summaryrefslogtreecommitdiffstats
path: root/templates/man5/exports.5.pot
diff options
context:
space:
mode:
Diffstat (limited to 'templates/man5/exports.5.pot')
-rw-r--r--templates/man5/exports.5.pot1257
1 files changed, 1257 insertions, 0 deletions
diff --git a/templates/man5/exports.5.pot b/templates/man5/exports.5.pot
new file mode 100644
index 00000000..93a74d00
--- /dev/null
+++ b/templates/man5/exports.5.pot
@@ -0,0 +1,1257 @@
+# SOME DESCRIPTIVE TITLE
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the PACKAGE package.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: PACKAGE VERSION\n"
+"POT-Creation-Date: 2024-02-15 17:58+0100\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: TH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "exports"
+msgstr ""
+
+#. type: TH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "31 December 2009"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NAME"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "exports - NFS server export table"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "DESCRIPTION"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The file I</etc/exports> contains a table of local physical file systems on "
+"an NFS server that are accessible to NFS clients. The contents of the file "
+"are maintained by the server's system administrator."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Each file system in this table has a list of options and an access control "
+"list. The table is used by B<exportfs>(8) to give information to "
+"B<mountd>(8)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The file format is similar to the SunOS I<exports> file. Each line contains "
+"an export point and a whitespace-separated list of clients allowed to mount "
+"the file system at that point. Each listed client may be immediately "
+"followed by a parenthesized, comma-separated list of export options for that "
+"client. No whitespace is permitted between a client and its option list."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Also, each line may have one or more specifications for default options "
+"after the path name, in the form of a dash (\"-\") followed by an option "
+"list. The option list is used for all subsequent exports on that line only."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Blank lines are ignored. A pound sign (\"#\") introduces a comment to the "
+"end of the line. Entries may be continued across newlines using a backslash. "
+"If an export name contains spaces it should be quoted using double quotes. "
+"You can also specify spaces or other unusual character in the export name "
+"using a backslash followed by the character code as three octal digits."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"To apply changes to this file, run B<exportfs -ra> or restart the NFS server."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Machine Name Formats"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "NFS clients may be specified in a number of ways:"
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "single host"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"You may specify a host either by an abbreviated name recognized be the "
+"resolver, the fully qualified domain name, an IPv4 address, or an IPv6 "
+"address. IPv6 addresses must not be inside square brackets in /etc/exports "
+"lest they be confused with character-class wildcard matches."
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "IP networks"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"You can also export directories to all hosts on an IP (sub-) network "
+"simultaneously. This is done by specifying an IP address and netmask pair as "
+"I<address/netmask> where the netmask can be specified in dotted-decimal "
+"format, or as a contiguous mask length. For example, either "
+"`/255.255.252.0' or `/22' appended to the network base IPv4 address results "
+"in identical subnetworks with 10 bits of host. IPv6 addresses must use a "
+"contiguous mask length and must not be inside square brackets to avoid "
+"confusion with character-class wildcards. Wildcard characters generally do "
+"not work on IP addresses, though they may work by accident when reverse DNS "
+"lookups fail."
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "wildcards"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Machine names may contain the wildcard characters I<*> and I<?>, or may "
+"contain character class lists within [square brackets]. This can be used to "
+"make the I<exports> file more compact; for instance, I<*.cs.foo.edu> matches "
+"all hosts in the domain I<cs.foo.edu>. As these characters also match the "
+"dots in a domain name, the given pattern will also match all hosts within "
+"any subdomain of I<cs.foo.edu>."
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "netgroups"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"NIS netgroups may be given as I<@group>. Only the host part of each "
+"netgroup members is consider in checking for membership. Empty host parts "
+"or those containing a single dash (-) are ignored."
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "anonymous"
+msgstr ""
+
+#. .TP
+#. .B =public
+#. This is a special ``hostname'' that identifies the given directory name
+#. as the public root directory (see the section on WebNFS in
+#. .BR nfsd (8)
+#. for a discussion of WebNFS and the public root handle). When using this
+#. convention,
+#. .B =public
+#. must be the only entry on this line, and must have no export options
+#. associated with it. Note that this does
+#. .I not
+#. actually export the named directory; you still have to set the exports
+#. options in a separate entry.
+#. .PP
+#. The public root path can also be specified by invoking
+#. .I nfsd
+#. with the
+#. .B \-\-public\-root
+#. option. Multiple specifications of a public root will be ignored.
