__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
module Test_krb5 =
(* Krb5.conf from Fermilab *)
let fermi_str = "###
### This krb5.conf template is intended for use with Fermi
### Kerberos v1_2 and later. Earlier versions may choke on the
### \"auth_to_local = \" lines unless they are commented out.
### The installation process should do all the right things in
### any case, but if you are reading this and haven't updated
### your kerberos product to v1_2 or later, you really should!
###
[libdefaults]
ticket_lifetime = 1560m
default_realm = FNAL.GOV
ccache_type = 4
default_tgs_enCtypes = des-cbc-crc
default_tkt_enctypes = des-cbc-crc
permitted_enctypes = des-cbc-crc des3-cbc-sha1
default_lifetime = 7d
renew_lifetime = 7d
autologin = true
forward = true
forwardable = true
renewable = true
encrypt = true
v4_name_convert = {
host = {
rcmd = host
}
}
[realms]
FNAL.GOV = {
kdc = krb-fnal-1.fnal.gov:88
kdc = krb-fnal-2.fnal.gov:88
kdc = krb-fnal-3.fnal.gov:88
kdc = krb-fnal-4.fnal.gov:88
kdc = krb-fnal-5.fnal.gov:88
kdc = krb-fnal-6.fnal.gov:88
kdc = krb-fnal-7.fnal.gov:88
master_kdc = krb-fnal-admin.fnal.gov:88
admin_server = krb-fnal-admin.fnal.gov
default_domain = fnal.gov
}
WIN.FNAL.GOV = {
kdc = littlebird.win.fnal.gov:88
kdc = bigbird.win.fnal.gov:88
default_domain = fnal.gov
}
FERMI.WIN.FNAL.GOV = {
kdc = sully.fermi.win.fnal.gov:88
kdc = elmo.fermi.win.fnal.gov:88
kdc = grover.fermi.win.fnal.gov:88
kdc = oscar.fermi.win.fnal.gov:88
kdc = cookie.fermi.win.fnal.gov:88
kdc = herry.fermi.win.fnal.gov:88
default_domain = fnal.gov
}
UCHICAGO.EDU = {
kdc = kerberos-0.uchicago.edu
kdc = kerberos-1.uchicago.edu
kdc = kerberos-2.uchicago.edu
admin_server = kerberos.uchicago.edu
default_domain = uchicago.edu
}
PILOT.FNAL.GOV = {
kdc = i-krb-2.fnal.gov:88
master_kdc = i-krb-2.fnal.gov:88
admin_server = i-krb-2.fnal.gov
default_domain = fnal.gov
}
WINBETA.FNAL.GOV = {
kdc = wbdc1.winbeta.fnal.gov:88
kdc = wbdc2.winbeta.fnal.gov:88
default_domain = fnal.gov
}
FERMIBETA.WINBETA.FNAL.GOV = {
kdc = fbdc1.fermibeta.winbeta.fnal.gov:88
kdc = fbdc2.fermibeta.winbeta.fnal.gov:88
default_domain = fnal.gov
}
CERN.CH = {
kdc = afsdb2.cern.ch
kdc = afsdb3.cern.ch
kdc = afsdb1.cern.ch
default_domain = cern.ch
kpasswd_server = afskrb5m.cern.ch
admin_server = afskrb5m.cern.ch
v4_name_convert = {
host = {
rcmd = host
}
}
}
1TS.ORG = {
kdc = kerberos.1ts.org
admin_server = kerberos.1ts.org
}
stanford.edu = {
kdc = krb5auth1.stanford.edu
kdc = krb5auth2.stanford.edu
kdc = krb5auth3.stanford.edu
master_kdc = krb5auth1.stanford.edu
admin_server = krb5-admin.stanford.edu
default_domain = stanford.edu
krb524_server = krb524.stanford.edu
}
[instancemapping]
afs = {
cron/* = \"\"
cms/* = \"\"
afs/* = \"\"
e898/* = \"\"
}
[capaths]
# FNAL.GOV and PILOT.FNAL.GOV are the MIT Kerberos Domains
# FNAL.GOV is production and PILOT is for testing
# The FERMI Windows domain uses the WIN.FNAL.GOV root realm
# with the FERMI.WIN.FNAL.GOV sub-realm where machines and users
# reside. The WINBETA and FERMIBETA domains are the equivalent
# testing realms for the FERMIBETA domain. The 2-way transitive
# trust structure of this complex is as follows:
#
# FNAL.GOV <=> PILOT.FNAL.GOV
# FNAL.GOV <=> WIN.FERMI.GOV <=> FERMI.WIN.FERMI.GOV
# PILOT.FNAL.GOV <=> WINBETA.FNAL.GOV <=> FERMIBETA.WINBETA.FNAL.GOV
FNAL.GOV = {
PILOT.FNAL.GOV = .
FERMI.WIN.FNAL.GOV = WIN.FNAL.GOV
WIN.FNAL.GOV = .
FERMIBETA.WINBETA.FNAL.GOV = WINBETA.FNAL.GOV
WINBETA.FNAL.GOV = PILOT.FNAL.GOV
}
PILOT.FNAL.GOV = {
FNAL.GOV = .
FERMI.WIN.FNAL.GOV = WIN.FNAL.GOV
WIN.FNAL.GOV = FNAL.GOV
FERMIBETA.WINBETA.FNAL.GOV = WINBETA.FNAL.GOV
WINBETA.FNAL.GOV = .
}
WIN.FNAL.GOV = {
FNAL.GOV = .
PILOT.FNAL.GOV = FNAL.GOV
FERMI.WIN.FNAL.GOV = .
FERMIBETA.WINBETA.FNAL.GOV = WINBETA.FNAL.GOV
WINBETA.FNAL.GOV = PILOT.FNAL.GOV
}
WINBETA.FNAL.GOV = {
PILOT.FNAL.GOV = .
FERMIBETA.WINBETA.FNAL.GOV = .
