@@ -137,23 +137,23 @@ The following free functions may be used to create the authentication secrets fi
137137 - ` irods.client_init.write_native_irodsA_file `
138138 - ` irods.client_init.write_pam_irodsA_file `
139139
140- These functions can roughly be described as duplicating the function of ` iinit ` ,
140+ These functions can roughly be described as duplicating the "authentication" functionality of ` iinit ` ,
141141provided that a valid ` irods_environment.json ` has already been created.
142142
143143Each of the above functions can take a cleartext password and write an appropriately encoded
144- version of it into an authentication in the appropriate location. That location is
144+ version of it into an authentication file in the appropriate location. That location is
145145` ~/.irods/.irodsA ` unless the environment variable IRODS_AUTHENTICATION_FILE has been set
146146in the command shell to dictate an alternative file path.
147147
148148As an example, here we write a native ` .irodsA ` file using the first of the two functions. We
149- provide the one required argument, a password string entered - in this case - interactively at the
149+ provide the one required argument, a password string which entered interactively at the
150150terminal.
151151
152152``` bash
153- bash $ echo ' { "irods_user_name":"rods",
154- ... # other parameters as needed
155- }' > ~ /.irods/irods_environment.json
156- bash $ python -c " import irods.client_init, getpass
153+ $ echo ' { "irods_user_name":"rods",
154+ ... # other parameters as needed
155+ }' > ~ /.irods/irods_environment.json
156+ $ python -c " import irods.client_init, getpass
157157irods.client_init.write_native_irodsA_file(getpass.getpass('Enter iRODS password -> '))"
158158```
159159
@@ -164,22 +164,22 @@ is raised to warn of any older `.irodsA` file that might otherwise have been ove
164164Equivalently to the above, we can issue the following command.
165165
166166``` bash
167- bash $ prc_write_irodsA.py native <<< " ${MY_CURRENT_IRODS_PASSWORD}"
167+ $ prc_write_irodsA.py native <<< " ${MY_CURRENT_IRODS_PASSWORD}"
168168```
169169
170170The redirect may of course be left off, in which case the user is prompted for the iRODS password
171- and echo of the keyboard input will be suppressed, in the style of ` iinit ` . Regardless
171+ and echo of the keyboard input will be suppressed, in the style of ` iinit ` . Regardless of
172172which technique is used, no password will be visible on the terminal during or after input.
173173
174174For the ` pam_password ` scheme, typically SSL/TLS must first be enabled to avoid sending data related
175175to the password - or even sending the raw password itself - over a network connection in the clear.
176176
177- Thus for ` pam_password ` authentication to work well, we should first ensure, when setting up the
177+ Thus, for ` pam_password ` authentication to work well, we should first ensure, when setting up the
178178client environment, to include within ` irods_environment.json ` the appropriate SSL/TLS connection
179179parameters. In a pinch, ` iinit ` can be used to verify this prerequisite is fulfilled,
180- as its invocation would then create a valid .irodsA from merely prompting the user for their PAM password.
180+ as its invocation would then create a valid ` .irodsA ` from merely prompting the user for their PAM password.
181181
182- Once again, this can also be done either using the free function directly:
182+ Once again, this can also be done using the free function directly:
183183
184184``` python
185185irods.client_init.write_pam_irodsA_file(getpass.getpass(' Enter current PAM password -> ' ))
@@ -188,10 +188,10 @@ irods.client_init.write_pam_irodsA_file(getpass.getpass('Enter current PAM passw
188188or from the Bash command shell:
189189
190190``` bash
191- bash $ prc_write_irodsA.py pam_password <<< " ${MY_CURRENT_PAM_PASSWORD}"
191+ $ prc_write_irodsA.py pam_password <<< " ${MY_CURRENT_PAM_PASSWORD}"
192192```
193193
194- As a final note, in the " pam_password" scheme the default SSL requirement can be disabled.
194+ As a final note, in the ` pam_password ` scheme, the default SSL requirement can be disabled.
195195** Warning:** Disabling the SSL requirement may cause user passwords to be sent over the network
196196in the clear. This should only be done for purposes of testing. Here's how to do it:
197197
0 commit comments