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This is specified by a single I<*> character (not to be confused with the "
+"I<wildcard> entry above) and will match all clients."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If a client matches more than one of the specifications above, then the "
+"first match from the above list order takes precedence - regardless of the "
+"order they appear on the export line. However, if a client matches more than "
+"one of the same type of specification (e.g. two netgroups), then the first "
+"match from the order they appear on the export line takes precedence."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "RPCSEC_GSS security"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"You may use the special strings \"gss/krb5\", \"gss/krb5i\", or \"gss/"
+"krb5p\" to restrict access to clients using rpcsec_gss security. However, "
+"this syntax is deprecated; on linux kernels since 2.6.23, you should instead "
+"use the \"sec=\" export option:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<sec=>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The sec= option, followed by a colon-delimited list of security flavors, "
+"restricts the export to clients using those flavors. Available security "
+"flavors include sys (the default--no cryptographic security), krb5 "
+"(authentication only), krb5i (integrity protection), and krb5p (privacy "
+"protection). For the purposes of security flavor negotiation, order counts: "
+"preferred flavors should be listed first. The order of the sec= option with "
+"respect to the other options does not matter, unless you want some options "
+"to be enforced differently depending on flavor. In that case you may "
+"include multiple sec= options, and following options will be enforced only "
+"for access using flavors listed in the immediately preceding sec= option. "
+"The only options that are permitted to vary in this way are ro, rw, "
+"no_root_squash, root_squash, and all_squash."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "Transport layer security"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The Linux NFS server allows the use of RPC-with-TLS (RFC 9289) to protect "
+"RPC traffic between itself and its clients. Alternately, administrators can "
+"secure NFS traffic using a VPN, or an ssh tunnel or similar mechanism, in a "
+"way that is transparent to the server."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"To enable the use of RPC-with-TLS, the server's administrator must install "
+"and configure B<tlshd> to handle transport layer security handshake requests "
+"from the local kernel. Clients can then choose to use RPC-with-TLS or they "
+"may continue operating without it."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"Administrators may require the use of RPC-with-TLS to protect access to "
+"individual exports. This is particularly useful when using non-"
+"cryptographic security flavors such as I<sec=sys>. The I<xprtsec=> option, "
+"followed by an unordered colon-delimited list of security policies, can "
+"restrict access to the export to only clients that have negotiated transport-"
+"layer security. Currently supported transport layer security policies "
+"include:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I<none>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The server permits clients to access the export without the use of transport "
+"layer security."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I<tls>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The server permits clients that have negotiated an RPC-with-TLS session "
+"without peer authentication (confidentiality only) to access the export. "
+"Clients are not required to offer an x.509 certificate when establishing a "
+"transport layer security session."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I<mtls>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The server permits clients that have negotiated an RPC-with-TLS session with "
+"peer authentication to access the export. The server requires clients to "
+"offer an x.509 certificate when establishing a transport layer security "
+"session."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"If RPC-with-TLS is configured and enabled and the I<xprtsec=> option is not "
+"specified, the default setting for an export is I<xprtsec=none:tls:mtls>. "
+"With this setting, the server permits clients to use any transport layer "
+"security mechanism or none at all to access the export."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "General Options"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "B<exportfs> understands the following export options:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<secure>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"This option requires that requests not using gss originate on an Internet "
+"port less than IPPORT_RESERVED (1024). This option is on by default. To "
+"turn it off, specify I<insecure>. (NOTE: older kernels (before upstream "
+"kernel version 4.17) enforced this requirement on gss requests as well.)"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<rw>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Allow both read and write requests on this NFS volume. The default is to "
+"disallow any request which changes the filesystem. This can also be made "
+"explicit by using the I<ro> option."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<async>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option allows the NFS server to violate the NFS protocol and reply to "
+"requests before any changes made by that request have been committed to "
+"stable storage (e.g. disc drive)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Using this option usually improves performance, but at the cost that an "
+"unclean server restart (i.e. a crash) can cause data to be lost or corrupted."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<sync>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Reply to requests only after the changes have been committed to stable "
+"storage (see I<async> above)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"In releases of nfs-utils up to and including 1.0.0, the I<async> option was "
+"the default. In all releases after 1.0.0, I<sync> is the default, and "
+"I<async> must be explicitly requested if needed."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<no_wdelay>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option has no effect if I<async> is also set. The NFS server will "
+"normally delay committing a write request to disc slightly if it suspects "