FNAL.GOV = PILOT.FNAL.GOV
FERMI.WIN.FNAL.GOV = WIN.FNAL.GOV
WIN.FNAL.GOV = PILOT.FNAL.GOV
}
[logging]
kdc = SYSLOG:info:local1
admin_server = SYSLOG:info:local2
default = SYSLOG:err:auth
[domain_realm]
# Fermilab's (non-windows-centric) domains
.fnal.gov = FNAL.GOV
.cdms-soudan.org = FNAL.GOV
.deemz.net = FNAL.GOV
.dhcp.fnal.gov = FNAL.GOV
.minos-soudan.org = FNAL.GOV
i-krb-2.fnal.gov = PILOT.FNAL.GOV
.win.fnal.gov = WIN.FNAL.GOV
.fermi.win.fnal.gov = FERMI.WIN.FNAL.GOV
.winbeta.fnal.gov = WINBETA.FNAL.GOV
.fermibeta.winbeta.fnal.gov = FERMIBETA.WINBETA.FNAL.GOV
# Fermilab's KCA servers so FERMI.WIN principals work in FNAL.GOV realm
# winserver.fnal.gov = FERMI.WIN.FNAL.GOV
# winserver2.fnal.gov = FERMI.WIN.FNAL.GOVA
# Accelerator nodes to FERMI.WIN for Linux/OS X users
adgroups.fnal.gov = FERMI.WIN.FNAL.GOV
adusers.fnal.gov = FERMI.WIN.FNAL.GOV
webad.fnal.gov = FERMI.WIN.FNAL.GOV
# Friends and family (by request)
.cs.ttu.edu = FNAL.GOV
.geol.uniovi.es = FNAL.GOV
.harvard.edu = FNAL.GOV
.hpcc.ttu.edu = FNAL.GOV
.infn.it = FNAL.GOV
.knu.ac.kr = FNAL.GOV
.lns.mit.edu = FNAL.GOV
.ph.liv.ac.uk = FNAL.GOV
.pha.jhu.edu = FNAL.GOV
.phys.ttu.edu = FNAL.GOV
.phys.ualberta.ca = FNAL.GOV
.physics.lsa.umich.edu = FNAL.GOV
.physics.ucla.edu = FNAL.GOV
.physics.ucsb.edu = FNAL.GOV
.physics.utoronto.ca = FNAL.GOV
.rl.ac.uk = FNAL.GOV
.rockefeller.edu = FNAL.GOV
.rutgers.edu = FNAL.GOV
.sdsc.edu = FNAL.GOV
.sinica.edu.tw = FNAL.GOV
.tsukuba.jp.hep.net = FNAL.GOV
.ucsd.edu = FNAL.GOV
.unl.edu = FNAL.GOV
.in2p3.fr = FNAL.GOV
.wisc.edu = FNAL.GOV
.pic.org.es = FNAL.GOV
.kisti.re.kr = FNAL.GOV
# The whole \"top half\" is replaced during \"ups installAsRoot krb5conf\", so:
# It would probably be a bad idea to change anything on or above this line
# If you need to add any .domains or hosts, put them here
[domain_realm]
mojo.lunet.edu = FNAL.GOV
[appdefaults]
default_lifetime = 7d
retain_ccache = false
autologin = true
forward = true
forwardable = true
renewable = true
encrypt = true
krb5_aklog_path = /usr/bin/aklog
telnet = {
}
rcp = {
forward = true
encrypt = false
allow_fallback = true
}
rsh = {
allow_fallback = true
}
rlogin = {
allow_fallback = false
}
login = {
forwardable = true
krb5_run_aklog = false
krb5_get_tickets = true
krb4_get_tickets = false
krb4_convert = false
}
kinit = {
forwardable = true
krb5_run_aklog = false
}
kadmin = {
forwardable = false
}
rshd = {
krb5_run_aklog = false
}
ftpd = {
krb5_run_aklog = false
default_lifetime = 10h
}
pam = {
debug = false
forwardable = true
renew_lifetime = 7d
ticket_lifetime = 1560m
krb4_convert = true
afs_cells = fnal.gov
krb5_run_aklog = false
}
"
test Krb5.lns get fermi_str =
{ "#comment" = "##" }
{ "#comment" = "## This krb5.conf template is intended for use with Fermi" }
{ "#comment" = "## Kerberos v1_2 and later. Earlier versions may choke on the" }
{ "#comment" = "## \"auth_to_local = \" lines unless they are commented out." }
{ "#comment" = "## The installation process should do all the right things in" }
{ "#comment" = "## any case, but if you are reading this and haven't updated" }
{ "#comment" = "## your kerberos product to v1_2 or later, you really should!" }
{ "#comment" = "##" }
{ "libdefaults"
{ "ticket_lifetime" = "1560m" }
{ "default_realm" = "FNAL.GOV" }
{ "ccache_type" = "4" }
{ "default_tgs_enctypes" = "des-cbc-crc" }
{ "#eol" }
{ "default_tkt_enctypes" = "des-cbc-crc" }
{ "#eol" }
{ "permitted_enctypes" = "des-cbc-crc" }
{ "permitted_enctypes" = "des3-cbc-sha1" }
{ "#eol" }
{ "default_lifetime" = "7d" }
{ "renew_lifetime" = "7d" }
{ "autologin" = "true" }
{ "forward" = "true" }
{ "forwardable" = "true" }
{ "renewable" = "true" }
{ "encrypt" = "true" }
{ "v4_name_convert"
{ "host"
{ "rcmd" = "host" }
}
}
{ } }
{ "realms"
{ "realm" = "FNAL.GOV"
{ "kdc" = "krb-fnal-1.fnal.gov:88" }
{ "kdc" = "krb-fnal-2.fnal.gov:88" }
{ "kdc" = "krb-fnal-3.fnal.gov:88" }
{ "kdc" = "krb-fnal-4.fnal.gov:88" }
{ "kdc" = "krb-fnal-5.fnal.gov:88" }
{ "kdc" = "krb-fnal-6.fnal.gov:88" }
{ "kdc" = "krb-fnal-7.fnal.gov:88" }
{ "master_kdc" = "krb-fnal-admin.fnal.gov:88" }
{ "admin_server" = "krb-fnal-admin.fnal.gov" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "WIN.FNAL.GOV"
{ "kdc" = "littlebird.win.fnal.gov:88" }
{ "kdc" = "bigbird.win.fnal.gov:88" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "FERMI.WIN.FNAL.GOV"
{ "kdc" = "sully.fermi.win.fnal.gov:88" }
{ "kdc" = "elmo.fermi.win.fnal.gov:88" }
{ "kdc" = "grover.fermi.win.fnal.gov:88" }
{ "kdc" = "oscar.fermi.win.fnal.gov:88" }
