@@ -137,23 +137,23 @@ The following free functions may be used to create the authentication secrets fi
137
137
- ` irods.client_init.write_native_irodsA_file `
138
138
- ` irods.client_init.write_pam_irodsA_file `
139
139
140
- These functions can roughly be described as duplicating the function of ` iinit ` ,
140
+ These functions can roughly be described as duplicating the "authentication" functionality of ` iinit ` ,
141
141
provided that a valid ` irods_environment.json ` has already been created.
142
142
143
143
Each of the above functions can take a cleartext password and write an appropriately encoded
144
- version of it into an authentication in the appropriate location. That location is
144
+ version of it into an authentication file in the appropriate location. That location is
145
145
` ~/.irods/.irodsA ` unless the environment variable IRODS_AUTHENTICATION_FILE has been set
146
146
in the command shell to dictate an alternative file path.
147
147
148
148
As an example, here we write a native ` .irodsA ` file using the first of the two functions. We
149
- provide the one required argument, a password string entered - in this case - interactively at the
149
+ provide the one required argument, a password string which entered interactively at the
150
150
terminal.
151
151
152
152
``` bash
153
- bash $ echo ' { "irods_user_name":"rods",
154
- ... # other parameters as needed
155
- }' > ~ /.irods/irods_environment.json
156
- bash $ python -c " import irods.client_init, getpass
153
+ $ echo ' { "irods_user_name":"rods",
154
+ ... # other parameters as needed
155
+ }' > ~ /.irods/irods_environment.json
156
+ $ python -c " import irods.client_init, getpass
157
157
irods.client_init.write_native_irodsA_file(getpass.getpass('Enter iRODS password -> '))"
158
158
```
159
159
@@ -164,22 +164,22 @@ is raised to warn of any older `.irodsA` file that might otherwise have been ove
164
164
Equivalently to the above, we can issue the following command.
165
165
166
166
``` bash
167
- bash $ prc_write_irodsA.py native <<< " ${MY_CURRENT_IRODS_PASSWORD}"
167
+ $ prc_write_irodsA.py native <<< " ${MY_CURRENT_IRODS_PASSWORD}"
168
168
```
169
169
170
170
The redirect may of course be left off, in which case the user is prompted for the iRODS password
171
- and echo of the keyboard input will be suppressed, in the style of ` iinit ` . Regardless
171
+ and echo of the keyboard input will be suppressed, in the style of ` iinit ` . Regardless of
172
172
which technique is used, no password will be visible on the terminal during or after input.
173
173
174
174
For the ` pam_password ` scheme, typically SSL/TLS must first be enabled to avoid sending data related
175
175
to the password - or even sending the raw password itself - over a network connection in the clear.
176
176
177
- Thus for ` pam_password ` authentication to work well, we should first ensure, when setting up the
177
+ Thus, for ` pam_password ` authentication to work well, we should first ensure, when setting up the
178
178
client environment, to include within ` irods_environment.json ` the appropriate SSL/TLS connection
179
179
parameters. In a pinch, ` iinit ` can be used to verify this prerequisite is fulfilled,
180
- as its invocation would then create a valid .irodsA from merely prompting the user for their PAM password.
180
+ as its invocation would then create a valid ` .irodsA ` from merely prompting the user for their PAM password.
181
181
182
- Once again, this can also be done either using the free function directly:
182
+ Once again, this can also be done using the free function directly:
183
183
184
184
``` python
185
185
irods.client_init.write_pam_irodsA_file(getpass.getpass(' Enter current PAM password -> ' ))
@@ -188,10 +188,10 @@ irods.client_init.write_pam_irodsA_file(getpass.getpass('Enter current PAM passw
188
188
or from the Bash command shell:
189
189
190
190
``` bash
191
- bash $ prc_write_irodsA.py pam_password <<< " ${MY_CURRENT_PAM_PASSWORD}"
191
+ $ prc_write_irodsA.py pam_password <<< " ${MY_CURRENT_PAM_PASSWORD}"
192
192
```
193
193
194
- As a final note, in the " pam_password" scheme the default SSL requirement can be disabled.
194
+ As a final note, in the ` pam_password ` scheme, the default SSL requirement can be disabled.
195
195
** Warning:** Disabling the SSL requirement may cause user passwords to be sent over the network
196
196
in the clear. This should only be done for purposes of testing. Here's how to do it:
197
197
0 commit comments