+"that another related write request may be in progress or may arrive soon. "
+"This allows multiple write requests to be committed to disc with the one "
+"operation which can improve performance. If an NFS server received mainly "
+"small unrelated requests, this behaviour could actually reduce performance, "
+"so I<no_wdelay> is available to turn it off. The default can be explicitly "
+"requested with the I<wdelay> option."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<nohide>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option is based on the option of the same name provided in IRIX NFS. "
+"Normally, if a server exports two filesystems one of which is mounted on the "
+"other, then the client will have to mount both filesystems explicitly to get "
+"access to them. If it just mounts the parent, it will see an empty "
+"directory at the place where the other filesystem is mounted. That "
+"filesystem is \"hidden\"."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Setting the I<nohide> option on a filesystem causes it not to be hidden, and "
+"an appropriately authorised client will be able to move from the parent to "
+"that filesystem without noticing the change."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"However, some NFS clients do not cope well with this situation as, for "
+"instance, it is then possible for two files in the one apparent filesystem "
+"to have the same inode number."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The I<nohide> option is currently only effective on I<single host> exports. "
+"It does not work reliably with netgroup, subnet, or wildcard exports."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option can be very useful in some situations, but it should be used "
+"with due care, and only after confirming that the client system copes with "
+"the situation effectively."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "The option can be explicitly disabled for NFSv2 and NFSv3 with I<hide>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option is not relevant when NFSv4 is use. NFSv4 never hides "
+"subordinate filesystems. Any filesystem that is exported will be visible "
+"where expected when using NFSv4."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<crossmnt>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option is similar to I<nohide> but it makes it possible for clients to "
+"access all filesystems mounted on a filesystem marked with I<crossmnt>. "
+"Thus when a child filesystem \"B\" is mounted on a parent \"A\", setting "
+"crossmnt on \"A\" has a similar effect to setting \"nohide\" on B."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"With I<nohide> the child filesystem needs to be explicitly exported. With "
+"I<crossmnt> it need not. If a child of a I<crossmnt> file is not explicitly "
+"exported, then it will be implicitly exported with the same export options "
+"as the parent, except for I<fsid=>. This makes it impossible to B<not> "
+"export a child of a I<crossmnt> filesystem. If some but not all subordinate "
+"filesystems of a parent are to be exported, then they must be explicitly "
+"exported and the parent should not have I<crossmnt> set."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable mageia-cauldron opensuse-leap-15-6
+#: opensuse-tumbleweed
+msgid ""
+"The I<nocrossmnt> option can explictly disable I<crossmnt> if it was "
+"previously set. This is rarely useful."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<no_subtree_check>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option disables subtree checking, which has mild security implications, "
+"but can improve reliability in some circumstances."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If a subdirectory of a filesystem is exported, but the whole filesystem "
+"isn't then whenever a NFS request arrives, the server must check not only "
+"that the accessed file is in the appropriate filesystem (which is easy) but "
+"also that it is in the exported tree (which is harder). This check is called "
+"the I<subtree_check>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"In order to perform this check, the server must include some information "
+"about the location of the file in the \"filehandle\" that is given to the "
+"client. This can cause problems with accessing files that are renamed while "
+"a client has them open (though in many simple cases it will still work)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"subtree checking is also used to make sure that files inside directories to "
+"which only root has access can only be accessed if the filesystem is "
+"exported with I<no_root_squash> (see below), even if the file itself allows "
+"more general access."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"As a general guide, a home directory filesystem, which is normally exported "
+"at the root and may see lots of file renames, should be exported with "
+"subtree checking disabled. A filesystem which is mostly readonly, and at "
+"least doesn't see many file renames (e.g. /usr or /var) and for which "
+"subdirectories may be exported, should probably be exported with subtree "
+"checks enabled."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The default of having subtree checks enabled, can be explicitly requested "
+"with I<subtree_check>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"From release 1.1.0 of nfs-utils onwards, the default will be "
+"I<no_subtree_check> as subtree_checking tends to cause more problems than it "
+"is worth. If you genuinely require subtree checking, you should explicitly "
+"put that option in the B<exports> file. If you put neither option, "
+"B<exportfs> will warn you that the change is pending."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<insecure_locks>"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<no_auth_nlm>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option (the two names are synonymous) tells the NFS server not to "
+"require authentication of locking requests (i.e. requests which use the NLM "
+"protocol). Normally the NFS server will require a lock request to hold a "
+"credential for a user who has read access to the file. With this flag no "
+"access checks will be performed."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Early NFS client implementations did not send credentials with lock "
+"requests, and many current NFS clients still exist which are based on the "
+"old implementations. Use this flag if you find that you can only lock files "
+"which are world readable."
