package program, which runs as "root".
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
F should be a capital letter and tells the command
|
||||
interpreter that this is a file-creation
|
||||
instruction.
|
||||
|
||||
pathname is the full pathname of the file to be created.
|
||||
|
||||
mode sets the UNIX mode bits for the file. Provide a
|
||||
four-digit decimal number in this field, such as
|
||||
0666 or 0644.
|
||||
|
||||
owner names the file's owner (in the UNIX file system
|
||||
sense). If the directory is being placed in AFS,
|
||||
the $UID variable should appear in this field. If
|
||||
the directory is being placed into the UNIX file
|
||||
system rather than AFS, this field must contain
|
||||
the user name or UNIX UID of the uss command's
|
||||
issuer, or the account creation will abort at that
|
||||
point.
|
||||
|
||||
prototype specifies the complete pathname of the file whose
|
||||
|
||||
|
||||
|
||||
contents are to be copied into the new file. It
|
||||
may reside in either AFS or the local UNIX file
|
||||
system.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate for the Transarc Corporation
|
||||
cell, copies a standard .login file (kept in
|
||||
/afs/transarc.com/common/uss/skel) into user home
|
||||
directories. This would appear on a single line in the
|
||||
actual template.
|
||||
|
||||
F $MTPT/.login 0644 $UID
|
||||
/afs/transarc.com/common/uss/skel/.login
|
@ -1,78 +0,0 @@
|
||||
Template "G" line AFS Commands Template "G" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "G" line -- define directory for even distribution
|
||||
|
||||
of home directories.
|
||||
|
||||
|
||||
G <directory>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Defines a directory to be considered as a value for the
|
||||
$AUTO variable. Define a separate "G" line for each
|
||||
directory to be considered. All "G" lines, and there may be
|
||||
any number, must appear in the template before any
|
||||
occurrences of the $AUTO variable.
|
||||
|
||||
The intended use of the "G" line is to distribute user
|
||||
accounts randomly among several directories, rather than
|
||||
using divisions that reflect real-world divisions (such as
|
||||
departmental affiliation).
|
||||
|
||||
Creating multiple "usr" directories in this fashion (perhaps
|
||||
numbered as usr1, usr2 and so on) is useful mostly in a very
|
||||
large cell where having all user home directories together
|
||||
in one usr directory could cause slow lookup. In such a
|
||||
case, the $AUTO variable goes in the <mount point> field in
|
||||
the "V" line. The command interpreter then selects from
|
||||
among the directories defined on "G" lines the one with the
|
||||
fewest entries. See the chapter on uss in the AFS System
|
||||
Administrator's Guide for more information.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
G should be a capital letter and tells the
|
||||
command interpreter that this line defines a
|
||||
directory to be considered as a value for
|
||||
the $AUTO variable.
|
||||
|
||||
directory defines a pathname. It may be either a
|
||||
complete pathname or only the final element
|
||||
(the directory itself). The choice affects
|
||||
the form of the "V" line <mount-point>
|
||||
field's value, as shown in the EXAMPLES
|
||||
section.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
If the Transarc Corporation cell's administrators decided to
|
||||
distribute user home directories evenly into three
|
||||
directories, they would define three "G" lines:
|
||||
|
||||
G usr1
|
||||
G usr2
|
||||
G usr3
|
||||
|
||||
and then put
|
||||
|
||||
/afs/transarc.com/$AUTO/$USER
|
||||
|
||||
in the "V" line <mount-point> field.
|
||||
|
||||
|
||||
|
||||
Alternatively, they could put the entire pathname for the
|
||||
usr directories on the "G" line:
|
||||
|
||||
G /afs/transarc.com/usr1
|
||||
G /afs/transarc.com/usr2
|
||||
G /afs/transarc.com/usr3
|
||||
|
||||
in which case the "V" line <mount-point> field would specify
|
||||
simply
|
||||
|
||||
$AUTO/$USER
|
@ -1,77 +0,0 @@
|
||||
uss help AFS Commands uss help
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
uss help -- show syntax of specified uss command(s) or list
|
||||
|
||||
functional description for all of them.
|
||||
|
||||
|
||||
+
|
||||
uss help [-topic <help string> ] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
+
|
||||
uss h [-t <help string> ] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line (name and short description) of
|
||||
every uss command's help entry, if no help string is
|
||||
provided. For each operation code specified with -topic, it
|
||||
outputs the entire help entry. See the Output section
|
||||
below.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic specifies the operation code(s) for which syntax
|
||||
is to be provided. If it is omitted, the output
|
||||
instead provides a short description of all uss
|
||||
commands.
|
||||
|
||||
-help prints the online help for this command. Do not
|
||||
provide any other arguments or flags with this
|
||||
one. See section 7.1 in the Reference Manual for
|
||||
more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The online help entry for each uss command consists of two
|
||||
or three lines.
|
||||
|
||||
- The first line names the command and briefly
|
||||
describes what it does.
|
||||
|
||||
- If the command has aliases, they will appear on
|
||||
the next line.
|
||||
|
||||
- The final line, which begins with "Usage:", lists
|
||||
the command's arguments and flags in the
|
||||
prescribed order. Online help entries use the
|
||||
same symbols (brackets, etc.) as the command
|
||||
definitions in this manual. For an explanation of
|
||||
their meaning, see page v of the introductory
|
||||
About This Manual chapter.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following displays the online help entry for the
|
||||
uss bulk command.
|
||||
|
||||
% uss help bulk
|
||||
uss bulk: bulk input mode
|
||||
Usage: uss bulk -file <bulk input file> [-template <path
|
||||
of template file>] [-verbose] [-cell <cell name>] [-dryr
|
||||
[-help]
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
uss apropos
|
@ -1,50 +0,0 @@
|
||||
Template "L" line AFS Commands Template "L" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "L" line -- create hard link.
|
||||
|
||||
|
||||
L <existing-file> <link>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a "hard link" between two files, as achieved by the
|
||||
standard Unix ln command. An explanation of links is beyond
|
||||
the scope of this document, but the basic effect is to
|
||||
create a second name for an existing file, so that it can be
|
||||
accessed via either name. It does not create a second copy
|
||||
of the file.
|
||||
|
||||
AFS allows hard links only between files that reside in the
|
||||
same directory. This restriction is necessary to eliminate
|
||||
the confusion that would result from associating two
|
||||
potentially different ACLs (those of the two directories)
|
||||
with the same file. However, symbolic links are legal
|
||||
between two files that reside in different directories and
|
||||
even volumes (see the section on the template "S" line).
|
||||
|
||||
"L" lines should appear in the template after "D" lines;
|
||||
they should also appear after "F" and "E" lines if either of
|
||||
the files being linked were created on such a line. Any
|
||||
number of "L" lines may appear in a template.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
L should be a capital letter and tells the
|
||||
command interpreter that this instruction
|
||||
creates a hard link.
|
||||
|
||||
existing-file is the complete pathname of the existing
|
||||
file.
|
||||
|
||||
link is the complete pathname of the second name
|
||||
for the file.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following links the file mail to the file mbox in the
|
||||
home directory.
|
||||
|
||||
L $MTPT/mbox $MTPT/mail
|
@ -1,46 +0,0 @@
|
||||
Template "S" line AFS Commands Template "S" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "S" line -- create symbolic link.
|
||||
|
||||
|
||||
S <existing-file> <link>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a "symbolic link" between two files, as achieved by
|
||||
the standard Unix ln -s command. An explanation of links is
|
||||
beyond the scope of this document, but the basic effect is
|
||||
to create a second name for an existing file, so that it can
|
||||
be accessed via either name. It does not create a second
|
||||
copy of the file.
|
||||
|
||||
AFS allows symbolic links to cross mount points (that is,
|
||||
the linked files may reside in different volumes).