{ "kdc" = "cookie.fermi.win.fnal.gov:88" }
{ "kdc" = "herry.fermi.win.fnal.gov:88" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "UCHICAGO.EDU"
{ "kdc" = "kerberos-0.uchicago.edu" }
{ "kdc" = "kerberos-1.uchicago.edu" }
{ "kdc" = "kerberos-2.uchicago.edu" }
{ "admin_server" = "kerberos.uchicago.edu" }
{ "default_domain" = "uchicago.edu" } }
{ "realm" = "PILOT.FNAL.GOV"
{ "kdc" = "i-krb-2.fnal.gov:88" }
{ "master_kdc" = "i-krb-2.fnal.gov:88" }
{ "admin_server" = "i-krb-2.fnal.gov" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "WINBETA.FNAL.GOV"
{ "kdc" = "wbdc1.winbeta.fnal.gov:88" }
{ "kdc" = "wbdc2.winbeta.fnal.gov:88" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "FERMIBETA.WINBETA.FNAL.GOV"
{ "kdc" = "fbdc1.fermibeta.winbeta.fnal.gov:88" }
{ "kdc" = "fbdc2.fermibeta.winbeta.fnal.gov:88" }
{ "default_domain" = "fnal.gov" } }
{ "realm" = "CERN.CH"
{ "kdc" = "afsdb2.cern.ch" }
{ "kdc" = "afsdb3.cern.ch" }
{ "kdc" = "afsdb1.cern.ch" }
{ "default_domain" = "cern.ch" }
{ "kpasswd_server" = "afskrb5m.cern.ch" }
{ "admin_server" = "afskrb5m.cern.ch" }
{ "v4_name_convert"
{ "host"
{ "rcmd" = "host" }
}
}
}
{ "realm" = "1TS.ORG"
{ "kdc" = "kerberos.1ts.org" }
{ "admin_server" = "kerberos.1ts.org" }
}
{ "realm" = "stanford.edu"
{ "kdc" = "krb5auth1.stanford.edu" }
{ "kdc" = "krb5auth2.stanford.edu" }
{ "kdc" = "krb5auth3.stanford.edu" }
{ "master_kdc" = "krb5auth1.stanford.edu" }
{ "admin_server" = "krb5-admin.stanford.edu" }
{ "default_domain" = "stanford.edu" }
{ "krb524_server" = "krb524.stanford.edu" }
}
{ } }
{ "instancemapping"
{ "afs"
{ "mapping" = "cron/*" { "value" = "" } }
{ "mapping" = "cms/*" { "value" = "" } }
{ "mapping" = "afs/*" { "value" = "" } }
{ "mapping" = "e898/*" { "value" = "" } } }
{ } }
{ "capaths"
{ }
{ "#comment" = "FNAL.GOV and PILOT.FNAL.GOV are the MIT Kerberos Domains" }
{ "#comment" = "FNAL.GOV is production and PILOT is for testing" }
{ "#comment" = "The FERMI Windows domain uses the WIN.FNAL.GOV root realm" }
{ "#comment" = "with the FERMI.WIN.FNAL.GOV sub-realm where machines and users" }
{ "#comment" = "reside. The WINBETA and FERMIBETA domains are the equivalent" }
{ "#comment" = "testing realms for the FERMIBETA domain. The 2-way transitive" }
{ "#comment" = "trust structure of this complex is as follows:" }
{}
{ "#comment" = "FNAL.GOV <=> PILOT.FNAL.GOV" }
{ "#comment" = "FNAL.GOV <=> WIN.FERMI.GOV <=> FERMI.WIN.FERMI.GOV" }
{ "#comment" = "PILOT.FNAL.GOV <=> WINBETA.FNAL.GOV <=> FERMIBETA.WINBETA.FNAL.GOV" }
{ }
{ "FNAL.GOV"
{ "PILOT.FNAL.GOV" = "." }
{ "FERMI.WIN.FNAL.GOV" = "WIN.FNAL.GOV" }
{ "WIN.FNAL.GOV" = "." }
{ "FERMIBETA.WINBETA.FNAL.GOV" = "WINBETA.FNAL.GOV" }
{ "WINBETA.FNAL.GOV" = "PILOT.FNAL.GOV" } }
{ "PILOT.FNAL.GOV"
{ "FNAL.GOV" = "." }
{ "FERMI.WIN.FNAL.GOV" = "WIN.FNAL.GOV" }
{ "WIN.FNAL.GOV" = "FNAL.GOV" }
{ "FERMIBETA.WINBETA.FNAL.GOV" = "WINBETA.FNAL.GOV" }
{ "WINBETA.FNAL.GOV" = "." } }
{ "WIN.FNAL.GOV"
{ "FNAL.GOV" = "." }
{ "PILOT.FNAL.GOV" = "FNAL.GOV" }
{ "FERMI.WIN.FNAL.GOV" = "." }
{ "FERMIBETA.WINBETA.FNAL.GOV" = "WINBETA.FNAL.GOV" }
{ "WINBETA.FNAL.GOV" = "PILOT.FNAL.GOV" } }
{ "WINBETA.FNAL.GOV"
{ "PILOT.FNAL.GOV" = "." }
{ "FERMIBETA.WINBETA.FNAL.GOV" = "." }
{ "FNAL.GOV" = "PILOT.FNAL.GOV" }
{ "FERMI.WIN.FNAL.GOV" = "WIN.FNAL.GOV" }
{ "WIN.FNAL.GOV" = "PILOT.FNAL.GOV" } }
{ } }
{ "logging"
{ "kdc"
{ "syslog"
{ "severity" = "info" }
{ "facility" = "local1" } } }
{ "admin_server"
{ "syslog"
{ "severity" = "info" }
{ "facility" = "local2" } } }
{ "default"
{ "syslog"
{ "severity" = "err" }
{ "facility" = "auth" } } }
{ } }
{ "domain_realm"
{ "#comment" = "Fermilab's (non-windows-centric) domains" }
{ ".fnal.gov" = "FNAL.GOV" }
{ ".cdms-soudan.org" = "FNAL.GOV" }
{ ".deemz.net" = "FNAL.GOV" }
{ ".dhcp.fnal.gov" = "FNAL.GOV" }
{ ".minos-soudan.org" = "FNAL.GOV" }
{ "i-krb-2.fnal.gov" = "PILOT.FNAL.GOV" }
{ ".win.fnal.gov" = "WIN.FNAL.GOV" }
{ ".fermi.win.fnal.gov" = "FERMI.WIN.FNAL.GOV" }
{ ".winbeta.fnal.gov" = "WINBETA.FNAL.GOV" }
{ ".fermibeta.winbeta.fnal.gov" = "FERMIBETA.WINBETA.FNAL.GOV" }
{ "#comment" = "Fermilab's KCA servers so FERMI.WIN principals work in FNAL.GOV realm" }
{ "#comment" = "winserver.fnal.gov = FERMI.WIN.FNAL.GOV" }
{ "#comment" = "winserver2.fnal.gov = FERMI.WIN.FNAL.GOVA" }
{ "#comment" = "Accelerator nodes to FERMI.WIN for Linux/OS X users" }
{ "adgroups.fnal.gov" = "FERMI.WIN.FNAL.GOV" }
{ "adusers.fnal.gov" = "FERMI.WIN.FNAL.GOV" }
{ "webad.fnal.gov" = "FERMI.WIN.FNAL.GOV" }
{ "#comment" = "Friends and family (by request)" }
{ ".cs.ttu.edu" = "FNAL.GOV" }
