Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

documentation update #9

Open
wants to merge 10 commits into
base: for-next
Choose a base branch
from
Open

documentation update #9

wants to merge 10 commits into from

Conversation

decarv
Copy link
Contributor

@decarv decarv commented Dec 18, 2024

No description provided.

Pavel Filipenský and others added 10 commits October 7, 2024 22:00
…ninfo

Signed-off-by: Pavel Filipenský <[email protected]>
Signed-off-by: Steve French <[email protected]>
Currently, there are some issues when using the password2 mount option:

1.  When password2 is provided in the credential file, mount.cifs overwrites
password1 with the alternate password2.
2. There is no support to retrieve password2 from the environment.
3. password2 is not masked when mounting with verbose option.

This commit fixes the aforementioned issues and adds documentation for the
password2 mount option.

Signed-off-by: Meetakshi Setiya <[email protected]>
Reviewed-by: Bharath SM <[email protected]>
Signed-off-by: Steve French <[email protected]>
…d_from_file and minor documentation additions

Signed-off-by: Meetakshi Setiya <[email protected]>
Reviewed-by: Bharath SM <[email protected]>
Signed-off-by: Steve French <[email protected]>
When handling upcalls from the kernel for SMB session setup requests using
Kerberos authentication, if the credential cache already contains a valid
service ticket, it can be used directly without checking for the TGT again.

Signed-off-by: Bharath SM <[email protected]>
Reviewed-by: Shyam Prasad N <[email protected]>
Acked-by: Alexander Bokovoy <[email protected]>
Signed-off-by: Steve French <[email protected]>
NOTE: This patch is dependent on one of the previously sent patches:
[PATCH] CIFS: New mount option for cifs.upcall namespace resolution
which introduces a new mount option called upcall_target, to
customise the upcall behaviour.

Building upon the above patch, the following patch adds functionality
to handle upcall_target as a mount option in cifs.upcall. It can have 2 values -
mount, app.
Having this new mount option allows the mount command to specify where the
upcall should happen: 'mount' for resolving the upcall to the host
namespace, and 'app' for resolving the upcall to the ns of the calling
thread. This will enable both the scenarios where the Kerberos credentials
can be found on the application namespace or the host namespace to which
just the mount operation is "delegated".
This aids use cases like Kubernetes where the mount
happens on behalf of the application in another container altogether.

Signed-off-by: Ritvik Budhiraja <[email protected]>
Signed-off-by: Steve French <[email protected]>
Fix compiler warnings in mount.cifs.c
Signed-off-by: Henrique Carvalho <[email protected]>
Signed-off-by: Henrique Carvalho <[email protected]>
Signed-off-by: Henrique Carvalho <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants