diff options
author | Alexander Bokovoy <abokovoy@redhat.com> | 2011-09-12 14:06:55 +0300 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2011-09-11 20:31:42 -0400 |
commit | 8f0a7bd646aedb3a33ac2b2335972454b8ed3925 (patch) | |
tree | d75fecf7dda7dc5a323425072b487096e49c43b5 /ipalib/plugins | |
parent | c97eb871c53c4a8c3bbd0f9f4b2ff23bc390bc71 (diff) | |
download | freeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.tar.gz freeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.tar.xz freeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.zip |
Incorrect name in examples of ipa help hbactest
https://fedorahosted.org/freeipa/ticket/1741
HBAC rules address PAM services, thus service names should correspond to proper PAM names.
Diffstat (limited to 'ipalib/plugins')
-rw-r--r-- | ipalib/plugins/hbactest.py | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/ipalib/plugins/hbactest.py b/ipalib/plugins/hbactest.py index f6f652177..d00784592 100644 --- a/ipalib/plugins/hbactest.py +++ b/ipalib/plugins/hbactest.py @@ -60,7 +60,7 @@ having access to the production environment. EXAMPLES: 1. Use all enabled HBAC rules in IPA database to simulate: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd -------------------- Access granted: True -------------------- @@ -70,13 +70,13 @@ EXAMPLES: matched: allow_all 2. Disable detailed summary of how rules were applied: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --nodetail + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --nodetail -------------------- Access granted: True -------------------- 3. Test explicitly specified HBAC rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --------------------- Access granted: False @@ -85,7 +85,7 @@ EXAMPLES: notmatched: myrule 4. Use all enabled HBAC rules in IPA database + explicitly specified rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --enabled -------------------- Access granted: True @@ -96,14 +96,14 @@ EXAMPLES: matched: allow_all 5. Test all disabled HBAC rules in IPA database: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --disabled + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --disabled --------------------- Access granted: False --------------------- notmatched: new-rule 6. Test all disabled HBAC rules in IPA database + explicitly specified rules: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --rules=my-second-rule,myrule --disabled --------------------- Access granted: False @@ -113,7 +113,7 @@ EXAMPLES: notmatched: myrule 7. Test all (enabled and disabled) HBAC rules in IPA database: - $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \ + $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \ --enabled --disabled -------------------- Access granted: True |