From patchwork Wed Jan 28 14:07:20 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Dickson X-Patchwork-Id: 5729851 Return-Path: X-Original-To: patchwork-linux-nfs@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 764BFBF440 for ; Wed, 28 Jan 2015 20:40:36 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id BAEF120221 for ; Wed, 28 Jan 2015 20:40:35 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id C2D4B201BB for ; Wed, 28 Jan 2015 20:40:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759528AbbA1Uka (ORCPT ); Wed, 28 Jan 2015 15:40:30 -0500 Received: from mx1.redhat.com ([209.132.183.28]:10624 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759492AbbA1Uk3 (ORCPT ); Wed, 28 Jan 2015 15:40:29 -0500 Received: from int-mx14.intmail.prod.int.phx2.redhat.com (int-mx14.intmail.prod.int.phx2.redhat.com [10.5.11.27]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t0SE7RnV031501 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) for ; Wed, 28 Jan 2015 09:07:27 -0500 Received: from smallhat.boston.devel.redhat.com (vpn-58-65.rdu2.redhat.com [10.10.58.65]) by int-mx14.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t0SE7Oxm020173 for ; Wed, 28 Jan 2015 09:07:26 -0500 From: Steve Dickson To: Linux NFS Mailing list Subject: [PATCH 2/4] svcgssd: Disable support for the rpcsec_gss server by default Date: Wed, 28 Jan 2015 09:07:20 -0500 Message-Id: <1422454042-12840-3-git-send-email-steved@redhat.com> In-Reply-To: <1422454042-12840-1-git-send-email-steved@redhat.com> References: <1422454042-12840-1-git-send-email-steved@redhat.com> X-Scanned-By: MIMEDefang 2.68 on 10.5.11.27 Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, T_RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP At this point the gssproxy is better option than the svcgssd so the support is off by default. Use --enable-svcgss to re-enable the support Signed-off-by: Steve Dickson --- configure.ac | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/configure.ac b/configure.ac index 72055be..3feb0b3 100644 --- a/configure.ac +++ b/configure.ac @@ -115,9 +115,9 @@ AC_ARG_ENABLE(gss, AC_ARG_ENABLE(svcgss, [AC_HELP_STRING([--enable-svcgss], - [enable building svcgssd for rpcsec_gss server support @<:@default=yes@:>@])], + [enable building svcgssd for rpcsec_gss server support @<:@default=no@:>@])], enable_svcgss=$enableval, - enable_svcgss=yes) + enable_svcgss=no) if test "$enable_gss" = yes -a "$enable_svcgss" = yes; then SVCGSSD=svcgssd else