+msgstr ""
+
+#. .TP
+#. .I noaccess
+#. This makes everything below the directory inaccessible for the named
+#. client. This is useful when you want to export a directory hierarchy to
+#. a client, but exclude certain subdirectories. The client's view of a
+#. directory flagged with noaccess is very limited; it is allowed to read
+#. its attributes, and lookup `.' and `..'. These are also the only entries
+#. returned by a readdir.
+#. .TP
+#. .IR link_relative
+#. Convert absolute symbolic links (where the link contents start with a
+#. slash) into relative links by prepending the necessary number of ../'s
+#. to get from the directory containing the link to the root on the
+#. server. This has subtle, perhaps questionable, semantics when the file
+#. hierarchy is not mounted at its root.
+#. .TP
+#. .IR link_absolute
+#. Leave all symbolic link as they are. This is the default operation.
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The default behaviour of requiring authentication for NLM requests can be "
+"explicitly requested with either of the synonymous I<auth_nlm>, or "
+"I<secure_locks>."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<mountpoint=>path"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<mp>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option makes it possible to only export a directory if it has "
+"successfully been mounted. If no path is given (e.g. I<mountpoint> or "
+"I<mp>) then the export point must also be a mount point. If it isn't then "
+"the export point is not exported. This allows you to be sure that the "
+"directory underneath a mountpoint will never be exported by accident if, for "
+"example, the filesystem failed to mount due to a disc error."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If a path is given (e.g. I<mountpoint=>/path or I<mp=>/path) then the "
+"nominated path must be a mountpoint for the exportpoint to be exported."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<fsid=>num|root|uuid"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"NFS needs to be able to identify each filesystem that it exports. Normally "
+"it will use a UUID for the filesystem (if the filesystem has such a thing) "
+"or the device number of the device holding the filesystem (if the filesystem "
+"is stored on the device)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"As not all filesystems are stored on devices, and not all filesystems have "
+"UUIDs, it is sometimes necessary to explicitly tell NFS how to identify a "
+"filesystem. This is done with the I<fsid=> option."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"For NFSv4, there is a distinguished filesystem which is the root of all "
+"exported filesystem. This is specified with I<fsid=root> or I<fsid=0> both "
+"of which mean exactly the same thing."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Other filesystems can be identified with a small integer, or a UUID which "
+"should contain 32 hex digits and arbitrary punctuation."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Linux kernels version 2.6.20 and earlier do not understand the UUID setting "
+"so a small integer must be used if an fsid option needs to be set for such "
+"kernels. Setting both a small number and a UUID is supported so the same "
+"configuration can be made to work on old and new kernels alike."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<nordirplus>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This option will disable READDIRPLUS request handling. When set, "
+"READDIRPLUS requests from NFS clients return NFS3ERR_NOTSUPP, and clients "
+"fall back on READDIR. This option affects only NFSv3 clients."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<refer=>path@host[+host][:path@host[+host]]"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"A client referencing the export point will be directed to choose from the "
+"given list an alternative location for the filesystem. (Note that the "
+"server must have a mountpoint here, though a different filesystem is not "
+"required; so, for example, I<mount --bind> /path /path is sufficient.)"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<replicas=>path@host[+host][:path@host[+host]]"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If the client asks for alternative locations for the export point, it will "
+"be given this list of alternatives. (Note that actual replication of the "
+"filesystem must be handled elsewhere.)"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<pnfs>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"This option enables the use of the pNFS extension if the protocol level is "
+"NFSv4.1 or higher, and the filesystem supports pNFS exports. With pNFS "
+"clients can bypass the server and perform I/O directly to storage devices. "
+"The default can be explicitly requested with the I<no_pnfs> option."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<security_label>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"With this option set, clients using NFSv4.2 or higher will be able to set "
+"and retrieve security labels (such as those used by SELinux). This will "
+"only work if all clients use a consistent security policy. Note that early "
+"kernels did not support this export option, and instead enabled security "
+"labels by default."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+#, no-wrap
+msgid "I<reexport=>auto-fsidnum|predefined-fsidnum"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"This option helps when a NFS share is re-exported. Since the NFS server "