{ ".geol.uniovi.es" = "FNAL.GOV" }
{ ".harvard.edu" = "FNAL.GOV" }
{ ".hpcc.ttu.edu" = "FNAL.GOV" }
{ ".infn.it" = "FNAL.GOV" }
{ ".knu.ac.kr" = "FNAL.GOV" }
{ ".lns.mit.edu" = "FNAL.GOV" }
{ ".ph.liv.ac.uk" = "FNAL.GOV" }
{ ".pha.jhu.edu" = "FNAL.GOV" }
{ ".phys.ttu.edu" = "FNAL.GOV" }
{ ".phys.ualberta.ca" = "FNAL.GOV" }
{ ".physics.lsa.umich.edu" = "FNAL.GOV" }
{ ".physics.ucla.edu" = "FNAL.GOV" }
{ ".physics.ucsb.edu" = "FNAL.GOV" }
{ ".physics.utoronto.ca" = "FNAL.GOV" }
{ ".rl.ac.uk" = "FNAL.GOV" }
{ ".rockefeller.edu" = "FNAL.GOV" }
{ ".rutgers.edu" = "FNAL.GOV" }
{ ".sdsc.edu" = "FNAL.GOV" }
{ ".sinica.edu.tw" = "FNAL.GOV" }
{ ".tsukuba.jp.hep.net" = "FNAL.GOV" }
{ ".ucsd.edu" = "FNAL.GOV" }
{ ".unl.edu" = "FNAL.GOV" }
{ ".in2p3.fr" = "FNAL.GOV" }
{ ".wisc.edu" = "FNAL.GOV" }
{ ".pic.org.es" = "FNAL.GOV" }
{ ".kisti.re.kr" = "FNAL.GOV" }
{ }
{ "#comment" = "The whole \"top half\" is replaced during \"ups installAsRoot krb5conf\", so:" }
{ "#comment" = "It would probably be a bad idea to change anything on or above this line" }
{ }
{ "#comment" = "If you need to add any .domains or hosts, put them here" } }
{ "domain_realm"
{ "mojo.lunet.edu" = "FNAL.GOV" }
{ } }
{ "appdefaults"
{ "default_lifetime" = "7d" }
{ "retain_ccache" = "false" }
{ "autologin" = "true" }
{ "forward" = "true" }
{ "forwardable" = "true" }
{ "renewable" = "true" }
{ "encrypt" = "true" }
{ "krb5_aklog_path" = "/usr/bin/aklog" }
{ }
{ "application" = "telnet" }
{ }
{ "application" = "rcp"
{ "forward" = "true" }
{ "encrypt" = "false" }
{ "allow_fallback" = "true" } }
{ }
{ "application" = "rsh"
{ "allow_fallback" = "true" } }
{ }
{ "application" = "rlogin"
{ "allow_fallback" = "false" } }
{ }
{ }
{ "application" = "login"
{ "forwardable" = "true" }
{ "krb5_run_aklog" = "false" }
{ "krb5_get_tickets" = "true" }
{ "krb4_get_tickets" = "false" }
{ "krb4_convert" = "false" } }
{ }
{ "application" = "kinit"
{ "forwardable" = "true" }
{ "krb5_run_aklog" = "false" } }
{ }
{ "application" = "kadmin"
{ "forwardable" = "false" } }
{ }
{ "application" = "rshd"
{ "krb5_run_aklog" = "false" } }
{ }
{ "application" = "ftpd"
{ "krb5_run_aklog" = "false" }
{ "default_lifetime" = "10h" } }
{ }
{ "application" = "pam"
{ "debug" = "false" }
{ "forwardable" = "true" }
{ "renew_lifetime" = "7d" }
{ "ticket_lifetime" = "1560m" }
{ "krb4_convert" = "true" }
{ "afs_cells" = "fnal.gov" }
{ "krb5_run_aklog" = "false" } } }
(* Example from the krb5 distrubution *)
let dist_str = "[libdefaults]
default_realm = ATHENA.MIT.EDU
krb4_config = /usr/kerberos/lib/krb.conf
krb4_realms = /usr/kerberos/lib/krb.realms
[realms]
ATHENA.MIT.EDU = {
admin_server = KERBEROS.MIT.EDU
default_domain = MIT.EDU
v4_instance_convert = {
mit = mit.edu
lithium = lithium.lcs.mit.edu
}
}
ANDREW.CMU.EDU = {
admin_server = vice28.fs.andrew.cmu.edu
}
# use \"kdc =\" if realm admins haven't put SRV records into DNS
GNU.ORG = {
kdc = kerberos.gnu.org
kdc = kerberos-2.gnu.org
admin_server = kerberos.gnu.org
}
[domain_realm]
.mit.edu = ATHENA.MIT.EDU
mit.edu = ATHENA.MIT.EDU
.media.mit.edu = MEDIA-LAB.MIT.EDU
media.mit.edu = MEDIA-LAB.MIT.EDU
.ucsc.edu = CATS.UCSC.EDU
[logging]
# kdc = CONSOLE
"
test Krb5.lns get dist_str =
{ "libdefaults"
{ "default_realm" = "ATHENA.MIT.EDU" }
{ "krb4_config" = "/usr/kerberos/lib/krb.conf" }
{ "krb4_realms" = "/usr/kerberos/lib/krb.realms" }
{ } }
{ "realms"
{ "realm" = "ATHENA.MIT.EDU"
{ "admin_server" = "KERBEROS.MIT.EDU" }
{ "default_domain" = "MIT.EDU" }
{ "v4_instance_convert"
{ "mit" = "mit.edu" }
{ "lithium" = "lithium.lcs.mit.edu" } } }
{ "realm" = "ANDREW.CMU.EDU"
{ "admin_server" = "vice28.fs.andrew.cmu.edu" } }
{ "#comment" = "use \"kdc =\" if realm admins haven't put SRV records into DNS" }
{ "realm" = "GNU.ORG"
{ "kdc" = "kerberos.gnu.org" }
{ "kdc" = "kerberos-2.gnu.org" }
{ "admin_server" = "kerberos.gnu.org" } }
{ } }
{ "domain_realm"
{ ".mit.edu" = "ATHENA.MIT.EDU" }
{ "mit.edu" = "ATHENA.MIT.EDU" }
{ ".media.mit.edu" = "MEDIA-LAB.MIT.EDU" }
{ "media.mit.edu" = "MEDIA-LAB.MIT.EDU" }
{ ".ucsc.edu" = "CATS.UCSC.EDU" }
{ } }
{ "logging"
{ "#comment" = "kdc = CONSOLE" } }
(* Test for [libdefaults] *)
test Krb5.libdefaults get "[libdefaults]
default_realm = ATHENA.MIT.EDU
krb4_config = /usr/kerberos/lib/krb.conf
krb4_realms = /usr/kerberos/lib/krb.realms\n\n" =
{ "libdefaults"
{ "default_realm" = "ATHENA.MIT.EDU" }
{ "krb4_config" = "/usr/kerberos/lib/krb.conf" }
{ "krb4_realms" = "/usr/kerberos/lib/krb.realms" }
{ } }
(* Test for [appfdefaults] *)
