X-Git-Url: https://mattmccutchen.net/rsync/rsync.git/blobdiff_plain/2907884f940e3e053f9cacc336dc6ae902585ef8..bec617b934dc2ef90b7acd1c7ef4b5db74821e91:/rsyncd.conf.yo diff --git a/rsyncd.conf.yo b/rsyncd.conf.yo index 54827294..665dcd3a 100644 --- a/rsyncd.conf.yo +++ b/rsyncd.conf.yo @@ -52,9 +52,6 @@ write the appropriate data, log, and lock files. You can launch it either via inetd, as a stand-alone daemon, or from an rsync client via a remote shell. If run as a stand-alone daemon then just run the command "bf(rsync --daemon)" from a suitable startup script. -If run from an rsync client via a remote shell (by specifying both the -bf(--rsh) (bf(-e)) option and daemon mode with "::" or "rsync://"), the bf(--daemon) -option is automatically passed to the remote side. When run via inetd you should add a line like this to /etc/services: @@ -457,6 +454,35 @@ of the patterns will not be compressed during transfer. The default setting is tt(*.gz *.tgz *.zip *.z *.rpm *.deb *.iso *.bz2 *.tbz) +dit(bf(pre-xfer exec), bf(post-xfer exec)) You may specify a command to be run +before and/or after the transfer. If the bf(pre-xfer exec) command fails, the +transfer is aborted before it begins. + +The following environment variables are set for both commands: + +quote(itemize( + it() bf(RSYNC_MODULE_NAME): The name of the module being accessed. + it() bf(RSYNC_MODULE_PATH): The path configured for the module. + it() bf(RSYNC_HOST_ADDR): The accessing host's IP address. + it() bf(RSYNC_HOST_NAME): The accessing host's name. + it() bf(RSYNC_USER_NAME): The accessing user's name (empty if no user). +)) + +These environment variables will also be set for the bf(post-xfer exec) +command: + +quote(itemize( + it() bf(RSYNC_EXIT_STATUS): rsync's exit value. This will be 0 for a + successful run, a positive value for an error that rsync returned + (e.g. 23=partial xfer), or a -1 if rsync failed to exit properly. + it() bf(RSYNC_RAW_STATUS): the raw exit value from waitpid(). +)) + +Even though the commands can be associated with a particular module, they +are run using the permissions of the user that started the daemon (not the +module's uid/gid setting) without any chroot restrictions (even if the +module will/has run chroot()ed). + enddit() manpagesection(AUTHENTICATION STRENGTH)