|
||||
|
||||
"S" lines should appear in the template after "D" lines;
|
||||
they should also appear after "F" and "E" lines if either of
|
||||
the files being linked were created on such a line. Any
|
||||
number of "S" lines may appear in a template.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
S should be a capital letter and tells the
|
||||
command interpreter that this instruction
|
||||
creates a symbolic link.
|
||||
|
||||
existing-file is the complete pathname of the existing
|
||||
file.
|
||||
|
||||
link is the complete pathname of the second name
|
||||
for the file.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate for the Transarc Corporation
|
||||
cell, links the file outgoing in the Mail subdirectory to
|
||||
the file /afs/transarc.com/common/mail/outgoing.
|
||||
|
||||
S /afs/transarc.com/common/mail/outgoing $MTPT/Mail/o
|
@ -1,145 +0,0 @@
|
||||
Template "V" line AFS Commands Template "V" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "V" line -- create a volume.
|
||||
|
||||
|
||||
V <volume name> <server> <partition> <quota> <mount point>
|
||||
<owner>
|
||||
<access list>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Has several effects:
|
||||
|
||||
- creates a volume
|
||||
|
||||
- creates a VLDB entry for the volume
|
||||
|
||||
- mounts the volume in the file system at the
|
||||
indicated place in the file tree, effectively
|
||||
creating the user's home directory
|
||||
|
||||
- sets the owner of the home directory
|
||||
|
||||
- sets the home directory's access control list
|
||||
|
||||
A template file may contain only one "V" line, and must
|
||||
contain one unless the file is 0-length. No other lines are
|
||||
necessary. (This does not imply that the "V" line must be
|
||||
the first line in the template when there are others. If
|
||||
the $AUTO variable appears on the "V" line, then the "G"
|
||||
lines that provide values for it must appear above the "V"
|
||||
line.)
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
V should be a capital letter and tells the command
|
||||
interpreter that this is a volume-creation
|
||||
instruction.
|
||||
|
||||
volume name
|
||||
is the volume's name, under which it will be
|
||||
listed in the VLDB.
|
||||
|
||||
By convention, AFS user volume names have a user.
|
||||
prefix followed by the user name. This is achieved
|
||||
by specifying
|
||||
|
||||
user.$USER
|
||||
|
||||
in this field.
|
||||
|
||||
server is the file server machine that will house the
|
||||
volume. It is safest to provide a complete
|
||||
Internet-style host name in this field. The
|
||||
interpretation of a shortened form depends on the
|
||||
state of the cell's name server when the uss add
|
||||
command is executed.
|
||||
|
||||
|
||||
|
||||
partition defines which partition on server will house the
|
||||
volume.
|
||||
|
||||
Acceptable variants of the standard /vicepx-style
|
||||
name are:
|
||||
|
||||
/vicepa = vicepa = a =
|
||||
|
||||
/vicepb = vicepb = b =
|
||||
|
||||
and so on up to
|
||||
|
||||
/vicepz = vicepz = z =
|
||||
|
||||
quota defines the maximum amount of disk space the
|
||||
volume will be able to take up. Specify a number
|
||||
of kilobyte blocks (so a value of 1024 means a
|
||||
megabyte).
|
||||
|
||||
mount point
|
||||
defines the directory to be created as a mount
|
||||
point for the volume. The specified directory
|
||||
serves as the root directory for the volume named
|
||||
in the <volume name> field.
|
||||
|
||||
By convention, AFS cells call home directories by
|
||||
the user's user name, so the $USER variable may be
|
||||
part of this field.
|
||||
|
||||
Note: This field defines the value of any
|
||||
occurrences of the $MTPT variable on subsequent
|
||||
lines in the template.
|
||||
|
||||
owner names the owner (in the UNIX file system sense) of
|
||||
the home directory named in the <mount point>
|
||||
field. This field should contain the $UID
|
||||
variable.
|
||||
|
||||
access list
|
||||
defines the access control list for the new home
|
||||
directory. The list may define one or more pairs,
|
||||
each consisting of
|
||||
|
||||
- a user name or Protection Database group
|
||||
name
|
||||
|
||||
- the access rights
|
||||
|
||||
separated by a space. See the fs setacl command
|
||||
to learn about the access rights available with
|
||||
AFS.
|
||||
|
||||
At the least, the new user needs to be given all
|
||||
access rights. This could be achieved with
|
||||
|
||||
$USER all
|
||||
|
||||
The pairs specified are added to a default pair
|
||||
that grants system:anyuser the READ and LOOKUP
|
||||
rights. Do not attempt to grant any rights to the
|
||||
issuer of the uss command. As the last step in
|
||||
|
||||
|
||||
|
||||
account creation, the uss command interpreter
|
||||
automatically deletes that person from any access
|
||||
control lists set during the creation process.
|
||||
|
||||
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate for the Transarc Corporation
|
||||
cell, creates a volume called user.user name on the /vicepa
|
||||
partition of the specified file server machine, assigning it
|
||||
a quota of 3000 kilobyte blocks. The volume is mounted in
|
||||
/afs/transarc.com/usr as the value of $USER. The user owns
|
||||
the home directory and has all access rights to it. This
|
||||
line would appear on a single line in the actual template.
|
||||
|
||||
V user.$USER $SERVER.transarc.com /vicepa 3000
|
||||
/afs/transarc.com/usr/$USER $UID $USER all
|
@ -1,44 +0,0 @@
|
||||
Template "X" line AFS Commands Template "X" line
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
Template "X" line -- execute command.
|
||||
|
||||
|
||||
X <command>
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Executes the indicated command, which may be a standard UNIX
|
||||
or AFS command. The command may include any standard
|
||||
template variables, which the uss command interpreter will
|
||||
resolve before passing the command on to the appropriate
|
||||
other command interpreter.
|
||||
|
||||
"X" lines should appear in the template after the definition
|
||||
of any elements they affect or variables they refer to. Any
|
||||
number of "X" lines may appear in a template. Each line
|
||||
must be a single line only (cannot contain carriage returns
|
||||
or new line characters within the <command> field).
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
X should be a capital letter and tells the
|
||||
command interpreter that this instruction
|
||||
executes a command.
|
||||
|
||||
command is the command to be executed. Surround it
|
||||
with double quotes in case it contains
|
||||
spaces. It may contain variables, which the
|
||||
command interpreter will resolve before
|
||||
executing the command, but may not contain
|
||||
carriage returns (newline characters).
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate for the Transarc Corporation
|
||||
cell, mounts the Backup version of the user's volume at the
|
||||
OldFiles subdirectory.
|
||||
|
||||
X "fs mkm /afs/transarc.com/usr/$USER/OldFiles user.$
|
@ -1,264 +0,0 @@
|
||||
vldb_convert AFS Commands vldb_convert
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vldb_convert -- convert Volume Location Database from AFS
|
||||
|
||||
3.1 to AFS 3.2.
|
||||
|
||||
|
||||
vldb_convert [initcmd] [-to <goal version>] [-from
|
||||
<current version>]
|
||||
[-path <pathname>] [-showversion] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS
|
||||
|
||||
The name of this command must be typed in full. However,
|
||||
its switches can be omitted (if appropriate) or abbreviated
|
||||
as follows:
|
||||
|
||||
vldb_convert [-t <goal version>] [-f <current version>]
|
||||
[-p <pathname>] [-s] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Converts a Volume Location Database (VLDB) from AFS 3.1
|
||||
format to AFS 3.2 format. Due to a limitation in the VLDB
|
||||
in prior versions of AFS, a cell could have no more than 31
|
||||
file server machines. With the AFS 3.2 version of the VLDB,
|
||||
a cell can have as many as 255 file server machines.
|
||||
|
||||
The vldb_convert command converts an existing AFS 3.1 VLDB
|
||||
for use as an AFS 3.2 VLDB. It reads the
|
||||
/usr/afs/db/vldb.DB0 database file for the old VLDB and
|
||||
writes a new, converted version of the database into a
|
||||
temporary file in the /usr/afs/db directory. If successful,
|
||||
it then removes the old vldb.DB0 file from the directory and
|
||||
replaces it with the new version from the temporary file.