test Krb5.appdefaults get "[appdefaults]\n\tdefault_lifetime = 7d\n" =
{ "appdefaults" { "default_lifetime" = "7d" } }
test Krb5.appdefaults get
"[appdefaults]\nrcp = { \n forward = true\n encrypt = false\n }\n" =
{ "appdefaults"
{ "application" = "rcp"
{ "forward" = "true" }
{ "encrypt" = "false" } } }
test Krb5.appdefaults get "[appdefaults]\ntelnet = {\n\t}\n" =
{ "appdefaults" { "application" = "telnet" } }
test Krb5.appdefaults get "[appdefaults]
rcp = {
forward = true
ATHENA.MIT.EDU = {
encrypt = false
}
MEDIA-LAB.MIT.EDU = {
encrypt = true
}
forwardable = true
}\n" =
{ "appdefaults"
{ "application" = "rcp"
{ "forward" = "true" }
{ "realm" = "ATHENA.MIT.EDU"
{ "encrypt" = "false" } }
{ "realm" = "MEDIA-LAB.MIT.EDU"
{ "encrypt" = "true" } }
{ "forwardable" = "true" } } }
let appdef = "[appdefaults]
default_lifetime = 7d
retain_ccache = false
autologin = true
forward = true
forwardable = true
renewable = true
encrypt = true
krb5_aklog_path = /usr/bin/aklog
telnet = {
}
rcp = {
forward = true
encrypt = false
allow_fallback = true
}
rsh = {
allow_fallback = true
}
rlogin = {
allow_fallback = false
}
login = {
forwardable = true
krb5_run_aklog = false
krb5_get_tickets = true
krb4_get_tickets = false
krb4_convert = false
}
kinit = {
forwardable = true
krb5_run_aklog = false
}
kadmin = {
forwardable = false
}
rshd = {
krb5_run_aklog = false
}
ftpd = {
krb5_run_aklog = false
default_lifetime = 10h
}
pam = {
debug = false
forwardable = true
renew_lifetime = 7d
ticket_lifetime = 1560m
krb4_convert = true
afs_cells = fnal.gov
krb5_run_aklog = false
}\n"
let appdef_tree =
{ "appdefaults"
{ "default_lifetime" = "7d" }
{ "retain_ccache" = "false" }
{ "autologin" = "true" }
{ "forward" = "true" }
{ "forwardable" = "true" }
{ "renewable" = "true" }
{ "encrypt" = "true" }
{ "krb5_aklog_path" = "/usr/bin/aklog" }
{ }
{ "application" = "telnet" }
{ }
{ "application" = "rcp"
{ "forward" = "true" }
{ "encrypt" = "false" }
{ "allow_fallback" = "true" }
}
{ }
{ "application" = "rsh"
{ "allow_fallback" = "true" }
}
{ }
{ "application" = "rlogin"
{ "allow_fallback" = "false" }
}
{ }
{ }
{ "application" = "login"
{ "forwardable" = "true" }
{ "krb5_run_aklog" = "false" }
{ "krb5_get_tickets" = "true" }
{ "krb4_get_tickets" = "false" }
{ "krb4_convert" = "false" }
}
{ }
{ "application" = "kinit"
{ "forwardable" = "true" }
{ "krb5_run_aklog" = "false" }
}
{ }
{ "application" = "kadmin"
{ "forwardable" = "false" }
}
{ }
{ "application" = "rshd"
{ "krb5_run_aklog" = "false" }
}
{ }
{ "application" = "ftpd"
{ "krb5_run_aklog" = "false" }
{ "default_lifetime" = "10h" }
}
{ }
{ "application" = "pam"
{ "debug" = "false" }
{ "forwardable" = "true" }
{ "renew_lifetime" = "7d" }
{ "ticket_lifetime" = "1560m" }
{ "krb4_convert" = "true" }
{ "afs_cells" = "fnal.gov" }
{ "krb5_run_aklog" = "false" }
}
}
test Krb5.appdefaults get appdef = appdef_tree
test Krb5.lns get appdef = appdef_tree
(* Test realms section *)
let realms_str = "[realms]
ATHENA.MIT.EDU = {
admin_server = KERBEROS.MIT.EDU
default_domain = MIT.EDU
database_module = ldapconf
# test
v4_instance_convert = {
mit = mit.edu
lithium = lithium.lcs.mit.edu
}
v4_realm = LCS.MIT.EDU
}\n"
test Krb5.lns get realms_str =
{ "realms"
{ "realm" = "ATHENA.MIT.EDU"
{ "admin_server" = "KERBEROS.MIT.EDU" }
{ "default_domain" = "MIT.EDU" }
{ "database_module" = "ldapconf" }
{ }
{ "#comment" = "test" }
{ "v4_instance_convert"
{ "mit" = "mit.edu" }
{ "lithium" = "lithium.lcs.mit.edu" } }
{ "v4_realm" = "LCS.MIT.EDU" } } }
(* Test dpmain_realm section *)
let domain_realm_str = "[domain_realm]
.mit.edu = ATHENA.MIT.EDU
mit.edu = ATHENA.MIT.EDU
dodo.mit.edu = SMS_TEST.MIT.EDU
.ucsc.edu = CATS.UCSC.EDU\n"
test Krb5.lns get domain_realm_str =
{ "domain_realm"
{ ".mit.edu" = "ATHENA.MIT.EDU" }
{ "mit.edu" = "ATHENA.MIT.EDU" }
{ "dodo.mit.edu" = "SMS_TEST.MIT.EDU" }
{ ".ucsc.edu" = "CATS.UCSC.EDU" } }
(* Test logging section *)
let logging_str = "[logging]
kdc = CONSOLE
kdc = SYSLOG:INFO:DAEMON
admin_server = FILE:/var/adm/kadmin.log
admin_server = DEVICE=/dev/tty04\n"
test Krb5.lns get logging_str =
{ "logging"
{ "kdc"
{ "console" } }
{ "kdc"
{ "syslog"
{ "severity" = "INFO" }
{ "facility" = "DAEMON" } } }
{ "admin_server"
{ "file" = "/var/adm/kadmin.log" } }
{ "admin_server"
{ "device" = "/dev/tty04" } } }
(* Test capaths section *)
let capaths_str = "[capaths]
ANL.GOV = {
TEST.ANL.GOV = .
PNL.GOV = ES.NET
NERSC.GOV = ES.NET
ES.NET = .
}
TEST.ANL.GOV = {
ANL.GOV = .
}
PNL.GOV = {
ANL.GOV = ES.NET
}
NERSC.GOV = {
ANL.GOV = ES.NET
}
ES.NET = {
ANL.GOV = .
