PERFORCE change 92299 for review

Todd Miller millert at FreeBSD.org
Thu Feb 23 12:12:28 PST 2006


http://perforce.freebsd.org/chv.cgi?CH=92299

Change 92299 by millert at millert_g4tower on 2006/02/23 20:11:32

	Update to reflect newrole name change.

Affected files ...

.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/Makefile#4 edit
.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/newrole.1#2 edit
.. //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/newrole.c#2 edit

Differences ...

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/Makefile#4 (text+ko) ====

@@ -1,9 +1,9 @@
 include ../../../Makeconfig
 
-PROG= sebsd_newrole
-MAN1= sebsd_newrole.1
+PROG= newrole
+MAN1= newrole.1
 
-OBJS= sebsd_newrole.o
+OBJS= newrole.o
 
 CFLAGS+= $(DARWIN_HDRS)
 CFLAGS+= -I$(SOURCE_ROOT)/sedarwin

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/newrole.1#2 (text+ko) ====

@@ -30,18 +30,18 @@
 .\"
 .\" $FreeBSD: $
 .Dd August 27, 2003
-.Dt SEBSD_NEWROLE 1
+.Dt NEWROLE 1
 .Os
 .Sh NAME
-.Nm sebsd_newrole
+.Nm newrole
 .Nd run a shell with a new role
 .Sh SYNOPSIS
-.Nm sebsd_newrole
+.Nm newrole
 .Ar ...
 .Sh DESCRIPTION
 The
-.Nm sebsd_newrole
+.Nm newrole
 utility runs a new shell in a new security context.
 The new context is derived from the old context in which 
-.Ar sebsd_newrole
+.Ar newrole
 is originally executed.

==== //depot/projects/trustedbsd/sedarwin7/src/sedarwin/programs/newrole/newrole.c#2 (text+ko) ====

@@ -29,7 +29,7 @@
 #include <sedarwin/sebsd.h>
 #include <sedarwin/flask_types.h>
 
-#define SEBSD_SERVICE_NAME "sebsd_newrole"
+#define SERVICE_NAME "newrole"
 
 extern char **environ;
 
@@ -68,7 +68,7 @@
 	  NULL
 	};
 
-	error = pam_start(SEBSD_SERVICE_NAME, pw->pw_name, &pam_conversation, 
+	error = pam_start(SERVICE_NAME, pw->pw_name, &pam_conversation, 
 	    &pam_handle);
 	if (error != PAM_SUCCESS) {
 		fprintf(stderr, "Error, failed to initialize PAM\n");
@@ -102,8 +102,8 @@
 	mac_t execlabel;
 
 	if (!sebsd_enabled()) {
-		fprintf(stderr, "Sorry, sebsd_newrole may only be used when "
-		    "the SEBSD security module is loaded\n");
+		fprintf(stderr, "Sorry, newrole may only be used when "
+		    "the SEDarwin security module is loaded\n");
 		exit(1);
 	}
 
@@ -231,6 +231,6 @@
 usage(void)
 {
 
-	fprintf(stderr, "usage: sebsd_newrole -r role [ -t type ] [ args ]\n");
+	fprintf(stderr, "usage: newrole -r role [ -t type ] [ args ]\n");
 	exit(1);
 }


More information about the trustedbsd-cvs mailing list