diff options
author | Max Kellermann <max@duempel.org> | 2014-02-06 07:29:26 +0100 |
---|---|---|
committer | Max Kellermann <max@duempel.org> | 2014-02-06 18:37:27 +0100 |
commit | e4322a716c178ffa74bd56542ea6214c4d6845bb (patch) | |
tree | 16f81d41faf5a4b5f7e72aedff5497dc3eb8ccfc /doc | |
parent | 90886c07603854fe2b46e28890ad88222eea6933 (diff) |
input/nfs: new plugin using libnfs
Diffstat (limited to 'doc')
-rw-r--r-- | doc/user.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/doc/user.xml b/doc/user.xml index e73282277..db0e350c8 100644 --- a/doc/user.xml +++ b/doc/user.xml @@ -1153,6 +1153,35 @@ systemctl start mpd.socket</programlisting> </section> <section> + <title><varname>nfs</varname></title> + + <para> + Allows MPD to access files on NFSv3 servers without actually + mounting them (i.e. in userspace, without help from the + kernel's VFS layer). All URIs with the + <filename>nfs://</filename> scheme are used according to + <ulink + url="http://tools.ietf.org/html/rfc2224">RFC2224</ulink>. + Example: + </para> + + <para> + <filename>mpc add nfs://servername/path/filename.ogg</filename> + </para> + + <para> + Note that this usually requires enabling the "insecure" flag + in the server's <filename>/etc/exports</filename> file, + because MPD cannot bind to so-called "privileged" ports. + Don't fear: this will not make your file server insecure; + the flag was named in a time long ago when privileged ports + were thought to be meaningful for security. By today's + standards, NFSv3 is not secure at all, and if you believe it + is, you're already doomed. + </para> + </section> + + <section> <title><varname>smbclient</varname></title> <para> |