SELinux Archive on lore.kernel.org
 help / Atom feed
* [PATCH] python/semanage: Examples are no longer in the main semanage man page
@ 2019-01-31 19:41 Petr Lautrbach
  2019-01-31 22:06 ` Nicolas Iooss
  0 siblings, 1 reply; 3+ messages in thread
From: Petr Lautrbach @ 2019-01-31 19:41 UTC (permalink / raw)
  To: selinux; +Cc: Dan Walsh, Petr Lautrbach

From: Dan Walsh <dwalsh@redhat.com>

Signed-off-by: Petr Lautrbach <plautrba@redhat.com>
---
 python/semanage/semanage.8 | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8
index 0bdb90f4..0cdcfccd 100644
--- a/python/semanage/semanage.8
+++ b/python/semanage/semanage.8
@@ -57,9 +57,8 @@ to SELinux user identities (which controls the initial security context
 assigned to Linux users when they login and bounds their authorized role set)
 as well as security context mappings for various kinds of objects, such
 as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts)
-as well as the file context mapping. See the EXAMPLES section below for some
-examples of common usage.  Note that the semanage login command deals with the
-mapping from Linux usernames (logins) to SELinux user identities,
+as well as the file context mapping. Note that the semanage login command deals
+with the mapping from Linux usernames (logins) to SELinux user identities,
 while the semanage user command deals with the mapping from SELinux
 user identities to authorized role sets.  In most cases, only the
 former mapping needs to be adjusted by the administrator; the latter
-- 
2.20.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] python/semanage: Examples are no longer in the main semanage man page
  2019-01-31 19:41 [PATCH] python/semanage: Examples are no longer in the main semanage man page Petr Lautrbach
@ 2019-01-31 22:06 ` Nicolas Iooss
  2019-02-05  7:19   ` Nicolas Iooss
  0 siblings, 1 reply; 3+ messages in thread
From: Nicolas Iooss @ 2019-01-31 22:06 UTC (permalink / raw)
  To: Petr Lautrbach; +Cc: selinux, Dan Walsh

On Thu, Jan 31, 2019 at 8:41 PM Petr Lautrbach <plautrba@redhat.com> wrote:
>
> From: Dan Walsh <dwalsh@redhat.com>
>
> Signed-off-by: Petr Lautrbach <plautrba@redhat.com>

Indeed, commit 1925e1e91d99 ("Break the semanage man page into
different man pages per category.") moved the examples in 2013.

Acked-by: Nicolas Iooss <nicolas.iooss@m4x.org>

> ---
>  python/semanage/semanage.8 | 5 ++---
>  1 file changed, 2 insertions(+), 3 deletions(-)
>
> diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8
> index 0bdb90f4..0cdcfccd 100644
> --- a/python/semanage/semanage.8
> +++ b/python/semanage/semanage.8
> @@ -57,9 +57,8 @@ to SELinux user identities (which controls the initial security context
>  assigned to Linux users when they login and bounds their authorized role set)
>  as well as security context mappings for various kinds of objects, such
>  as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts)
> -as well as the file context mapping. See the EXAMPLES section below for some
> -examples of common usage.  Note that the semanage login command deals with the
> -mapping from Linux usernames (logins) to SELinux user identities,
> +as well as the file context mapping. Note that the semanage login command deals
> +with the mapping from Linux usernames (logins) to SELinux user identities,
>  while the semanage user command deals with the mapping from SELinux
>  user identities to authorized role sets.  In most cases, only the
>  former mapping needs to be adjusted by the administrator; the latter
> --
> 2.20.1
>


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] python/semanage: Examples are no longer in the main semanage man page
  2019-01-31 22:06 ` Nicolas Iooss
@ 2019-02-05  7:19   ` Nicolas Iooss
  0 siblings, 0 replies; 3+ messages in thread
From: Nicolas Iooss @ 2019-02-05  7:19 UTC (permalink / raw)
  To: Petr Lautrbach; +Cc: selinux, Dan Walsh

On Thu, Jan 31, 2019 at 11:06 PM Nicolas Iooss <nicolas.iooss@m4x.org> wrote:
>
> On Thu, Jan 31, 2019 at 8:41 PM Petr Lautrbach <plautrba@redhat.com> wrote:
> >
> > From: Dan Walsh <dwalsh@redhat.com>
> >
> > Signed-off-by: Petr Lautrbach <plautrba@redhat.com>
>
> Indeed, commit 1925e1e91d99 ("Break the semanage man page into
> different man pages per category.") moved the examples in 2013.
>
> Acked-by: Nicolas Iooss <nicolas.iooss@m4x.org>

Merged. Thanks
Nicolas

> > ---
> >  python/semanage/semanage.8 | 5 ++---
> >  1 file changed, 2 insertions(+), 3 deletions(-)
> >
> > diff --git a/python/semanage/semanage.8 b/python/semanage/semanage.8
> > index 0bdb90f4..0cdcfccd 100644
> > --- a/python/semanage/semanage.8
> > +++ b/python/semanage/semanage.8
> > @@ -57,9 +57,8 @@ to SELinux user identities (which controls the initial security context
> >  assigned to Linux users when they login and bounds their authorized role set)
> >  as well as security context mappings for various kinds of objects, such
> >  as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts)
> > -as well as the file context mapping. See the EXAMPLES section below for some
> > -examples of common usage.  Note that the semanage login command deals with the
> > -mapping from Linux usernames (logins) to SELinux user identities,
> > +as well as the file context mapping. Note that the semanage login command deals
> > +with the mapping from Linux usernames (logins) to SELinux user identities,
> >  while the semanage user command deals with the mapping from SELinux
> >  user identities to authorized role sets.  In most cases, only the
> >  former mapping needs to be adjusted by the administrator; the latter
> > --
> > 2.20.1
> >


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, back to index

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-01-31 19:41 [PATCH] python/semanage: Examples are no longer in the main semanage man page Petr Lautrbach
2019-01-31 22:06 ` Nicolas Iooss
2019-02-05  7:19   ` Nicolas Iooss

SELinux Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/selinux/0 selinux/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 selinux selinux/ https://lore.kernel.org/selinux \
		selinux@vger.kernel.org selinux@archiver.kernel.org
	public-inbox-index selinux


Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.selinux


AGPL code for this site: git clone https://public-inbox.org/ public-inbox