|
||||
After the conversion, the database functions as it did
|
||||
before, with the exception that it can accommodate the
|
||||
entries for the additional file server machines. The binary
|
||||
file for the vldb_convert command resides in /usr/afsws/etc.
|
||||
|
||||
The command requires the file system in which the VLDB
|
||||
resides to have free space at least equivalent to the size
|
||||
of the old VLDB plus 9 kilobytes. Because the command
|
||||
removes the old VLDB and replaces it with the new version of
|
||||
the database, the additional space is required only while
|
||||
the command executes. (The new version of the database
|
||||
requires a small amount of additional space, but the
|
||||
difference is inconsequential.)
|
||||
|
||||
Begin the conversion of the VLDB by shutting down the Volume
|
||||
Location (VL) Servers on all three database server machines.
|
||||
(The instructions assume the cell has three database server
|
||||
machines; adjust the steps accordingly if it has fewer.)
|
||||
This causes a service outage in the cell, but the outage for
|
||||
the entire conversion procedure should last no more than 15
|
||||
to 20 minutes.
|
||||
|
||||
Replace the AFS 3.1 version of the /usr/afs/bin/vlserver
|
||||
file on all three database server machines with the AFS 3.2
|
||||
version of the file. The new VL Server understands the
|
||||
format of the new version of the VLDB. The old version of
|
||||
|
||||
|
||||
|
||||
the VL Server cannot be run with the new version of the
|
||||
VLDB, and vice versa. Make sure you replace the vlserver
|
||||
binary files on each binary distribution machine; otherwise,
|
||||
the Update Servers overwrite the version stored on the
|
||||
database server machines by automatically propagating the
|
||||
old version of the binary file to the machines.
|
||||
|
||||
Determine which database server machine has the lowest IP
|
||||
address; Ubik will use this machine as the synchronization
|
||||
site when the VL Servers are restarted. Remove the VLDB
|
||||
from the other two database server machines by deleting the
|
||||
/usr/afs/db/vldb.DB0 database and /usr/afs/db/vldb.DBSYS1
|
||||
log files from the other machines. Remove only the
|
||||
/usr/afs/db/vldb.DBSYS1 log file from the database server
|
||||
machine with the lowest IP address. Do not remove the
|
||||
/usr/afs/db/vldb.DB0 database file from the machine with the
|
||||
lowest IP address.
|
||||
|
||||
Copy the /usr/afs/db/vldb.DB0 file on the database server
|
||||
machine with the lowest IP address to a different directory.
|
||||
Then execute the vldb_convert command on that machine. The
|
||||
command takes no more than a few minutes to complete.
|
||||
However, it displays no messages while it executes.
|
||||
|
||||
When the command is finished, restart the VL Server on the
|
||||
machine with the lowest IP address. Then restart the VL
|
||||
Servers on the remaining two database server machines. Ubik
|
||||
elects the database server machine with the lowest IP
|
||||
address as the synchronization site and distributes the copy
|
||||
of the new VLDB from that machine to the other two database
|
||||
server machines. The VLDB is then available.
|
||||
|
||||
The vldb_convert command can be also used to convert the
|
||||
VLDB from AFS 3.2 format back to AFS 3.1 format. The
|
||||
command's -to and -from switches are used to specify the
|
||||
direction of the conversion. The -to switch specifies the
|
||||
version to which the database is to be converted; the -from
|
||||
switch indicates the version from which the database is to
|
||||
be converted.
|
||||
|
||||
Both switches accept a 1, to indicate 3.1, or a 2, to
|
||||
indicate 3.2. When converting from 3.1 to 3.2, specify -to
|
||||
as 2 and -from as 1. Should the need to revert to 3.1
|
||||
arise, specify -to as 1 and -from as 2. When converting
|
||||
from 3.1 to 3.2, you can omit both options; the command
|
||||
automatically converts the database to the next higher
|
||||
version.
|
||||
|
||||
Finally, the command can be used to display the version of
|
||||
the current VLDB. The -showversion flag directs the command
|
||||
to display the version number (3.1 or 3.2) of the VLDB at
|
||||
the time the command is issued. Do not specify the -to or
|
||||
-from switch if the -showversion flag is used.
|
||||
|
||||
|
||||
|
||||
NOTE
|
||||
|
||||
The vldb_convert command is also useful as a means of
|
||||
removing from the VLDB entries for server machines that
|
||||
house no volumes. When a file server machine name or its IP
|
||||
address is changed, the VLDB still contains an entry for the
|
||||
previous name or address. This becomes a problem only when
|
||||
the administrators in a large cell must change the names or
|
||||
IP addresses of a significant number of machines, in which
|
||||
case it is conceivable (though highly unlikely) that all 255
|
||||
possible file server machine entries will be taken.
|
||||
|
||||
If this problem occurs in a cell, the administrators can
|
||||
execute vldb_convert with a value of 2 for both its -to and
|
||||
-from switches. The command removes the entries for all
|
||||
unreferenced servers from the VLDB. The steps described
|
||||
previously for executing the command (shutting down the
|
||||
servers, removing the copies of the VLDB) must be executed
|
||||
as they are for initially upgrading the database.
|
||||
|
||||
WARNING
|
||||
|
||||
Copy the /usr/afs/db/vldb.DB0 file to a different directory
|
||||
after the VL Servers are shut down but before the
|
||||
vldb_convert command is run. The command should perform the
|
||||
conversion without problems. Also, it does not remove the
|
||||
old database file until it has successfully completed the
|
||||
conversion. However, if anything happens to disrupt the
|
||||
conversion or if the operation fails for any reason, copying
|
||||
the database beforehand allows the VLDB to be restored from
|
||||
the copy.
|
||||
|
||||
Leave no VL Servers running while the conversion is in
|
||||
progress. If a number of VL Servers sufficient for Ubik to
|
||||
attain a quorum are available while the conversion is in
|
||||
progress, changes made while the conversion is underway are
|
||||
lost when the new version of the VLDB is distributed.
|
||||
|
||||
Ensure that all VL Servers are referencing the same version
|
||||
of the VLDB at all times. The 3.1 version of the VL Server
|
||||
can reference only the 3.1 version of the VLDB, and the 3.2
|
||||
version of the VL Server can use only the 3.2 version of the
|
||||
VLDB. The 3.1 version of the VL Server is not compatible
|
||||
with the 3.2 version of the VLDB, and vice versa. For this
|
||||
reason, the vldb_convert command must be used to convert the
|
||||
existing VLDB to the new format before the new version of
|
||||
the VL Server distributed from the cell's binary
|
||||
distribution machines via the Update Server can be used.
|
||||
|
||||
Specify only valid, correct values for the -to and -from
|
||||
switches. Specifying invalid or incorrect values for these
|
||||
switches can result in damage to the VLDB. This is another
|
||||
reason to copy the vldb.DB0 database file to a different
|
||||
directory before using the vldb_convert command.
|
||||
|
||||
Finally, the entire procedure takes no more than a few
|
||||
minutes to complete. However, because volumes are
|
||||
inaccessible while the procedure is underway, it is best to
|
||||
perform the operation over a weekend or overnight to disrupt
|
||||
the fewest users.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
initcmd is an optional string that accommodates the
|
||||
command's use of the AFS command parser. It
|
||||
can be omitted and ignored.
|
||||
|
||||
-to indicates the version of the VLDB to which
|
||||
the current version of the database is to be
|
||||
converted. Valid values are 1, indicating
|
||||
that the existing version of the database is
|
||||
to be converted to AFS 3.1 format, or 2,
|
||||
indicating that the existing version of the
|
||||
database is to be converted to AFS 3.2
|
||||
format. See the DESCRIPTION section for
|
||||
information about the possible combinations
|
||||
of the -to and -from switches and the
|
||||
effects of omitting the switches.
|
||||
|
||||
-from indicates the version of the current VLDB.
|
||||
Valid values are 1, indicating that the
|
||||
existing version of the database is in AFS
|
||||
3.1 format, or 2, indicating that the
|
||||
existing version of the database is in AFS
|
||||
3.2 format. See the DESCRIPTION section for
|
||||
information about the possible combinations
|
||||
of the -to and -from switches and the
|
||||
effects of omitting the switches.
|
||||
|
||||
-path provides the complete pathname of the
|
||||
vldb.DB0 database file if the file is kept
|
||||
in an alternate directory (or has a
|
||||
different name). Always include the name of
|
||||
the file, even if it is vldb.DB0. By
|
||||
default, the command converts the vldb.DB0
|
||||
database file in the /usr/afs/db directory.
|
||||
Use this switch only if the database is
|
||||
stored in a different directory (or has a
|
||||
different name).
|
||||
|
||||
-showversion displays the version (3.1 or 3.2) of the
|
||||
current VLDB. Include the -path switch if
|
||||
the VLDB is stored in a directory other than
|
||||
/usr/afs/db. If you use this flag, the -to
|
||||
and -from switches are ignored.