+"needs a unique identifier for each exported filesystem and a NFS share "
+"cannot provide such, usually a manual fsid is needed. As soon I<crossmnt> "
+"is used manually assigning fsid won't work anymore. This is where this "
+"option becomes handy. It will automatically assign a numerical fsid to "
+"exported NFS shares. The fsid and path relations are stored in a SQLite "
+"database. If I<auto-fsidnum> is selected, the fsid is also autmatically "
+"allocated. I<predefined-fsidnum> assumes pre-allocated fsid numbers and "
+"will just look them up. This option depends also on the kernel, you will "
+"need at least kernel version 5.19. Since I<reexport=> can automatically "
+"allocate and assign numerical fsids, it is no longer possible to have "
+"numerical fsids in other exports as soon this option is used in at least one "
+"export entry."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"The association between fsid numbers and paths is stored in a SQLite "
+"database. Don't edit or remove the database unless you know exactly what "
+"you're doing. I<predefined-fsidnum> is useful when you have used I<auto-"
+"fsidnum> before and don't want further entries stored."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "User ID Mapping"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"B<nfsd> bases its access control to files on the server machine on the uid "
+"and gid provided in each NFS RPC request. The normal behavior a user would "
+"expect is that she can access her files on the server just as she would on a "
+"normal file system. This requires that the same uids and gids are used on "
+"the client and the server machine. This is not always true, nor is it always "
+"desirable."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Very often, it is not desirable that the root user on a client machine is "
+"also treated as root when accessing files on the NFS server. To this end, "
+"uid 0 is normally mapped to a different id: the so-called anonymous or "
+"I<nobody> uid. This mode of operation (called `root squashing') is the "
+"default, and can be turned off with I<no_root_squash>."
+msgstr ""
+
+#. .B nfsd
+#. tries to obtain the anonymous uid and gid by looking up user
+#. .I nobody
+#. in the password file at startup time. If it isn't found, a uid and gid
+#. .PP
+#. In addition to this,
+#. .B nfsd
+#. lets you specify arbitrary uids and gids that should be mapped to user
+#. nobody as well.
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"By default, B<exportfs> chooses a uid and gid of 65534 for squashed access. "
+"These values can also be overridden by the I<anonuid> and I<anongid> "
+"options. Finally, you can map all user requests to the anonymous uid by "
+"specifying the I<all_squash> option."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Here's the complete list of mapping options:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<root_squash>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Map requests from uid/gid 0 to the anonymous uid/gid. Note that this does "
+"not apply to any other uids or gids that might be equally sensitive, such as "
+"user I<bin> or group I<staff>."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<no_root_squash>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Turn off root squashing. This option is mainly useful for diskless clients."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<all_squash>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Map all uids and gids to the anonymous user. Useful for NFS-exported public "
+"FTP directories, news spool directories, etc. The opposite option is "
+"I<no_all_squash>, which is the default setting."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<anonuid> and I<anongid>"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"These options explicitly set the uid and gid of the anonymous account. This "
+"option is primarily useful for PC/NFS clients, where you might want all "
+"requests appear to be from one user. As an example, consider the export "
+"entry for B</home/joe> in the example section below, which maps all requests "
+"to uid 150 (which is supposedly that of user joe)."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+#, no-wrap
+msgid "Subdirectory Exports"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"Normally you should only export only the root of a filesystem. The NFS "
+"server will also allow you to export a subdirectory of a filesystem, "
+"however, this has drawbacks:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"First, it may be possible for a malicious user to access files on the "
+"filesystem outside of the exported subdirectory, by guessing filehandles for "
+"those other files. The only way to prevent this is by using the "
+"I<no_subtree_check> option, which can cause other problems."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-tumbleweed
+msgid ""
+"Second, export options may not be enforced in the way that you would "
+"expect. For example, the I<security_label> option will not work on "
+"subdirectory exports, and if nested subdirectory exports change the "
+"I<security_label> or I<sec=> options, NFSv4 clients will normally see only "
+"the options on the parent export. Also, where security options differ, a "
+"malicious client may use filehandle-guessing attacks to access the files "
+"from one subdirectory using the options from another."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Extra Export Tables"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"After reading I</etc/exports> B<exportfs> reads files in the I</etc/exports."
