Blame


1 ac3ba726 2012-09-24 rsc .TH 9IMPORT 4
2 ac3ba726 2012-09-24 rsc .SH NAME
3 ac3ba726 2012-09-24 rsc 9import \- import a name space from a remote system
4 ac3ba726 2012-09-24 rsc .SH SYNOPSIS
5 ac3ba726 2012-09-24 rsc .B 9import
6 ac3ba726 2012-09-24 rsc [
7 ac3ba726 2012-09-24 rsc .I options
8 ac3ba726 2012-09-24 rsc ]
9 ac3ba726 2012-09-24 rsc .I system
10 ac3ba726 2012-09-24 rsc .I file
11 ac3ba726 2012-09-24 rsc [
12 ac3ba726 2012-09-24 rsc .I mountpoint
13 ac3ba726 2012-09-24 rsc ]
14 ac3ba726 2012-09-24 rsc .SH DESCRIPTION
15 ac3ba726 2012-09-24 rsc The
16 ac3ba726 2012-09-24 rsc .I 9import
17 ac3ba726 2012-09-24 rsc tool allows an arbitrary
18 ac3ba726 2012-09-24 rsc .I file
19 ac3ba726 2012-09-24 rsc on a remote
20 ac3ba726 2012-09-24 rsc .I system,
21 ac3ba726 2012-09-24 rsc with the capability of running the Plan 9
22 d32deab1 2020-08-16 rsc .MR exportfs (4)
23 ac3ba726 2012-09-24 rsc service,
24 ac3ba726 2012-09-24 rsc to be imported into the local name space.
25 ac3ba726 2012-09-24 rsc Usually
26 ac3ba726 2012-09-24 rsc .I file
27 ac3ba726 2012-09-24 rsc is a directory, so the complete
28 ac3ba726 2012-09-24 rsc file tree under the directory is made available.
29 ac3ba726 2012-09-24 rsc .PP
30 ac3ba726 2012-09-24 rsc A process is started on the
31 ac3ba726 2012-09-24 rsc remote machine, with authority of the user of
32 ac3ba726 2012-09-24 rsc .IR 9import ,
33 ac3ba726 2012-09-24 rsc to perform work for the local machine using the
34 d32deab1 2020-08-16 rsc .MR exportfs (4)
35 ac3ba726 2012-09-24 rsc service.
36 ac3ba726 2012-09-24 rsc The default port used is TCP 17007.
37 ac3ba726 2012-09-24 rsc If
38 ac3ba726 2012-09-24 rsc .I mountpoint
39 ac3ba726 2012-09-24 rsc is omitted, then
40 ac3ba726 2012-09-24 rsc .I 9import
41 ac3ba726 2012-09-24 rsc uses the name of the remote
42 ac3ba726 2012-09-24 rsc .I file
43 ac3ba726 2012-09-24 rsc as the local mount point.
44 ac3ba726 2012-09-24 rsc .PP
45 ac3ba726 2012-09-24 rsc The options are:
46 ac3ba726 2012-09-24 rsc .TF "-s namexxx"
47 ac3ba726 2012-09-24 rsc .PD
48 ac3ba726 2012-09-24 rsc .TP
49 ac3ba726 2012-09-24 rsc .B -A
50 ac3ba726 2012-09-24 rsc Skip the authentication protocol.
51 ac3ba726 2012-09-24 rsc This is useful for connecting to foreign systems like Inferno.
52 ac3ba726 2012-09-24 rsc .TP
53 ac3ba726 2012-09-24 rsc .B -k \fIkeypattern
54 ac3ba726 2012-09-24 rsc Use
55 ac3ba726 2012-09-24 rsc .I keypattern
56 ac3ba726 2012-09-24 rsc to select a key to authenticate to the remote side
57 ac3ba726 2012-09-24 rsc (see
58 d32deab1 2020-08-16 rsc .MR auth (2) ).
59 ac3ba726 2012-09-24 rsc .TP
60 ac3ba726 2012-09-24 rsc .B -p
61 ac3ba726 2012-09-24 rsc Push the
62 d32deab1 2020-08-16 rsc .MR aan (8)
63 ac3ba726 2012-09-24 rsc filter onto the connection to protect against
64 ac3ba726 2012-09-24 rsc temporary network outages.
65 ac3ba726 2012-09-24 rsc .TP
66 ac3ba726 2012-09-24 rsc .B -s \fIname
67 ac3ba726 2012-09-24 rsc Post the connection's mountable file descriptor as
68 ac3ba726 2012-09-24 rsc .BI /srv/ name\fR.
69 ac3ba726 2012-09-24 rsc .SH SOURCE
70 ac3ba726 2012-09-24 rsc .B \*9/src/cmd/9import.c
71 ac3ba726 2012-09-24 rsc .SH SEE ALSO
72 d32deab1 2020-08-16 rsc .MR srv (4) ,
73 d32deab1 2020-08-16 rsc .MR aan (8) ,
74 d32deab1 2020-08-16 rsc .MR listen1 (8) ,
75 ac3ba726 2012-09-24 rsc .B cs
76 ac3ba726 2012-09-24 rsc in
77 d32deab1 2020-08-16 rsc .MR ndb (7)
78 ac3ba726 2012-09-24 rsc .SH BUGS
79 ac3ba726 2012-09-24 rsc Encryption is not implemented.