summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlexander Bokovoy <abokovoy@redhat.com>2011-09-12 14:06:55 +0300
committerRob Crittenden <rcritten@redhat.com>2011-09-11 20:29:28 -0400
commite638ba9d7f091ef9aeba5747fc872348671205bd (patch)
tree3ba0cc3771a2347ba595f15c6428cb29c782396a
parentd3c24bb0a65dae85e665ebc617ab4f084c2299fd (diff)
downloadfreeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.tar.gz
freeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.tar.xz
freeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.zip
Incorrect name in examples of ipa help hbactest
https://fedorahosted.org/freeipa/ticket/1741 HBAC rules address PAM services, thus service names should correspond to proper PAM names.
-rw-r--r--ipalib/plugins/hbactest.py14
1 files changed, 7 insertions, 7 deletions
diff --git a/ipalib/plugins/hbactest.py b/ipalib/plugins/hbactest.py
index f6f652177..d00784592 100644
--- a/ipalib/plugins/hbactest.py
+++ b/ipalib/plugins/hbactest.py
@@ -60,7 +60,7 @@ having access to the production environment.
EXAMPLES:
1. Use all enabled HBAC rules in IPA database to simulate:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd
--------------------
Access granted: True
--------------------
@@ -70,13 +70,13 @@ EXAMPLES:
matched: allow_all
2. Disable detailed summary of how rules were applied:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --nodetail
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --nodetail
--------------------
Access granted: True
--------------------
3. Test explicitly specified HBAC rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule
---------------------
Access granted: False
@@ -85,7 +85,7 @@ EXAMPLES:
notmatched: myrule
4. Use all enabled HBAC rules in IPA database + explicitly specified rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule --enabled
--------------------
Access granted: True
@@ -96,14 +96,14 @@ EXAMPLES:
matched: allow_all
5. Test all disabled HBAC rules in IPA database:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --disabled
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --disabled
---------------------
Access granted: False
---------------------
notmatched: new-rule
6. Test all disabled HBAC rules in IPA database + explicitly specified rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule --disabled
---------------------
Access granted: False
@@ -113,7 +113,7 @@ EXAMPLES:
notmatched: myrule
7. Test all (enabled and disabled) HBAC rules in IPA database:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--enabled --disabled
--------------------
Access granted: True