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, issued on the database server machine with
|
||||
the lowest IP address, executes the vldb_convert command to
|
||||
convert the VLDB from AFS 3.1 format to AFS 3.2 format:
|
||||
|
||||
% vldb_convert
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
The issuer must be able to read, delete, and write to the
|
||||
/usr/afs/db/vldb.DB0 and /usr/afs/db/vldb.DBSYS1 files on
|
||||
|
||||
|
||||
|
||||
all database server machines. The issuer must also be able
|
||||
to insert, write to, and delete files in the /usr/afs/db
|
||||
directories on the machines.
|
||||
|
||||
In addition, to install the new version of the VL Server,
|
||||
the issuer must be able to delete the /usr/afs/bin/vlserver
|
||||
file on all database server machines (or on all binary
|
||||
distribution machines). The issuer must also be able to
|
||||
insert files in the /usr/afs/bin directories on the
|
||||
machines.
|
||||
|
||||
An issuer who is logged into the UNIX file systems of the
|
||||
database server machines as "root" has the necessary rights
|
||||
to perform the entire conversion procedure.
|
322
src/man/vos.1
322
src/man/vos.1
@ -1,322 +0,0 @@
|
||||
AFS Commands
|
||||
|
||||
1. The vos Commands
|
||||
|
||||
------------------------------------------------------------
|
||||
|
||||
This command defines the vos commands that system
|
||||
administrators use to contact the Volume Server and Volume
|
||||
Location (VL) Server. It assumes the reader is familiar
|
||||
with the concepts described in AFS System Administrator's
|
||||
Guide.
|
||||
|
||||
System administrators use vos commands to instruct the
|
||||
Volume Server to create, move, delete, replicate and backup
|
||||
volumes. The Volume Location (VL) Server automatically
|
||||
records in the Volume Location Database (VLDB) any changes
|
||||
in volume status and location that result from vos commands.
|
||||
Operators can use other vos commands to obtain information
|
||||
from VLDB records. Vos commands also help operators dump
|
||||
copies of volumes to disk and restore them to the file
|
||||
system if necessary.
|
||||
|
||||
Note that vos commands are "idempotent." This means that if
|
||||
execution of a certain command is interrupted in the middle
|
||||
by a server or process failure, then a subsequent execution
|
||||
of the same command picks up at the interruption point,
|
||||
rather than at the very beginning of the operation. (This
|
||||
does not apply if the issuer explicitly interrupts the
|
||||
operation with ^C or another interrupt signal. In that
|
||||
case, the volume is left locked and the issuer must unlock
|
||||
it with vos unlock before proceeding.) Idempotency implies
|
||||
that before executing a command, the Volume and VL Servers
|
||||
check to see if running it will have any effect (i.e.,
|
||||
whether the state that will result from running the command
|
||||
already holds). If the desired end-state already holds,
|
||||
there is no need to run the command again, no matter how
|
||||
many times it is subsequently issued. If the end-state does
|
||||
not yet hold, the command should pick up where necessary to
|
||||
achieve it.
|
||||
|
||||
Refer to the Command Summary at the end of this document for
|
||||
a complete list of vos commands and their syntax.
|
||||
|
||||
1.1 The Information in VLDB Entries
|
||||
The Volume Location Database (VLDB), maintained by the
|
||||
Volume Location (VL) Server, records a large range of
|
||||
information about all the volumes in a cell. A separate
|
||||
copy of the VLDB resides on each database server machine. To
|
||||
keep the copies synchronized, the VL Server uses the AFS's
|
||||
library of database management facilities, called Ubik.
|
||||
|
||||
It is important that the information in the VLDB correspond
|
||||
to the status of the actual volumes on the servers as much
|
||||
of the time as possible. For this reason, any vos command
|
||||
that affects volume status also changes the corresponding
|
||||
VLDB entry automatically, as noted in the command
|
||||
descriptions below. (It is possible for the VLDB and
|
||||
servers to disagree if vos operations are interrupted before
|
||||
completion; see the vos syncserv and vos syncvldb commands.)
|
||||
|
||||
There is an entry in the VLDB for each ReadWrite volume.
|
||||
The entry also records information about the ReadOnly and
|
||||
Backup version of the volume; ReadOnly and Backup volumes do
|
||||
AFS Command Reference Manual The vos Commands 2
|
||||
|
||||
|
||||
not have their own VLDB entries. (The one exception to this
|
||||
rule is that a ReadOnly volume may have its own VLDB entry
|
||||
if its ReadWrite source has been removed.)
|
||||
|
||||
The following information is available from a VLDB entry:
|
||||
|
||||
- the name of the ReadWrite version of the volume.
|
||||
The ReadOnly version automatically has the same
|
||||
name with a .readonly extension, the Backup
|
||||
version with a .backup extension
|
||||
|
||||
- the ReadWrite volumeID number. A volumeID number
|
||||
is simply an identification number guaranteed to
|
||||
be unique within a cell. In almost all cases, the
|
||||
VL Server allocates volumeID numbers
|
||||
automatically, but some commands allow the issuer
|
||||
to assign volumeIDs explicitly. Each of the three
|
||||
versions of a volume has a different volumeID
|
||||
number; they often run consecutively, especially
|
||||
if the VL Server assigned them, but this is not a
|
||||
requirement.
|
||||
|
||||
- the ReadOnly volumeID number. All copies of the
|
||||
ReadOnly version share the same ID.
|
||||
|
||||
- the Backup volumeID number
|
||||
|
||||
- the ReleaseClone volumeID number, if a
|
||||
ReleaseClone exists. See the description of
|
||||
vos release for more about the ReleaseClone.
|
||||
|
||||
- one or more site definitions, each of which
|
||||
specifies a file server machine name and partition
|
||||
name. Site definitions specify the location of
|
||||
the ReadWrite version and each copy of the
|
||||
ReadOnly version (if any). No site definition is
|
||||
necessary for the Backup version, if any, because
|
||||
it always resides at the same site as its
|
||||
ReadWrite source. There can be one ReadWrite
|
||||
definition and up to six ReadOnly definitions.
|
||||
|
||||
- one or more site flags associated with each site
|
||||
|
||||
One site flag tells what type of volume resides at
|
||||
the site, and has value RW for ReadWrite or RO for
|
||||
ReadOnly.
|
||||
|
||||
The other possible site flag marks the copy at
|
||||
that site as NEW or OLD. Normally, this type of
|
||||
flag will not appear; its presence indicates that
|
||||
an error occurred as new ReadOnly clones were
|
||||
being distributed to their sites. See the
|
||||
description of the vos release command for further
|
||||
explanation.
|
||||
|
||||
- one status flag for each of the three versions--
|
||||
ReadWrite, ReadOnly and Backup. This flag
|
||||
indicates whether the version actually exists at
|
||||
at least one site: valid indicates that it does,
|
||||
invalid that it does not. Note that there is not
|
||||
a separate status flag for each site.