}\n"
test Krb5.lns get capaths_str =
{ "capaths"
{ "ANL.GOV"
{ "TEST.ANL.GOV" = "." }
{ "PNL.GOV" = "ES.NET" }
{ "NERSC.GOV" = "ES.NET" }
{ "ES.NET" = "." } }
{ "TEST.ANL.GOV"
{ "ANL.GOV" = "." } }
{ "PNL.GOV"
{ "ANL.GOV" = "ES.NET" } }
{ "NERSC.GOV"
{ "ANL.GOV" = "ES.NET" } }
{ "ES.NET"
{ "ANL.GOV" = "." } } }
(* Test instancemapping *)
test Krb5.instance_mapping get "[instancemapping]
afs = {
cron/* = \"\"
cms/* = \"\"
afs/* = \"\"
e898/* = \"\"
}\n" =
{ "instancemapping"
{ "afs"
{ "mapping" = "cron/*"
{ "value" = "" } }
{ "mapping" = "cms/*"
{ "value" = "" } }
{ "mapping" = "afs/*"
{ "value" = "" } }
{ "mapping" = "e898/*"
{ "value" = "" } } } }
test Krb5.kdc get "[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf\n" =
{ "kdc"
{ "profile" = "/var/kerberos/krb5kdc/kdc.conf" } }
(* v4_name_convert in libdefaults *)
test Krb5.libdefaults get "[libdefaults]
default_realm = MY.REALM
clockskew = 300
v4_instance_resolve = false
v4_name_convert = {
host = {
rcmd = host
ftp = ftp
}
plain = {
something = something-else
}
}\n" =
{ "libdefaults"
{ "default_realm" = "MY.REALM" }
{ "clockskew" = "300" }
{ "v4_instance_resolve" = "false" }
{ "v4_name_convert"
{ "host" { "rcmd" = "host" } { "ftp" = "ftp" } }
{ "plain" { "something" = "something-else" } } } }
(* Test pam section *)
let pam_str = "[pam]
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
krb4_convert = false
"
test Krb5.lns get pam_str =
{ "pam"
{ "debug" = "false" }
{ "ticket_lifetime" = "36000" }
{ "renew_lifetime" = "36000" }
{ "forwardable" = "true" }
{ "krb4_convert" = "false" } }
(* Ticket #274 - multiple *enctypes values *)
let multiple_enctypes = "[libdefaults]
permitted_enctypes = arcfour-hmac-md5 arcfour-hmac des3-cbc-sha1 des-cbc-md5 des-cbc-crc aes128-cts
default_tgs_enctypes = des3-cbc-sha1 des-cbc-md5
default_tkt_enctypes = des-cbc-md5
"
test Krb5.lns get multiple_enctypes =
{ "libdefaults"
{ "permitted_enctypes" = "arcfour-hmac-md5" }
{ "permitted_enctypes" = "arcfour-hmac" }
{ "permitted_enctypes" = "des3-cbc-sha1" }
{ "permitted_enctypes" = "des-cbc-md5" }
{ "permitted_enctypes" = "des-cbc-crc" }
{ "permitted_enctypes" = "aes128-cts" }
{ "#eol" }
{ "default_tgs_enctypes" = "des3-cbc-sha1" }
{ "default_tgs_enctypes" = "des-cbc-md5" }
{ "#eol" }
{ "default_tkt_enctypes" = "des-cbc-md5" }
{ "#eol" }
}
(* Ticket #274 - v4_name_convert subsection *)
let v4_name_convert = "[realms]
EXAMPLE.COM = {
kdc = kerberos.example.com:88
admin_server = kerberos.example.com:749
default_domain = example.com
ticket_lifetime = 12h
v4_name_convert = {
host = {
rcmd = host
}
}
}
"
test Krb5.lns get v4_name_convert =
{ "realms"
{ "realm" = "EXAMPLE.COM"
{ "kdc" = "kerberos.example.com:88" }
{ "admin_server" = "kerberos.example.com:749" }
{ "default_domain" = "example.com" }
{ "ticket_lifetime" = "12h" }
{ "v4_name_convert"
{ "host"
{ "rcmd" = "host" }
}
}
}
}
(* Ticket #288: semicolons for comments *)
test Krb5.lns get "; AD : This Kerberos configuration is for CERN's Active Directory realm.\n" =
{ "#comment" = "AD : This Kerberos configuration is for CERN's Active Directory realm." }
(* RHBZ#1066419: braces in values *)
test Krb5.lns get "[libdefaults]\n
default_ccache_name = KEYRING:persistent:%{uid}\n" =
{ "libdefaults"
{ }
{ "default_ccache_name" = "KEYRING:persistent:%{uid}" } }
(* Include(dir) tests *)
let include_test = "include /etc/krb5.other_conf.d/other.conf
includedir /etc/krb5.conf.d/
"
test Krb5.lns get include_test =
{ "include" = "/etc/krb5.other_conf.d/other.conf" }
{ "includedir" = "/etc/krb5.conf.d/" }
let include2_test = "[logging]
default = FILE:/var/log/krb5libs.log
include /etc/krb5.other_conf.d/other.conf
includedir /etc/krb5.conf.d/
"
test Krb5.lns get include2_test =
{ "logging"
{ "default"
{ "file" = "/var/log/krb5libs.log" } }
{ }
}
{ "include" = "/etc/krb5.other_conf.d/other.conf" }
{ }
{ "includedir" = "/etc/krb5.conf.d/" }
(* [dbmodules] test *)
let dbmodules_test = "[dbmodules]
ATHENA.MIT.EDU = {
disable_last_success = true
}
db_module_dir = /some/path
"
test Krb5.lns get dbmodules_test =
{ "dbmodules"
{ "realm" = "ATHENA.MIT.EDU"
{ "disable_last_success" = "true" }
}
{ "db_module_dir" = "/some/path" }
}
(* [plugins] test *)
let plugins_test = "[plugins]
clpreauth = {
module = mypreauth:/path/to/mypreauth.so
}
ccselect = {
disable = k5identity
}
pwqual = {
module = mymodule:/path/to/mymodule.so
module = mymodule2:/path/to/mymodule2.so
enable_only = mymodule
}
kadm5_hook = {
}
"
test Krb5.lns get plugins_test =
{ "plugins"
{ "clpreauth"
{ "module" = "mypreauth:/path/to/mypreauth.so" }
}
{ "ccselect"
{ "disable" = "k5identity" }
}
{ "pwqual"
{ "module" = "mymodule:/path/to/mymodule.so" }
{ "module" = "mymodule2:/path/to/mymodule2.so" }
{ "enable_only" = "mymodule" }
}
{ "kadm5_hook"
}
}
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| test_access.aug | File | 3.44 KB | 0644 |
|
| test_activemq_conf.aug | File | 758 B | 0644 |
|
| test_activemq_xml.aug | File | 1.63 KB | 0644 |
|
| test_afs_cellalias.aug | File | 1.31 KB | 0644 |
|
| test_aliases.aug | File | 2.99 KB | 0644 |
|
| test_anaconda.aug | File | 2.07 KB | 0644 |
|
| test_anacron.aug | File | 1.21 KB | 0644 |
|
| test_approx.aug | File | 1.44 KB | 0644 |
|
| test_apt_update_manager.aug | File | 1.12 KB | 0644 |
|
