1 .\" Copyright (c) 1995, 1996
2 .\" Bill Paul <wpaul@ctr.columbia.edu>. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by Bill Paul
15 .\" 4. Neither the name of the University nor the names of its contributors
16 .\" may be used to endorse or promote products derived from this software
17 .\" without specific prior written permission.
19 .\" THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND
20 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 .\" ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE
23 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 .Nd "generate the NIS databases"
50 .Op Fl o Ar outputfile
51 .Op Fl d Ar domainname
52 .Op Fl m Ar mastername
59 style databases for use with
69 format (using the hash table method).
70 The input should be in 'key data' format, which is to say
73 data separated by white space.
75 is assumed to be the key, and everything else is assumed to be
77 These databases are typically stored in
78 .Pa /var/yp/[domainname]
81 is the name of the NIS domain being served.
84 .Pa /var/yp/Makefile .
86 can also be used to dump an NIS database file so that its
87 contents can be examined.
88 For security reasons, all databases that
90 creates are readable and writable by owner only (and usually the
93 The following options are available:
94 .Bl -tag -width indent
98 to send a YPPROC_CLEAR request to
101 This signal tells the server to close any open
102 database descriptors and flush out its database cache.
104 this flag signals the server and does nothing else.
106 of a database creation command,
108 will send the signal only after the new database has been successfully
113 to add a special entry to the database with a key of
115 and an empty data field.
116 If this key is present in a map, it alters the
117 behavior of the 'match' procedure in
120 If a match query fails (because the server couldn't find
121 a record that matched the supplied key), and the
123 key exists within the queried map,
125 will try to match the entry again using a DNS lookup.
127 special behavior only applies to the
132 flag for other maps has no effect.
134 This flag is used to add a special entry to the database with a key of
136 and an empty data field.
137 If this key is present in a map,
139 will deny access to the map to any client that is not using a
140 reserved port for its query.
141 This is used mainly for the
143 maps, which should be restricted to privileged access only.
145 This flag is used to turn on filtering of lines in the source file
146 input that start with ``+'' or ``-'' characters.
148 have special meaning for the
153 maps and hence should not be allowed to appear in them as the first
154 character of a key or datum.
159 will reject any source line that starts with a ``+'' or ``-''
160 character and issue a warning message displaying the line that
163 Dump (or 'unwind') an NIS database.
164 This option can be used to
165 inspect the contents of an existing NIS database.
166 .It Fl i Ar inputfile
167 When generating an NIS map, encode
169 as a special entry in the database with a key of
171 .It Fl o Ar outputfile
172 When generating an NIS map, encode
174 as a special entry in the database with a key of
176 .It Fl d Ar domainname
177 When generating an NIS map, encode
179 as a special entry in the database with a key of
181 .It Fl m Ar mastername
182 When generating an NIS map, encode
184 as a special entry in the database with a key of
186 This entry in the database is frequently used by various NIS utilities
187 to determine the name of an NIS master server for a domain.
190 assumes that the local host is the NIS master; the
192 option is used to override this default.
195 .Bl -tag -width /var/yp/Makefile -compact
196 .It Pa /var/yp/Makefile
197 the Makefile that calls
199 to build the NIS databases
205 .An Bill Paul Aq wpaul@ctr.columbia.edu