|
||||
AFS Command Reference Manual The vos Commands 3
|
||||
|
||||
|
||||
- a site count, which tells how many copies exist of
|
||||
the ReadWrite and ReadOnly versions of the volume.
|
||||
There is only one ReadWrite copy, but as many as
|
||||
six ReadOnly copies may exist.
|
||||
|
||||
- an indication if the VLDB entry is locked. Since
|
||||
being unlocked is the default state, there is no
|
||||
explicit indicator if the VLDB entry is unlocked.
|
||||
See the descriptions of the vos lock and
|
||||
vos unlock commands.
|
||||
|
||||
The vos listvldb command displays much of the information
|
||||
from the VLDB described above. The vos examine command also
|
||||
displays VLDB information, in combination with volume header
|
||||
information.
|
||||
|
||||
1.2 The Information in Volume Headers
|
||||
The previous section explained that there is a single VLDB
|
||||
entry for each ReadWrite volume and all of its (ReadOnly and
|
||||
Backup) clones. In contrast, there is a separate volume
|
||||
header at the site of each copy of the volume, no matter its
|
||||
version. The volume header is the volume in a senseMit is a
|
||||
data structure that records which physical memory addresses
|
||||
on the partition are storing the files in the volume. The
|
||||
volume header binds all the files into a logical unit
|
||||
without requiring that they be stored in contiguous memory
|
||||
blocks.
|
||||
|
||||
In addition to data location, the volume header records
|
||||
other information about the volume, some of it redundant
|
||||
with the VLDB so that the Volume Server can access the
|
||||
information even when the VLDB is unavailable.
|
||||
|
||||
The information in the volume header includes:
|
||||
|
||||
- the name of this copy of the volume, with
|
||||
.readonly or .backup extension if appropriate
|
||||
|
||||
- its volumeID number
|
||||
|
||||
- its type (RW for ReadWrite, RO for ReadOnly, BK
|
||||
for Backup)
|
||||
|
||||
- its size in kilobytes (so 1024 means a megabyte)
|
||||
|
||||
- its status at the site, which is unrelated to the
|
||||
locked/unlocked status of the VLDB entry. There
|
||||
are three possibilities:
|
||||
|
||||
* On-line means that the volume is fully
|
||||
accessible through the file system
|
||||
|
||||
* needs salvage means that the volume is
|
||||
probably corrupted. Run the Salvager using
|
||||
the bos salvage command.
|
||||
|
||||
* Off-line means that the volume is not
|
||||
accessible, but there is no reason to suspect
|
||||
that it is corrupted
|
||||
|
||||
- a Parent ID number, which is the volumeID of this
|
||||
AFS Command Reference Manual The vos Commands 4
|
||||
|
||||
|
||||
volume's ReadWrite source. If this volume is the
|
||||
ReadWrite version itself, this ID should match the
|
||||
previously mentioned volumeID.
|
||||
|
||||
- a Clone ID number, which is the volumeID number of
|
||||
the last clone made from this volume's ReadWrite
|
||||
source for the purposes of replication. It may
|
||||
match the ReadOnly volumeID or ReleaseClone ID,
|
||||
dependingon whether or not the release was
|
||||
successful.
|
||||
|
||||
- a Backup ID number, which is the volumeID of the
|
||||
Backup version of this volume. If this volume is
|
||||
the Backup version itself, this ID should match
|
||||
the previously mentioned volumeID.
|
||||
|
||||
- a quota, which is the maximum amount of disk space
|
||||
the ReadWrite version of the volume may occupy.
|
||||
It does not apply sensibly to ReadOnly or Backup
|
||||
volumes, but is reported for convenience anyway.
|
||||
|
||||
- its creation date, which is the day and time when
|
||||
this copy of the volume was created (for ReadOnly
|
||||
and Backup copies, this means cloned/released).
|
||||
If the volume has been restored with
|
||||
backup diskrestore, backup volrestore or vos
|
||||
restore, this is the restore time.
|
||||
|
||||
- its date of last update, which is the day and time
|
||||
when the contents of this volume last changed.
|
||||
For ReadOnly and Backup volumes, this should match
|
||||
the creation date, since they are not allowed to
|
||||
change.
|
||||
AFS Command Reference Manual The vos Commands 5
|
||||
|
||||
|
||||
- the number of times the volume has been accessed
|
||||
since the later of
|
||||
|
||||
* 12:00 a.m. on the day the command is issued
|
||||
|
||||
* the last time the volume changed location
|
||||
|
||||
An access is defined as a fetch or store operation
|
||||
on any file system object stored in the volume.
|
||||
|
||||
The vos listvol command displays information from the volume
|
||||
header (as does the vos examine command, in combination with
|
||||
VLDB information).
|
||||
|
||||
1.3 Common Arguments and Flags
|
||||
Most vos commands accept the following optional arguments
|
||||
and flags. They are listed in the command descriptions
|
||||
where they apply, and are described in detail below:
|
||||
|
||||
[-cell <cell name>]
|
||||
|
||||
This argument specifies that the command should be run in a
|
||||
different cell, specified by cell name. By default,
|
||||
commands are executed in the local cell, as defined in
|
||||
/usr/vice/etc/ThisCell on the client machine on which the
|
||||
command is issued. The issuer may abbreviate cell name to
|
||||
the shortest form that distinguishes it from the other cells
|
||||
listed in /usr/vice/etc/CellServDB on the client machine on
|
||||
which the command is issued.
|
||||
|
||||
[-noauth]
|
||||
|
||||
This flag instructs the Volume and/or Volume Location Server
|
||||
not to authenticate the user of the command, and thus
|
||||
establishes an unauthenticated connection between the user
|
||||
and the server (the user is recognized as the unprivileged
|
||||
user anonymous). It is useful only when authorization
|
||||
checking is disabled on the file server machine (during the
|
||||
installation of a file server machine or when bos setauth
|
||||
has been used during other unusual circumstances). In
|
||||
normal circumstances, the Volume and VL Servers allow only
|
||||
authorized (privileged) users to issue commands that change
|
||||
the status of a volume or VLDB entry, and will refuse to
|
||||
perform such an action even if the -noauth flag is used.
|
||||
|
||||
[-localauth]
|
||||
|
||||
This flag instructs the vos command interpreter running on
|
||||
the local machine to construct a server ticket using the
|
||||
server encryption key with the highest key version number in
|
||||
/usr/afs/etc/KeyFile on the local machine. The command
|
||||
interpreter presents the ticket to the Volume and/or Volume
|
||||
Location Server to use in mutual authentication.
|
||||
|
||||
This argument is only useful for commands issued on file
|
||||
server machines, since client workstations do not have a
|
||||
KeyFile. It is intended for cron-type processes or jobs
|
||||
included in the machine's /usr/afs/local/BosConfig file. An
|
||||
example might be a command that automatically runs the
|
||||
vos backup command on certain volumes in preparation for
|
||||
archival backups. See the chapter in the AFS System
|
||||
AFS Command Reference Manual The vos Commands 6
|
||||
|
||||
|
||||
Administrator's Guide about backing up the system. The flag
|
||||
can also be used if the user is unable to authenticate but
|
||||
is logged into the local UNIX file system as "root".
|
||||
|
||||
[-verbose]
|
||||
|
||||
This flag tells the Volume Server and/or VL Server to
|
||||
display messages about the operations they are performing
|
||||
while executing the command. Useful mainly for debugging
|
||||
and tracing purposes.
|
||||
|
||||
[-help]
|
||||
|
||||
This flag has the same function as the vos help command: it
|
||||
prints the command's online help message on the screen. No
|
||||
other arguments or flags should be provided at the same
|
||||
time. Even if they are, this flag overrides them, and the
|
||||
only effect of issuing the command is that the help message
|
||||
appears.
