From 09946663134c8b7ef3991080b0786b3e851850ba Mon Sep 17 00:00:00 2001 From: Russ Allbery Date: Fri, 6 Oct 2006 03:53:27 +0000 Subject: Add a document on the NetDB role API, now that Rob has finished it. --- doc/netdb-role-api | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 doc/netdb-role-api (limited to 'doc') diff --git a/doc/netdb-role-api b/doc/netdb-role-api new file mode 100644 index 0000000..6dbcfa4 --- /dev/null +++ b/doc/netdb-role-api @@ -0,0 +1,32 @@ + NetDB Role API + +Basic API + + remctl netdb-node-roles-rc netdb node-roles + + Note that the remctl principal used here is actually the underlying + host principal, not the principal for that alias. must be + fully qualified. This will return a list of all roles that + has with , chosen from admin, team, or user. For our purposes, + we probably want to look at admin and team, but we may want user as + well. + + You must be a current NetDB user to use it. It just sucks rows out of + a view matching on the SUNet ID and node name, so getting no result + can mean "no such SUNet ID," "no such node," or "SUNet ID isn't + associated with node." + +Examples + + % remctl netdb-node-roles-rc netdb node-roles riepel zathras.stanford.edu + admin + team + user + % remctl netdb-node-roles-rc netdb node-roles riepel calgon.stanford.edu + admin + % + +Wallet Issues + + We'll need to get a principal registered to use it that can query + anything for any node but isn't otherwise authorized to use NetDB. -- cgit v1.2.3