source: examples/passphrase_tests/python/acme_rockets_rt0_hand/README @ 340bd01

mei_rt2mei_rt2_fix_1
Last change on this file since 340bd01 was ba6027a, checked in by Mei <mei@…>, 12 years ago

1) modified code all around to add support for encrypted private key for

ID credential

2) add new abac_key_t structure (abac_key.c)
3) add new keycheck option to creddy
4) add 2 new test suites

  • Property mode set to 100755
File size: 1.2 KB
Line 
1# !!!NOTE!!!
2# The passphrase is not in saved in a file and so this test needs to be
3# run by hand, and user will be prompted when the Acme principal credential
4# is being created and also when two attribute policy credentials are being
5# baked.
6#
7# To run the test,  run_test
8#
9#
10# The example makes use of 2 principals, Acme and Coyote.
11#
12# This example shows a very simple delegation of roles by Acme.  Acme's
13# buy_rockets role includes all of Acme's preferred customers.
14# The setup.py creates the principals where Acme is using a pre-existing
15# encrypted key file and the attr.py creates 2 policy credentials. 
16#
17# Credential 1 encodes the policy that all of Acme's preferred customers
18# can buy rockets from Acme
19# Credential 2 defines the Coyote as an Acme preferred customer.
20#
21# The ./run_query script issues queries to show that the Coyote is both a preferred
22# customer and can buy rockets.  Two invalid queries are also made, checking if
23# Acme is the Coyote's friend, which it isn't and whether a query about
24# something other than a principal works (it doesn't).
25
26# acme_rockets_rt0
27
28# Credential 1
29#[keyid:Acme].role:buy_rockets <- [keyid:Acme].role:preferred_customer
30
31# Credential 2
32#[keyid:Acme].role:preferred_customer <- [keyid:Coyote]
33
34
Note: See TracBrowser for help on using the repository browser.