| test_aptcacherngsecurity.aug | File | 1.17 KB | 0644 |
|
| test_aptconf.aug | File | 5.26 KB | 0644 |
|
| test_aptpreferences.aug | File | 1.86 KB | 0644 |
|
| test_aptsources.aug | File | 3.42 KB | 0644 |
|
| test_authinfo2.aug | File | 991 B | 0644 |
|
| test_authorized_keys.aug | File | 4.47 KB | 0644 |
|
| test_authselectpam.aug | File | 1.34 KB | 0644 |
|
| test_automaster.aug | File | 1.53 KB | 0644 |
|
| test_automounter.aug | File | 5.2 KB | 0644 |
|
| test_avahi.aug | File | 545 B | 0644 |
|
| test_backuppchosts.aug | File | 623 B | 0644 |
|
| test_bbhosts.aug | File | 3.68 KB | 0644 |
|
| test_bootconf.aug | File | 980 B | 0644 |
|
| test_build.aug | File | 8.12 KB | 0644 |
|
| test_cachefilesd.aug | File | 579 B | 0644 |
|
| test_carbon.aug | File | 2.54 KB | 0644 |
|
| test_ceph.aug | File | 4.86 KB | 0644 |
|
| test_cgconfig.aug | File | 5.93 KB | 0644 |
|
| test_cgrules.aug | File | 903 B | 0644 |
|
| test_channels.aug | File | 4.72 KB | 0644 |
|
| test_chrony.aug | File | 7.51 KB | 0644 |
|
| test_clamav.aug | File | 8.48 KB | 0644 |
|
| test_cmdline.aug | File | 1.01 KB | 0644 |
|
| test_cobblermodules.aug | File | 620 B | 0644 |
|
| test_cobblersettings.aug | File | 1.34 KB | 0644 |
|
| test_cockpit.aug | File | 2.07 KB | 0644 |
|
| test_collectd.aug | File | 1.3 KB | 0644 |
|
| test_cpanel.aug | File | 1.62 KB | 0644 |
|
| test_cron.aug | File | 1.96 KB | 0644 |
|
| test_cron_user.aug | File | 779 B | 0644 |
|
| test_crypttab.aug | File | 1.78 KB | 0644 |
|
| test_csv.aug | File | 1.56 KB | 0644 |
|
| test_cups.aug | File | 13.93 KB | 0644 |
|
| test_cyrus_imapd.aug | File | 1.33 KB | 0644 |
|
| test_darkice.aug | File | 575 B | 0644 |
|
| test_debctrl.aug | File | 13.94 KB | 0644 |
|
| test_desktop.aug | File | 1.23 KB | 0644 |
|
| test_devfsrules.aug | File | 2.17 KB | 0644 |
|
| test_device_map.aug | File | 797 B | 0644 |
|
| test_dhclient.aug | File | 4.69 KB | 0644 |
|
| test_dhcpd.aug | File | 15.07 KB | 0644 |
|
| test_dns_zone.aug | File | 10.33 KB | 0644 |
|
| test_dnsmasq.aug | File | 1.19 KB | 0644 |
|
| test_dovecot.aug | File | 22.3 KB | 0644 |
|
| test_dpkg.aug | File | 322 B | 0644 |
|
| test_dput.aug | File | 3.37 KB | 0644 |
|
| test_erlang.aug | File | 2.58 KB | 0644 |
|
| test_ethers.aug | File | 1.4 KB | 0644 |
|
| test_exports.aug | File | 1.69 KB | 0644 |
|
| test_fai_diskconfig.aug | File | 15.04 KB | 0644 |
|
| test_fail2ban.aug | File | 413 B | 0644 |
|
| test_fonts.aug | File | 19.45 KB | 0644 |
|
| test_fstab.aug | File | 4.45 KB | 0644 |
|
| test_fuse.aug | File | 590 B | 0644 |
|
| test_gdm.aug | File | 620 B | 0644 |
|
| test_getcap.aug | File | 3.77 KB | 0644 |
|
| test_group.aug | File | 1.09 KB | 0644 |
|
| test_grub.aug | File | 10.67 KB | 0644 |
|
| test_grubenv.aug | File | 2.44 KB | 0644 |
|
| test_gshadow.aug | File | 359 B | 0644 |
|
| test_gtkbookmarks.aug | File | 820 B | 0644 |
|
| test_host_conf.aug | File | 834 B | 0644 |
|
| test_hostname.aug | File | 103 B | 0644 |
|
| test_hosts.aug | File | 1.78 KB | 0644 |
|
| test_hosts_access.aug | File | 6.12 KB | 0644 |
|
| test_htpasswd.aug | File | 468 B | 0644 |
|
| test_httpd.aug | File | 16.32 KB | 0644 |
|
| test_inetd.aug | File | 4.51 KB | 0644 |
|
| test_inifile.aug | File | 11.64 KB | 0644 |
|
| test_inittab.aug | File | 1.82 KB | 0644 |
|
| test_inputrc.aug | File | 5.13 KB | 0644 |
|
| test_interfaces.aug | File | 3.65 KB | 0644 |
|
| test_iproute2.aug | File | 945 B | 0644 |
|
| test_iptables.aug | File | 7.39 KB | 0644 |
|
| test_iscsid.aug | File | 2.45 KB | 0644 |
|
| test_jaas.aug | File | 5.35 KB | 0644 |
|
| test_jettyrealm.aug | File | 982 B | 0644 |
|
| test_jmxaccess.aug | File | 637 B | 0644 |
|
| test_jmxpassword.aug | File | 653 B | 0644 |
|
| test_json.aug | File | 17.26 KB | 0644 |
|
| test_kdump.aug | File | 2.91 KB | 0644 |
|
| test_keepalived.aug | File | 14.56 KB | 0644 |
|
| test_known_hosts.aug | File | 1.79 KB | 0644 |
|
| test_koji.aug | File | 1.65 KB | 0644 |
|
| test_krb5.aug | File | 29.96 KB | 0644 |
|
| test_ldap.aug | File | 398 B | 0644 |
|
| test_ldif.aug | File | 3.88 KB | 0644 |
|
| test_ldso.aug | File | 486 B | 0644 |
|
| test_lightdm.aug | File | 3.98 KB | 0644 |
|
| test_limits.aug | File | 1.04 KB | 0644 |
|
| test_login_defs.aug | File | 528 B | 0644 |
|
| test_logrotate.aug | File | 7.95 KB | 0644 |
|
| test_logwatch.aug | File | 322 B | 0644 |
|
| test_lokkit.aug | File | 2.1 KB | 0644 |
|
| test_lvm.aug | File | 4.56 KB | 0644 |
|
| test_mailscanner.aug | File | 32.15 KB | 0644 |
|
| test_mailscanner_rules.aug | File | 2.6 KB | 0644 |
|
| test_masterpasswd.aug | File | 3.21 KB | 0644 |
|
| test_mcollective.aug | File | 1.2 KB | 0644 |
|
| test_mdadm_conf.aug | File | 2.52 KB | 0644 |
|
| test_memcached.aug | File | 1.15 KB | 0644 |
|
| test_mke2fs.aug | File | 3.08 KB | 0644 |
|
| test_modprobe.aug | File | 4.07 KB | 0644 |
|
| test_modules.aug | File | 229 B | 0644 |
|
| test_modules_conf.aug | File | 3.23 KB | 0644 |
|
| test_mongodbserver.aug | File | 775 B | 0644 |
|
| test_monit.aug | File | 1.03 KB | 0644 |
|
| test_multipath.aug | File | 6.5 KB | 0644 |
|
| test_mysql.aug | File | 8.75 KB | 0644 |
|
| test_nagioscfg.aug | File | 2.95 KB | 0644 |
|
| test_nagiosobjects.aug | File | 1.69 KB | 0644 |
|
