Decrypting afp mount strings

{10} andre@werk [~] % mount | grep /Volumes/andre
afp_006Af01nOUmc001Eic06SdO0-1.2c0000ae on /Volumes/andre (nodev, nosuid, mounted by andre)

Huh? how helpful is that! How can I tell what server it came from? Yeah, I could netstat, but what if there’s a bunch of AFP sessions open?

DisplayURL to the rescue!

{12} andre@werk [~] % ~dre/bin/DisplayURL /Volumes/andre 
url: "afp://idio.dreness.com/andre"
kCFURLComponentScheme: "afp" including separators: "afp://"
kCFURLComponentNetLocation: "idio.dreness.com" including separators: "://idio.dreness.com"
kCFURLComponentPath: "/andre" including separators: "/andre"
kCFURLComponentResourceSpecifier not found
kCFURLComponentUser not found
kCFURLComponentPassword not found
kCFURLComponentUserInfo not found
kCFURLComponentHost: "idio.dreness.com" including separators: "://idio.dreness.com"
kCFURLComponentPort not found
kCFURLComponentParameterString not found
kCFURLComponentQuery not found
kCFURLComponentFragment not found

fancy.

About dre

I like all kinds of food.
This entry was posted in OS X, OS X Server. Bookmark the permalink.

Leave a Reply