[Pki-devel] [PATCH] 635 Removed hard-coded /root in pkispawn man page.

Endi Sukma Dewata edewata at redhat.com
Fri Jul 17 18:47:11 UTC 2015


The /root in pkispawn man page has been replaced with a more
generic $HOME.

An incorrect /root in the following example has been removed:

   semanage -a -t pki_tomcat_cert_t /root/backup_keys.p12

-- 
Endi S. Dewata
-------------- next part --------------
From 27f7c2af8b52a704ead8d717476733d2188d01cf Mon Sep 17 00:00:00 2001
From: "Endi S. Dewata" <edewata at redhat.com>
Date: Fri, 17 Jul 2015 13:06:25 -0400
Subject: [PATCH] Removed hard-coded /root in pkispawn man page.

The /root in pkispawn man page has been replaced with a more
generic $HOME.

An incorrect /root in the following example has been removed:

  semanage -a -t pki_tomcat_cert_t /root/backup_keys.p12
---
 base/server/man/man8/pkispawn.8 | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/base/server/man/man8/pkispawn.8 b/base/server/man/man8/pkispawn.8
index 54de11c8f712f9b0bb3394e0e6f5267632f13a10..0aaeb321cd600a66d2c52eb43f428000c1ace8c1 100644
--- a/base/server/man/man8/pkispawn.8
+++ b/base/server/man/man8/pkispawn.8
@@ -145,7 +145,7 @@ password for the administrator user.
 An optional parameter that can be used to import an already available CA admin certificate into this instance.
 .TP
 \fIExport certificate:\fP
-setup the path where the admin certificate of this <subsystem> should be stored. The default value is /root/.dogtag/pki-tomcat/<ca/kra/ocsp/tks/tps>_admin.cert.
+setup the path where the admin certificate of this <subsystem> should be stored. The default value is $HOME/.dogtag/pki-tomcat/<ca/kra/ocsp/tks/tps>_admin.cert.
 .PP
 \fBDirectory Server Parameters\fP
 .TP
@@ -159,7 +159,7 @@ Answering yes to this question will cause prompts for \fISecure LDAPS Port:\fP a
 Secure LDAPS port for the directory server instance. The default value is 636.
 .TP
 \fIDirectory Server CA certificate pem file:\fP
-The fully-qualified path including the filename of the file which contains an exported copy of the Directory Server's CA certificate (e. g. - /root/dscacert.pem).  This file must exist prior to \fBpkispawn\fP being able to utilize it.  For details on creation of this file see the
+The fully-qualified path including the filename of the file which contains an exported copy of the Directory Server's CA certificate (e. g. - $HOME/dscacert.pem).  This file must exist prior to \fBpkispawn\fP being able to utilize it.  For details on creation of this file see the
 .B EXAMPLES
 section below entitled
 .B Installing a CA connecting securely to a Directory Server via LDAPS.
@@ -493,7 +493,7 @@ the generated PKCS12 file.
 master# scp backup_keys.p12 clone:/backup_keys.p12
 
 clone# chown pkiuser: /backup_keys.p12
-clone# semanage -a -t pki_tomcat_cert_t /root/backup_keys.p12\fP
+clone# semanage -a -t pki_tomcat_cert_t /backup_keys.p12\fP
 .fi
 
 .PP
@@ -753,7 +753,7 @@ add the following parameters into the [DEFAULT] section:
 .IP
 .nf
 pki_ds_secure_connection=True
-pki_ds_secure_connection_ca_pem_file=\fI/root/dscacert.pem\fP
+pki_ds_secure_connection_ca_pem_file=\fI$HOME/dscacert.pem\fP
 .fi
 
 .PP
@@ -786,7 +786,7 @@ The \fBsetupssl2.sh\fP script may be downloaded from \fBhttps://raw.githubuserco
 The \fBmozldap ldapsearch\fP utility is available from the \fBmozldap-tools\fP package.
 
 .IP
-* \fBcertutil -L -d /etc/dirsrv/\fIslapd-pki\fP -n "CA certificate" -a > \fI/root/dscacert.pem\fP
+* \fBcertutil -L -d /etc/dirsrv/\fIslapd-pki\fP -n "CA certificate" -a > \fI$HOME/dscacert.pem\fP
 
 .PP
 It should be noted that there are basically three scenarios in which a PKI
-- 
1.9.3



More information about the Pki-devel mailing list