summaryrefslogtreecommitdiffstats
path: root/ipalib/plugins/sudorule.py
diff options
context:
space:
mode:
authorPetr Viktorin <pviktori@redhat.com>2014-06-09 20:10:19 +0200
committerMartin Kosek <mkosek@redhat.com>2014-06-10 13:19:32 +0200
commite3b20b9d03f08b889474ef94aef11b31723fdf53 (patch)
tree20c9d187043c8f03eff55e86e1e563ee903d72f3 /ipalib/plugins/sudorule.py
parentb0a61ab9530d96a56ff0b10e66a742c18ca90c4a (diff)
downloadfreeipa-e3b20b9d03f08b889474ef94aef11b31723fdf53.tar.gz
freeipa-e3b20b9d03f08b889474ef94aef11b31723fdf53.tar.xz
freeipa-e3b20b9d03f08b889474ef94aef11b31723fdf53.zip
Split long docstrings that were recently modified
When the strings are changed again, translators will only need to re-translate the modified parts. See: https://fedorahosted.org/freeipa/ticket/3587 Reviewed-By: Martin Kosek <mkosek@redhat.com>
Diffstat (limited to 'ipalib/plugins/sudorule.py')
-rw-r--r--ipalib/plugins/sudorule.py24
1 files changed, 12 insertions, 12 deletions
diff --git a/ipalib/plugins/sudorule.py b/ipalib/plugins/sudorule.py
index 5520a37ee..09b9a97e5 100644
--- a/ipalib/plugins/sudorule.py
+++ b/ipalib/plugins/sudorule.py
@@ -25,12 +25,12 @@ from ipalib import _, ngettext
__doc__ = _("""
Sudo Rules
-
+""") + _("""
Sudo (su "do") allows a system administrator to delegate authority to
give certain users (or groups of users) the ability to run some (or all)
commands as root or another user while providing an audit trail of the
commands and their arguments.
-
+""") + _("""
FreeIPA provides a means to configure the various aspects of Sudo:
Users: The user(s)/group(s) allowed to invoke Sudo.
Hosts: The host(s)/hostgroup(s) which the user is allowed to to invoke Sudo.
@@ -39,37 +39,37 @@ FreeIPA provides a means to configure the various aspects of Sudo:
RunAsUser: The user(s) or group(s) of users whose rights Sudo will be invoked with.
RunAsGroup: The group(s) whose gid rights Sudo will be invoked with.
Options: The various Sudoers Options that can modify Sudo's behavior.
-
+""") + _("""
An order can be added to a sudorule to control the order in which they
are evaluated (if the client supports it). This order is an integer and
must be unique.
-
+""") + _("""
FreeIPA provides a designated binddn to use with Sudo located at:
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
-
+""") + _("""
To enable the binddn run the following command to set the password:
LDAPTLS_CACERT=/etc/ipa/ca.crt /usr/bin/ldappasswd -S -W \
-h ipa.example.com -ZZ -D "cn=Directory Manager" \
uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com
-
+""") + _("""
EXAMPLES:
-
+""") + _("""
Create a new rule:
ipa sudorule-add readfiles
-
+""") + _("""
Add sudo command object and add it as allowed command in the rule:
ipa sudocmd-add /usr/bin/less
ipa sudorule-add-allow-command readfiles --sudocmds /usr/bin/less
-
+""") + _("""
Add a host to the rule:
ipa sudorule-add-host readfiles --hosts server.example.com
-
+""") + _("""
Add a user to the rule:
ipa sudorule-add-user readfiles --users jsmith
-
+""") + _("""
Add a special Sudo rule for default Sudo server configuration:
ipa sudorule-add defaults
-
+""") + _("""
Set a default Sudo option:
ipa sudorule-add-option defaults --sudooption '!authenticate'
""")