diff options
author | Alexander Bokovoy <abokovoy@redhat.com> | 2011-09-12 14:06:55 +0300 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2011-09-11 20:29:28 -0400 |
commit | e638ba9d7f091ef9aeba5747fc872348671205bd (patch) | |
tree | 3ba0cc3771a2347ba595f15c6428cb29c782396a /ipalib/plugins/hbactest.py | |
parent | d3c24bb0a65dae85e665ebc617ab4f084c2299fd (diff) | |
download | freeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.tar.gz freeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.tar.xz freeipa-e638ba9d7f091ef9aeba5747fc872348671205bd.zip |
Incorrect name in examples of ipa help hbactest
https://fedorahosted.org/freeipa/ticket/1741
HBAC rules address PAM services, thus service names should correspond to proper PAM names.
Diffstat (limited to 'ipalib/plugins/hbactest.py')
-rw-r--r-- | ipalib/plugins/hbactest.py | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/ipalib/plugins/hbactest.py b/ipalib/plugins/hbactest.py index f6f652177..d00784592 100644 --- a/ipalib/plugins/hbactest.py +++ b/ipalib/plugins/hbactest.py @@ -60,7 +60,7 @@ having access to the production environment. EXAMPLES: 1. Use all enabled HBAC rules in IPA database to simulate: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd -------------------- Access granted: True -------------------- @@ -70,13 +70,13 @@ EXAMPLES: matched: allow_all 2. Disable detailed summary of how rules were applied: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --nodetail + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --nodetail -------------------- Access granted: True -------------------- 3. Test explicitly specified HBAC rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --------------------- Access granted: False @@ -85,7 +85,7 @@ EXAMPLES: notmatched: myrule 4. Use all enabled HBAC rules in IPA database + explicitly specified rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --enabled -------------------- Access granted: True @@ -96,14 +96,14 @@ EXAMPLES: matched: allow_all 5. Test all disabled HBAC rules in IPA database: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --disabled + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --disabled --------------------- Access granted: False --------------------- notmatched: new-rule 6. Test all disabled HBAC rules in IPA database + explicitly specified rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --disabled --------------------- Access granted: False @@ -113,7 +113,7 @@ EXAMPLES: notmatched: myrule 7. Test all (enabled and disabled) HBAC rules in IPA database: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --enabled --disabled -------------------- Access granted: True |