summaryrefslogtreecommitdiffstats
path: root/ipalib
diff options
context:
space:
mode:
authorAlexander Bokovoy <abokovoy@redhat.com>2011-09-12 14:06:55 +0300
committerRob Crittenden <rcritten@redhat.com>2011-09-11 20:31:42 -0400
commit8f0a7bd646aedb3a33ac2b2335972454b8ed3925 (patch)
treed75fecf7dda7dc5a323425072b487096e49c43b5 /ipalib
parentc97eb871c53c4a8c3bbd0f9f4b2ff23bc390bc71 (diff)
downloadfreeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.tar.gz
freeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.tar.xz
freeipa-8f0a7bd646aedb3a33ac2b2335972454b8ed3925.zip
Incorrect name in examples of ipa help hbactest
https://fedorahosted.org/freeipa/ticket/1741 HBAC rules address PAM services, thus service names should correspond to proper PAM names.
Diffstat (limited to 'ipalib')
-rw-r--r--ipalib/plugins/hbactest.py14
1 files changed, 7 insertions, 7 deletions
diff --git a/ipalib/plugins/hbactest.py b/ipalib/plugins/hbactest.py
index f6f652177..d00784592 100644
--- a/ipalib/plugins/hbactest.py
+++ b/ipalib/plugins/hbactest.py
@@ -60,7 +60,7 @@ having access to the production environment.
EXAMPLES:
1. Use all enabled HBAC rules in IPA database to simulate:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd
--------------------
Access granted: True
--------------------
@@ -70,13 +70,13 @@ EXAMPLES:
matched: allow_all
2. Disable detailed summary of how rules were applied:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --nodetail
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --nodetail
--------------------
Access granted: True
--------------------
3. Test explicitly specified HBAC rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule
---------------------
Access granted: False
@@ -85,7 +85,7 @@ EXAMPLES:
notmatched: myrule
4. Use all enabled HBAC rules in IPA database + explicitly specified rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule --enabled
--------------------
Access granted: True
@@ -96,14 +96,14 @@ EXAMPLES:
matched: allow_all
5. Test all disabled HBAC rules in IPA database:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh --disabled
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd --disabled
---------------------
Access granted: False
---------------------
notmatched: new-rule
6. Test all disabled HBAC rules in IPA database + explicitly specified rules:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--rules=my-second-rule,myrule --disabled
---------------------
Access granted: False
@@ -113,7 +113,7 @@ EXAMPLES:
notmatched: myrule
7. Test all (enabled and disabled) HBAC rules in IPA database:
- $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=ssh \
+ $ ipa hbactest --user=a1a --srchost=foo --host=bar --service=sshd \
--enabled --disabled
--------------------
Access granted: True