| test_netmasks.aug | File | 640 B | 0644 |
|
| test_networkmanager.aug | File | 1.93 KB | 0644 |
|
| test_networks.aug | File | 1.16 KB | 0644 |
|
| test_nginx.aug | File | 7.64 KB | 0644 |
|
| test_nrpe.aug | File | 2.13 KB | 0644 |
|
| test_nslcd.aug | File | 12.84 KB | 0644 |
|
| test_nsswitch.aug | File | 1.54 KB | 0644 |
|
| test_ntp.aug | File | 5.09 KB | 0644 |
|
| test_ntpd.aug | File | 1.87 KB | 0644 |
|
| test_odbc.aug | File | 1.62 KB | 0644 |
|
| test_opendkim.aug | File | 7.57 KB | 0644 |
|
| test_openshift_config.aug | File | 3.64 KB | 0644 |
|
| test_openshift_http.aug | File | 2.16 KB | 0644 |
|
| test_openshift_quickstarts.aug | File | 12.42 KB | 0644 |
|
| test_openvpn.aug | File | 28.09 KB | 0644 |
|
| test_oz.aug | File | 611 B | 0644 |
|
| test_pagekite.aug | File | 2.75 KB | 0644 |
|
| test_pam.aug | File | 2.13 KB | 0644 |
|
| test_pamconf.aug | File | 1010 B | 0644 |
|
| test_passwd.aug | File | 2.44 KB | 0644 |
|
| test_pbuilder.aug | File | 531 B | 0644 |
|
| test_pg_hba.aug | File | 6.97 KB | 0644 |
|
| test_pgbouncer.aug | File | 1.97 KB | 0644 |
|
| test_php.aug | File | 1.4 KB | 0644 |
|
| test_phpvars.aug | File | 1.63 KB | 0644 |
|
| test_postfix_access.aug | File | 1.52 KB | 0644 |
|
| test_postfix_main.aug | File | 1.03 KB | 0644 |
|
| test_postfix_master.aug | File | 4.1 KB | 0644 |
|
| test_postfix_passwordmap.aug | File | 1.31 KB | 0644 |
|
| test_postfix_sasl_smtpd.aug | File | 530 B | 0644 |
|
| test_postfix_transport.aug | File | 1.71 KB | 0644 |
|
| test_postfix_virtual.aug | File | 1.23 KB | 0644 |
|
| test_postgresql.aug | File | 8.18 KB | 0644 |
|
| test_properties.aug | File | 3.62 KB | 0644 |
|
| test_protocols.aug | File | 1.3 KB | 0644 |
|
| test_puppet.aug | File | 547 B | 0644 |
|
| test_puppet_auth.aug | File | 1.1 KB | 0644 |
|
| test_puppetfile.aug | File | 4.45 KB | 0644 |
|
| test_puppetfileserver.aug | File | 949 B | 0644 |
|
| test_pylonspaste.aug | File | 1.73 KB | 0644 |
|
| test_pythonpaste.aug | File | 1.23 KB | 0644 |
|
| test_qpid.aug | File | 1.3 KB | 0644 |
|
| test_quote.aug | File | 8.66 KB | 0644 |
|
| test_rabbitmq.aug | File | 3.66 KB | 0644 |
|
| test_radicale.aug | File | 1.04 KB | 0644 |
|
| test_rancid.aug | File | 706 B | 0644 |
|
| test_redis.aug | File | 8.74 KB | 0644 |
|
| test_reprepro_uploaders.aug | File | 4.68 KB | 0644 |
|
| test_resolv.aug | File | 1.91 KB | 0644 |
|
| test_rhsm.aug | File | 4.46 KB | 0644 |
|
| test_rmt.aug | File | 826 B | 0644 |
|
| test_rsyncd.aug | File | 1.27 KB | 0644 |
|
| test_rsyslog.aug | File | 7.06 KB | 0644 |
|
| test_rtadvd.aug | File | 859 B | 0644 |
|
| test_rx.aug | File | 4.12 KB | 0644 |
|
| test_samba.aug | File | 3.52 KB | 0644 |
|
| test_schroot.aug | File | 2.25 KB | 0644 |
|
| test_securetty.aug | File | 636 B | 0644 |
|
| test_semanage.aug | File | 1.72 KB | 0644 |
|
| test_services.aug | File | 2.87 KB | 0644 |
|
| test_shadow.aug | File | 2.01 KB | 0644 |
|
| test_shells.aug | File | 348 B | 0644 |
|
| test_shellvars.aug | File | 19.15 KB | 0644 |
|
| test_shellvars_list.aug | File | 4.18 KB | 0644 |
|
| test_simplelines.aug | File | 724 B | 0644 |
|
| test_simplevars.aug | File | 994 B | 0644 |
|
| test_sip_conf.aug | File | 3.61 KB | 0644 |
|
| test_slapd.aug | File | 3.03 KB | 0644 |
|
| test_smbusers.aug | File | 664 B | 0644 |
|
| test_solaris_system.aug | File | 2.48 KB | 0644 |
|
| test_soma.aug | File | 424 B | 0644 |
|
| test_sos.aug | File | 1.16 KB | 0644 |
|
| test_spacevars.aug | File | 431 B | 0644 |
|
| test_splunk.aug | File | 2.96 KB | 0644 |
|
| test_squid.aug | File | 5.09 KB | 0644 |
|
| test_ssh.aug | File | 3.32 KB | 0644 |
|
| test_sshd.aug | File | 6.42 KB | 0644 |
|
| test_sssd.aug | File | 896 B | 0644 |
|
| test_star.aug | File | 1.56 KB | 0644 |
|
| test_strongswan.aug | File | 2.57 KB | 0644 |
|
| test_stunnel.aug | File | 791 B | 0644 |
|
| test_subversion.aug | File | 3.06 KB | 0644 |
|
| test_sudoers.aug | File | 10.72 KB | 0644 |
|
| test_sysconfig.aug | File | 4.1 KB | 0644 |
|
| test_sysconfig_route.aug | File | 522 B | 0644 |
|
| test_sysctl.aug | File | 2.47 KB | 0644 |
|
| test_syslog.aug | File | 11.05 KB | 0644 |
|
| test_systemd.aug | File | 8.71 KB | 0644 |
|
| test_termcap.aug | File | 16.69 KB | 0644 |
|
| test_thttpd.aug | File | 1.17 KB | 0644 |
|
| test_tinc.aug | File | 725 B | 0644 |
|
| test_tmpfiles.aug | File | 12.09 KB | 0644 |
|
| test_toml.aug | File | 8.9 KB | 0644 |
|
| test_trapperkeeper.aug | File | 4.15 KB | 0644 |
|
| test_tuned.aug | File | 259 B | 0644 |
|
| test_up2date.aug | File | 6.23 KB | 0644 |
|
| test_updatedb.aug | File | 855 B | 0644 |
|
| test_util.aug | File | 428 B | 0644 |
|
| test_vfstab.aug | File | 2.79 KB | 0644 |
|
| test_vmware_config.aug | File | 1.7 KB | 0644 |
|
| test_vsftpd.aug | File | 2.49 KB | 0644 |
|
| test_webmin.aug | File | 195 B | 0644 |
|
| test_wine.aug | File | 5.58 KB | 0644 |
|
| test_xendconfsxp.aug | File | 7.74 KB | 0644 |
|
| test_xinetd.aug | File | 2.78 KB | 0644 |
|
| test_xml.aug | File | 20.04 KB | 0644 |
|
| test_xorg.aug | File | 2.51 KB | 0644 |
|
| test_xymon.aug | File | 4.29 KB | 0644 |
|
| test_xymon_alerting.aug | File | 7.44 KB | 0644 |
|
| test_yaml.aug | File | 1.34 KB | 0644 |
|
| test_yum.aug | File | 8.31 KB | 0644 |
|