|
||||
|
||||
1.4 The Privilege Required for vos Commands
|
||||
The Volume and Volume Location Servers consider privileged
|
||||
those users listed in the file /usr/afs/etc/UserList on a
|
||||
file server machines' local disk. This list is maintained
|
||||
on each file server machine's local disk using bos commands.
|
||||
|
||||
Most vos commands require privilege; only those that list
|
||||
volume-related information do not.
|
@ -1,108 +0,0 @@
|
||||
vos addsite AFS Commands vos addsite
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos addsite -- add definition of ReadOnly site to VLDB
|
||||
|
||||
entry.
|
||||
|
||||
|
||||
vos addsite -server <machine name for new site>
|
||||
-partition <partition name for new site>
|
||||
-id <volume name or ID> [-cell <cell name>] [-noauth]
|
||||
[-localauth] [-verbose] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos ad -s <machine name for new site> -p <partition name
|
||||
for new site>
|
||||
-i <volume name or ID> [-c <cell name>] [-n] [-l] [-v]
|
||||
[-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Defines future sites that will receive copies of the
|
||||
ReadOnly version of a volume, in preparation for actually
|
||||
creating and distributing the ReadOnly version using
|
||||
vos release. A site is defined as a certain file server
|
||||
machine and partition.
|
||||
|
||||
The VLDB status flag for the ReadOnly version of the volume
|
||||
remains invalid, since an actual copy of the ReadOnly volume
|
||||
does not yet exist at the site.
|
||||
|
||||
If defining more than one replication site for a given
|
||||
ReadWrite source, issue this command repeatedly.
|
||||
|
||||
WARNING
|
||||
|
||||
Do not define more than six ReadOnly sites with this
|
||||
command. Each VLDB entry can store up to seven site entries
|
||||
(the ReadWrite site counts as one).
|
||||
|
||||
No more that 3500 volumes should reside on one partition. A
|
||||
greater number can cause the AFS Salvager process to
|
||||
malfunction. It is the issuer's responsibility to check
|
||||
that releasing a ReadOnly volume to a site defined with this
|
||||
command will not cause the limit to be exceeded. The
|
||||
vos listvol command reports the number of volumes on a
|
||||
partition.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-server names the file server machine where the copy
|
||||
is to reside. Abbreviated forms of machine
|
||||
names may be allowed depending on the naming
|
||||
service available at the time the command is
|
||||
issued; see page xii in the introductory
|
||||
About This Manual chapter. -partition
|
||||
names the particular partition on that file
|
||||
server machine where the copy is to reside.
|
||||
In addition to the full /vicepx form of a
|
||||
partition name, three shorter forms are
|
||||
acceptable; see page xii in the introductory
|
||||
|
||||
|
||||
|
||||
About This Manual chapter. -id
|
||||
specifies either the complete name or
|
||||
volumeID number of the ReadWrite source
|
||||
volume.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
to report on what they are doing as they
|
||||
execute the command. See section 8.3 in the
|
||||
Reference Manual for more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following, appropriate in the Transarc Corporation cell,
|
||||
defines a ReadOnly site for the cell's root.afs volume.
|
||||
|
||||
% vos ad fs7.transarc.com /vicepb root.afs
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos listvol
|
||||
|
||||
vos release
|
@ -1,64 +0,0 @@
|
||||
vos apropos AFS Commands vos apropos
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos apropos -- show each help entry containing keyword.
|
||||
|
||||
|
||||
vos apropos -topic <help string> [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos ap -t <help string> [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Displays the first line of the help entry for any vos
|
||||
command that has help string in its name or short
|
||||
description.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-topic specifies the keyword string to search for.
|
||||
If it is more than a single word, surround
|
||||
it with double quotes or other delimiters.
|
||||
Type all help strings for vos commands in
|
||||
all lowercase letters, except the word
|
||||
"VLDB."
|
||||
|
||||
-help prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
OUTPUT
|
||||
|
||||
The first line of a command's online help entry names the
|
||||
command and briefly describes what it does. The vos apropos
|
||||
command displays that first line for any vos command where
|
||||
help string is part of the command name or first line.
|
||||
|
||||
To see the remaining lines in a help entry, which provide
|
||||
the command's alias (if any) and syntax, use the vos help
|
||||
command.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following lists all vos commands that have the word
|
||||
"lock" in their operation code or short online description.
|
||||
|
||||
% vos ap lock
|
||||
lock: lock VLDB entry for a volume
|
||||
unlock: release lock on VLDB entry for a volume
|
||||
unlockvldb: unlock all the locked entries in the VLD
|
||||
|
||||
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
None.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos help
|
@ -1,72 +0,0 @@
|
||||
vos backup AFS Commands vos backup
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos backup -- create Backup volume version of one ReadWrite
|
||||
|
||||
volume.
|
||||
|
||||
|
||||
vos backup -id <volume name or ID> [-cell <cell name>]
|
||||
[-noauth]
|
||||
[-localauth] [-verbose] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos backup -i <volume name or ID> [-c <cell name>] [-n]
|
||||
[-l] [-v] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Clones the indicated ReadWrite volume to create a Backup
|
||||
version. Names the Backup version by adding a .backup
|
||||
extension to the ReadWrite source's name. It places the
|
||||
Backup version at the same site as the ReadWrite, and
|
||||
changes the VLDB status flag for the Backup to valid.
|
||||
|
||||
If a Backup version already exists, this new clone replaces
|
||||
it. The status flag remains valid.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-id specifies either the complete name or
|
||||
volumeID number of the ReadWrite source
|
||||
volume.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
to report on what they are doing as they
|
||||
execute the command. See section 8.3 in the
|
||||
Reference Manual for more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following creates a Backup version of the volume
|
||||
user.smith.
|
||||
|
||||
% vos backup user.smith
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos backupsys
|
@ -1,155 +0,0 @@
|
||||
vos backupsys AFS Commands vos backupsys
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos backupsys -- create Backup volume version of all
|
||||
|
||||
indicated ReadWrite volumes.
|
||||
|
||||
|
||||
vos backupsys [-prefix <common prefix on volume(s)>]
|
||||
[-server <machine name>] [-partition <partition name>]
|
||||
[-cell <cell name>] [-noauth] [-localauth] [-verbose]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos backups [-pr <common prefix on volume(s)>] [-s
|
||||
<machine name>]
|
||||
[-pa <partition name>] [-c <cell name>] [-n] [-l] [-v]
|
||||
[-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Clones each indicated ReadWrite volume to make a Backup
|
||||
version of it. Names each Backup version by adding a
|
||||
.backup extension to the name of its ReadWrite source. It
|
||||
places each Backup at the same site as its source, and
|
||||
changes the VLDB status flag for each Backup to valid.
|
||||
|
||||
If a Backup version already exists for a volume, the new
|
||||
clone replaces it. The status flag remains valid.
|
||||
|
||||
By combining the -prefix, -server and -partition arguments
|
||||
in different ways, it is possible to create Backup copies of
|
||||
varying numbers of volumes. The possibilities are listed
|
||||
here from most to least inclusive
|
||||
|
||||
To create a Backup version of:
|
||||
|
||||
- every ReadWrite volume in the system, omit all
|
||||
three arguments. This could take a rather long
|
||||
time to execute, depending on the number of
|
||||
volumes.
|
||||
|
||||
- every ReadWrite volume whose name begins with a
|
||||
certain character string (for example, sys. or
|
||||
user.), regardless of site, use -prefix.
|
||||
|
||||
- every ReadWrite volume on a file server machine,
|
||||
specify the file server name with -server.
|
||||
|
||||
- every ReadWrite volume that resides on a partition
|
||||
of the same name (for instance, on /vicepa on any
|
||||
file server machine), specify the partition name
|
||||
with -partition.
|
||||
|
||||
- every ReadWrite volume on a certain partition of a
|
||||
file server machine, specify both -server and
|
||||
-partition.
