import 2.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. .TH IMPORT 4
  2. .SH NAME
  3. import \- import a name space from a remote system
  4. .SH SYNOPSIS
  5. .B import
  6. [
  7. .B -abcC
  8. ] [
  9. .B "-E clear | ssl"
  10. .\" .B "| tls" .\" Not yet implemented
  11. ] [
  12. .B "-e 'enc auth'"
  13. ] [
  14. .B -k
  15. .I keypattern
  16. ] [
  17. .B -p
  18. ] [
  19. .B "-s \f2srvname\fP
  20. ]
  21. .I system
  22. .I file
  23. [
  24. .I mountpoint
  25. ]
  26. .SH DESCRIPTION
  27. .I Import
  28. allows an arbitrary
  29. .I file
  30. on a remote
  31. .I system
  32. to be imported into the local name space.
  33. Usually
  34. .I file
  35. is a directory, so the complete
  36. file tree under the directory is made available.
  37. .PP
  38. A process is started on the
  39. remote machine, with authority of the user of
  40. .IR import ,
  41. to perform work for the local machine using the
  42. .IR exportfs (4)
  43. service.
  44. If
  45. .I mountpoint
  46. is omitted
  47. .I import
  48. uses the name of the remote
  49. .I file
  50. as the local mount point.
  51. .PP
  52. If
  53. .I file
  54. is a directory,
  55. .I import
  56. allows options exactly as in
  57. .I mount
  58. and
  59. .IR bind (1)
  60. to control the construction of union directories.
  61. .PP
  62. The
  63. .B -E
  64. option causes
  65. .I import
  66. to push an authentication protocol on its network connection.
  67. Currently, the protocols supported are
  68. .B clear
  69. (the default) which pushes no protocol,
  70. and
  71. .BR ssl .
  72. There are plans to make
  73. .B tls
  74. available too.
  75. .PP
  76. The
  77. .B -e
  78. option specifies the encryption and authentication algorithms to use for
  79. encrypting the wire traffic. The defaults are
  80. .B rc4_256
  81. and
  82. .BR sha1 .
  83. The full list of supported protocols in in
  84. .IR ssl (3).
  85. .PP
  86. The
  87. .B -p
  88. option pushes the
  89. .B aan
  90. filter onto the connection. This filter will protect the connection from
  91. temporary network outages; see
  92. .IR aan (1).
  93. .PP
  94. The
  95. .B -s
  96. option posts the connection's mountable file descriptor in
  97. .B /srv
  98. under the given name.
  99. .PP
  100. The
  101. .B -k
  102. option specifies a key pattern suffix to be used in the
  103. .B auth_proxy
  104. call that authenticates to the remote side.
  105. .SH EXAMPLE
  106. Assume a machine
  107. .B kremvax
  108. that has IP interfaces for the company intranet and the global
  109. internet mounted on
  110. .I /net
  111. and
  112. .I /net.alt
  113. respectively.
  114. Any machine inside the company can get telnet out to the global
  115. internet using:
  116. .IP
  117. .EX
  118. import -a kremvax /net.alt
  119. telnet /net.alt/tcp!ucbvax
  120. .EE
  121. .SH SOURCE
  122. .B /sys/src/cmd/import.c
  123. .SH SEE ALSO
  124. .IR bind (1),
  125. .IR aan (1),
  126. .IR exportfs (4),
  127. .IR ssl (3),
  128. .B cs
  129. in
  130. .IR ndb (8)