+"d> directory as extra export tables. Only files ending in I<.exports> are "
+"considered. Files beginning with a dot are ignored. The format for extra "
+"export tables is the same as I</etc/exports>"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "EXAMPLE"
+msgstr ""
+
+#. type: ta
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "+3i"
+msgstr ""
+
+#. /pub/private (noaccess)
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"# sample /etc/exports file\n"
+"/ master(rw) trusty(rw,no_root_squash)\n"
+"/projects proj*.local.domain(rw)\n"
+"/usr *.local.domain(ro) @trusted(rw)\n"
+"/home/joe pc001(rw,all_squash,anonuid=150,anongid=100)\n"
+"/pub *(ro,insecure,all_squash)\n"
+"/srv/www -sync,rw server @trusted @external(ro)\n"
+"/foo 2001:db8:9:e54::/64(rw) 192.0.2.0/24(rw)\n"
+"/build buildhost[0-9].local.domain(rw)\n"
+msgstr ""
+
+#. The last line denies all NFS clients
+#. access to the private directory.
+#. .SH CAVEATS
+#. Unlike other NFS server implementations, this
+#. .B nfsd
+#. allows you to export both a directory and a subdirectory thereof to
+#. the same host, for instance
+#. .IR /usr " and " /usr/X11R6 .
+#. In this case, the mount options of the most specific entry apply. For
+#. instance, when a user on the client host accesses a file in
+#. .IR /usr/X11R6 ,
+#. the mount options given in the
+#. .I /usr/X11R6
+#. entry apply. This is also true when the latter is a wildcard or netgroup
+#. entry.
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The first line exports the entire filesystem to machines master and trusty. "
+"In addition to write access, all uid squashing is turned off for host "
+"trusty. The second and third entry show examples for wildcard hostnames and "
+"netgroups (this is the entry `@trusted'). The fourth line shows the entry "
+"for the PC/NFS client discussed above. Line 5 exports the public FTP "
+"directory to every host in the world, executing all requests under the "
+"nobody account. The I<insecure> option in this entry also allows clients "
+"with NFS implementations that don't use a reserved port for NFS. The sixth "
+"line exports a directory read-write to the machine 'server' as well as the "
+"`@trusted' netgroup, and read-only to netgroup `@external', all three mounts "
+"with the `sync' option enabled. The seventh line exports a directory to both "
+"an IPv6 and an IPv4 subnet. The eighth line demonstrates a character class "
+"wildcard match."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "FILES"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "/etc/exports /etc/exports.d"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SEE ALSO"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-tumbleweed
+msgid ""
+"B<exportfs>(8), B<netgroup>(5), B<mountd>(8), B<nfsd>(8), B<showmount>(8), "
+"B<tlshd>(8)."
+msgstr ""
+
+#. type: Plain text
+#: debian-bookworm opensuse-leap-15-6
+msgid ""
+"B<exportfs>(8), B<netgroup>(5), B<mountd>(8), B<nfsd>(8), B<showmount>(8)."
+msgstr ""
+
+#. type: Plain text
+#: fedora-40 fedora-rawhide
+msgid ""
+"The I<nocrossmnt> option can explicitly disable I<crossmnt> if it was "
+"previously set. This is rarely useful."
+msgstr ""
+
+#. type: Plain text
+#: opensuse-leap-15-6
+msgid ""
+"This option requires that requests originate on an Internet port less than "
+"IPPORT_RESERVED (1024). This option is on by default. To turn it off, "
+"specify I<insecure>."
+msgstr ""
+
+#. type: Plain text
+#: opensuse-leap-15-6
+msgid ""
+"In releases of nfs-utils up to and including 1.0.0, the I<async> option was "
+"the default. In all releases after 1.0.0, I<sync> is the default, and "
+"I<async> must be explicitly requested if needed. To help make system "
+"administrators aware of this change, B<exportfs> will issue a warning if "
+"neither I<sync> nor I<async> is specified."
+msgstr ""
+
+#. type: Plain text
+#: opensuse-leap-15-6
+msgid ""
+"This option allows enables the use of pNFS extension if protocol level is "
+"NFSv4.1 or higher, and the filesystem supports pNFS exports. With pNFS "
+"clients can bypass the server and perform I/O directly to storage devices. "
+"The default can be explicitly requested with the I<no_pnfs> option."
+msgstr ""