|
||||
|
||||
|
||||
|
||||
- every ReadWrite volume with a certain prefix that
|
||||
resides on a file server machine, combine -prefix
|
||||
and -server. The -prefix argument may also be
|
||||
combined with -partition, or both -server and
|
||||
-partition, in this way.
|
||||
|
||||
- a single ReadWrite volume, give its complete name
|
||||
as -prefix. This is actually better done with the
|
||||
vos backup command, which employs a more
|
||||
streamlined technique for finding a single volume.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-prefix specifies a character string of any length.
|
||||
Every volume whose name begins with this
|
||||
exact string will be cloned (subject to
|
||||
modulations from -server and -partition).
|
||||
Include field separators (such as periods)
|
||||
if appropriate. This argument may be
|
||||
combined with -server and/or -partition.
|
||||
|
||||
-server names the file server machine where the
|
||||
ReadWrite source volume(s) reside.
|
||||
Abbreviated forms of machine names may be
|
||||
allowed depending on the naming service
|
||||
available at the time the command is issued;
|
||||
see page xii in the introductory About This
|
||||
Manual chapter. This argument may be
|
||||
combined with -prefix and/or -partition.
|
||||
|
||||
-partition names the particular partition where the
|
||||
ReadWrite source volume(s) reside. In
|
||||
addition to the full /vicepx form of a
|
||||
partition name, three shorter forms are
|
||||
acceptable; see page xii in the introductory
|
||||
About This Manual chapter. This argument
|
||||
may be combined with -prefix and/or -server.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
to report on what they are doing as they
|
||||
execute the command. See section 8.3 in the
|
||||
Reference Manual for more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following creates a Backup version of every volume in
|
||||
the cell's file system whose name begins with "user".
|
||||
|
||||
% vos backups user
|
||||
|
||||
The following, appropriate in the Transarc Corporation cell,
|
||||
creates a Backup version of every volume on the file server
|
||||
machine fs3.transarc.com.
|
||||
|
||||
% vos backups -s fs3.transarc.com
|
||||
|
||||
The following, appropriate in the Transarc Corporation cell,
|
||||
creates a Backup version of every volume on the /vicepc
|
||||
partition of the file server machine fs5.transarc.com.
|
||||
|
||||
% vos backups -s fs5.transarc.com -p c
|
||||
|
||||
The following, appropriate in the Transarc Corporation cell,
|
||||
creates a Backup version of every volume on the file server
|
||||
machine db1.transarc.com whose name begins with "sys".
|
||||
|
||||
% vos backups sys db1.transarc.com
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos backup
|
@ -1,115 +0,0 @@
|
||||
vos create AFS Commands vos create
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos create -- create (empty) ReadWrite volume and
|
||||
|
||||
associated VLDB entry.
|
||||
|
||||
|
||||
vos create -server <machine name> -partition <partition
|
||||
name> -name <volume name> [-cell <cell name>]
|
||||
[-noauth]
|
||||
[-localauth] [-verbose] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos c -s <machine name> -p <partition name> -na <volume
|
||||
name>
|
||||
[-c <cell name>] [-no] [-l] [-v] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Creates a ReadWrite volume, names it volume name and places
|
||||
it at the site specified by machine name and partition name.
|
||||
The volume automatically receives a volumeID number,
|
||||
recorded in both the VLDB and the volume header. The VLDB
|
||||
status flag for the ReadWrite site is set to valid.
|
||||
|
||||
If this command succeeds, then the volume is available for
|
||||
use, though it must be mounted in the file system before its
|
||||
contents are accessible. Use the fs mkmount command to
|
||||
mount a volume.
|
||||
|
||||
This command creates a default ACL associated with the
|
||||
volume's "root directory" (which takes the same name as
|
||||
volume's mount point when the volume is mounted with
|
||||
fs mkmount). The ACL grants all seven access rights to
|
||||
system:administrators. The volume's space quota is set to
|
||||
5000 kilobyte blocks by default.
|
||||
|
||||
The Volume Location Server also pre-allocates, and records
|
||||
in the VLDB, volumeID numbers for the ReadOnly and Backup
|
||||
versions that may be created later. It does not actually
|
||||
create those types of volumes or place anything at a
|
||||
ReadOnly or Backup site, so the status flags for ReadOnly
|
||||
and Backup are set to invalid.
|
||||
|
||||
WARNING
|
||||
|
||||
No more that 3500 volumes should reside on one partition. A
|
||||
greater number can cause the AFS Salvager process to
|
||||
malfunction. It is the issuer's responsibility to check
|
||||
that issuing this command will not cause the limit to be
|
||||
exceeded. The vos listvol command reports the number of
|
||||
volumes on a partition.
|
||||
|
||||
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-server names the file server machine on which to
|
||||
create the new ReadWrite volume.
|
||||
Abbreviated forms of machine names may be
|
||||
allowed depending on the naming service
|
||||
available at the time the command is issued;
|
||||
see page xii in the introductory About This
|
||||
Manual chapter. -partition
|
||||
names the particular partition where the
|
||||
ReadWrite volume is to reside. In addition
|
||||
to the full /vicepx form of a partition
|
||||
name, three shorter forms are acceptable;
|
||||
see page xii in the introductory About This
|
||||
Manual chapter. -name
|
||||
specifies a name for the ReadWrite volume,
|
||||
preferably descriptive of its contents. It
|
||||
may be no longer than 22 characters, but may
|
||||
contain upper- and lowercase letters,
|
||||
numbers and punctuation. By convention,
|
||||
periods separate the fields in a name. Do
|
||||
not use the extension .backup or .readonly
|
||||
on ReadWrite volume names; the Volume Server
|
||||
automatically adds these extensions when
|
||||
creating those volume types.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
to report on what they are doing as they
|
||||
execute the command. See section 8.3 in the
|
||||
Reference Manual for more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLE
|
||||
|
||||
The following creates the ReadWrite volume user.pat on the
|
||||
/vicepf partition of fs4.transarc.com.
|
||||
|
||||
% vos c fs4.transarc.com /vicepf user.pat
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server.
|
@ -1,159 +0,0 @@
|
||||
vos delentry AFS Commands vos delentry
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos delentry -- remove specified entry from VLDB.
|
||||
|
||||
|
||||
vos delentry -id <volume name or ID>
|
||||
[-prefix <prefix of volume whose VLDB entry is to be
|
||||
deleted>]
|
||||
[-server <machine name>] [-partition <partition name>]
|
||||
[-cell <cell name>] [-noauth] [-localauth] [-verbose]
|
||||
[-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos de -i <volume name or ID>
|
||||
[-pr <prefix of volume whose VLDB entry is to be deleted>]
|
||||
[-s <machine name>] [-pa <partition name>] [-c <cell
|
||||
name>]
|
||||
[-n] [-l] [-v] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Removes the VLDB entry for the indicated volume(s) from the
|
||||
VLDB. Each volume may be any of the three types (ReadWrite,
|
||||
ReadOnly or Backup), but the entire entry is removed no
|
||||
matter which type is provided. The command has no effect on
|
||||
the actual volumes on file server machines, if they exist.
|
||||
|
||||
This command is useful if the system administrator is
|
||||
certain that a volume removal was not recorded in the VLDB
|
||||
(perhaps the vos zap command was used), and does not want to
|
||||
take the time to use vos syncserv and vos syncvldb to
|
||||
synchronize an entire file server machine.
|
||||
|
||||
By using the -id argument alone, or combining the -prefix,
|
||||
-server and -partition arguments in different ways, it is
|
||||
possible to remove the VLDB entry for varying numbers of
|
||||
volumes. To remove the VLDB entry for:
|
||||
|
||||
- a single volume, provide its complete name or
|
||||
volumeID number as -id.
|
||||
|
||||
- every volume whose name begins with a certain
|
||||
character string (for example, sys. or user.),
|
||||
regardless of site, use -prefix.
|
||||
|
||||
- every volume listed as residing on a certain file
|
||||
server machine, specify the file server name with
|
||||
-server.
|
||||
|
||||
- every volume listed as residing on a partition of
|
||||
the same name (for instance, on /vicepa on any
|
||||
file server machine), specify the partition name
|
||||
with -partition.
|
||||
|
||||
- every volume on a certain partition of a file
|
||||
server machine, specify both -server and
|
||||
-partition.
|
||||
|
||||
- every volume with a certain prefix that resides on
|
||||
a file server machine, combine -prefix and
|
||||
|
||||
|
||||
|
||||
-server. The -prefix argument may also be
|
||||
combined with -partition, or both -server and
|
||||
-partition, in this way.
|
||||
|
||||
WARNING
|
||||
|
||||
This command should not be used as the standard way to
|
||||
remove a volume, as it is likely to put the VLDB out of sync
|
||||
with the volumes on servers. Use vos remove instead.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-id specifies either the complete name or
|
||||
volumeID number of the volume, which may be
|
||||
ReadWrite, ReadOnly or Backup. The entire
|
||||
entry is removed, no matter which type is
|
||||
provided. Provide this argument OR some
|
||||
combination of -prefix, -server and
|
||||
-partition.
|
||||
|
||||
-prefix specifies a character string of any length.
|
||||
Every VLDB listing a volume whose name
|
||||
begins with this exact string will be
|
||||
removed (subject to modulations from -server
|
||||
and -partition). Include field separators
|
||||
(such as periods) if appropriate. This
|
||||
argument may be combined with -server and/or
|
||||
-partition.
|
||||
|
||||
-server names a file server machine. If the VLDB
|
||||
entry mentions this file server machine as
|
||||
the site for a volume, the entry will be
|
||||
removed. Abbreviated forms of machine names
|
||||
may be allowed depending on the naming
|
||||
service available at the time the command is
|
||||
issued; see page xii in the introductory
|
||||
About This Manual chapter. This argument
|
||||
may be combined with -prefix and/or
|
||||
-partition.
|
||||
|
||||
-partition names a partition. If the VLDB entry
|
||||
mentions this partition as the site for a
|
||||
volume, the entry will be removed. In
|
||||
addition to the full /vicepx form of a
|
||||
partition name, three shorter forms are
|
||||
acceptable; see page xii in the introductory
|
||||
About This Manual chapter. This argument
|
||||
may be combined with -prefix and/or -server.
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
|
||||
|
||||
|
||||
to report on what they are doing as they
|
||||
execute the command. See section 8.3 in the
|
||||
Reference Manual for more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following removes the VLDB entry for the volume
|
||||
user.temp.
|
||||
|
||||
% vos del user.temp
|
||||
|
||||
The following removes all VLDB entries that describe volumes
|
||||
stored on fs3.transarc.com whose names begin with the string
|
||||
"test".
|
||||
|
||||
% vos del -pr test -s fs3.transarc.com
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos remove vos remsite vos syncserv vos syncvldb vos zap
|
@ -1,126 +0,0 @@
|
||||
vos dump AFS Commands vos dump
|
||||
|
||||
|
||||
NAME
|
||||
|
||||
vos dump -- convert volume into ASCII format and place in a
|
||||
|
||||
file.
|
||||
|
||||
|
||||
vos dump -id <volume name or ID> -time <dump from time>
|
||||
[-file <dump file>] [-cell <cell name>] [-noauth]
|
||||
[-localauth]
|
||||
[-verbose] [-help]
|
||||
|
||||
ACCEPTABLE ABBREVIATIONS/ALIASES
|
||||
|
||||
vos du -i <volume name or ID> -t <dump from time> [-f
|
||||
<dump file>]
|
||||
[-c <cell name>] [-n] [-l] [-v] [-h]
|
||||
|
||||
DESCRIPTION
|
||||
|
||||
Converts the contents of the indicated volume, which may be
|
||||
of any type, into ASCII format. If the -file argument is
|
||||
provided, the converted volume contents are placed in it.
|
||||
If the argument is not provided, the contents are directed
|
||||
to standard output (stdout), from which the issuer may pipe
|
||||
them elsewhere if desired.
|
||||
|
||||
It is possible to dump either the entire volume, or only
|
||||
those files in it modified since a specified time (the
|
||||
latter is referred to as a "incremental" dump), by
|
||||
specifying the proper value for -time.
|
||||
|
||||
Dumping does not affect any status or site flags in the
|
||||
volume header or VLDB. It does, however, make the volume
|
||||
inaccessible during the duration of the dump.
|
||||
|
||||
ARGUMENTS
|
||||
|
||||
-id specifies either the complete name or
|
||||
volumeID number of the volume, which may be
|
||||
ReadWrite, ReadOnly or Backup.
|
||||
|
||||
-time determines whether the dump is full or
|
||||
incremental, and in the latter case, from
|
||||
what date the dump is done. There are three
|
||||
types of legal values:
|
||||
|
||||
- 0 creates a full dump.
|
||||
|
||||
- mm/dd/yy specifies 12:00 a.m. on the
|
||||
indicated date (month/day/year) and
|
||||
creates an incremental dump including
|
||||
only elements with modification time
|
||||
stamps later than this date. Examples
|
||||
: 1/23/90, 10/7/89.
|
||||
|
||||
- "mm/dd/yy hh:mm" specifies a time
|
||||
"hour:minutes" on the indicated date
|
||||
(month/day/year) and creates an
|
||||
incremental dump including only
|
||||
elements with modification time stamps
|
||||
|
||||
|
||||
|
||||
later than this time. The time should
|
||||
be in 24-hour format (for example,
|
||||
20:30 is 8:30 p.m.) Surround the
|
||||
entire instance with quotes because it
|
||||
contains a space. Examples : "1/23/90
|
||||
22:30", "10/7/89 3:45".
|
||||
|
||||
-file directs the dump into the indicated file,
|
||||
which is created in the current working
|
||||
directory if no full or relative pathname is
|
||||
provided. If the issuer does not provide
|
||||
this argument, the dump is directed to
|
||||
standard output (stdout).
|
||||
|
||||
-cell specifies the cell in which to run the
|
||||
command. See section 8.3 in the Reference
|
||||
Manual for more details. -noauth
|
||||
tells the Volume and Volume Location Servers
|
||||
to assign the identity anonymous to the
|
||||
issuer. See section 8.3 in the Reference
|
||||
Manual for more details. -localauth
|
||||
constructs a server ticket using a key from
|
||||
/usr/afs/etc/KeyFile. See section 8.3 in
|
||||
the Reference Manual for more details.
|
||||
-verbose
|
||||
tells the Volume and Volume Location Servers
|
||||
to trace their execution of the command.
|
||||
See section 8.3 in the Reference Manual for
|
||||
more details. -help
|
||||
prints the online help for this command. Do
|
||||
not provide any other arguments or flags
|
||||
with this one. See section 8.3 in the
|
||||
Reference Manual for more details.
|
||||
|
||||
EXAMPLES
|
||||
|
||||
The following executes a full dump of the volume user.terry
|
||||
into the file /afs/transarc.com/common/dumps/terry.dump in
|
||||
the current working directory.
|
||||
|
||||
% vos dump user.terry 0 terry.dump
|
||||
|
||||
The following executes an incremental dump of the volume
|
||||
user.smith into the file smith.900131.dump in the current
|
||||
working directory. Only those files in the volume with
|
||||
modification time stamps later than 6:00 p.m. on 31 February
|
||||
1990 are included in the dump.
|
||||
|
||||
% vos dump user.smith "1/31/90 18:00" smith.090131.dump
|
||||
|
||||
PRIVILEGE REQUIRED
|
||||
|
||||
Issuer must be listed in /usr/afs/etc/UserList on -server,
|
||||
and must have WRITE access in the directory where the dump
|
||||
file is to reside.
|
||||
|
||||
MORE INFORMATION
|
||||
|
||||
vos restore
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user