Verifies the contents of a cluster security services ACL file.
ctaclfck -f acl_file_name [-s] [-c] [-u user_name] [-v] [-h]
The ctaclfck command checks the contents of the cluster security services ACL file specified by the -f flag. The check is limited to syntactical errors; a semantic check is not performed.
The command opens the ACL file, and reads and compiles one ACL entry at a time. If the command encounters an error, it will report the error to standard output. If the -c flag is provided, the command will continue processing after encountering errors until it reaches the end of the file. Otherwise processing will stop after the first error is found and reported.
The -u flag directs the command to verify the ACL file contents owned by the specified operating system user identity. The command user must have permission to change to the home directory of the user specified by the -u flag, and must also have permission to read files in that directory. If the -s flag is specified along with the -u flag, the command user must also have permission to set its effective user identity to this identity (see the man page for the operating system command su for examples).
When the -u flag is specified, the file name provided in the -f flag is expected to be the base name of a file that resides in the home directory of the named user. In this case, the file name specified by the -f flag must not contain any directory names, including the ./ and ../ directories.
If the -s flag is specified, the command creates a file to contain the compiled contents of the ACL file. This permits applications to compile the ACL data buffer in advance to starting the application that uses it, saving the application this processing during its startup procedure or its ACL reading process. The compiled ACL file will have the same name as the ACL file with the extension .cacl. The ownership and file system permissions of the new *.cacl file will be set to the same ownership and permissions as the ACL file. If the ACL file is not currently owned by the command user, the command user must be capable of changing its effective user identity to the identity of the user that owns the ACL file. If the command is unable to do this, it will not create the ACL buffer file, but will complete verification of the ACL file.
Entry Type | |
---|---|
r |
|
w |
|
c |
|
x |
|
C |
|
q |
|
l |
|
e |
|
d |
|
v |
|
s |
|
If the -u flag is specified, the command searches for the ACL file in the home directory of the specified user. The user must own the file and the permission must be write-only by the user. When the -u flag is specified, the ACL file name specified by the -f flag must not contain a relative or full path to the file; it must specify the file name only.
The file system permission of the ACL file is determined by the end user or the application owning the file. If the invoker does not have sufficient authority to read the file or to create the requested compiled ACL file with the same ownership, the command fails.
The ctaclfck command works only on ACL files formatted for cluster security services.
ctaclfck -f /my_acl_file
ctaclfck -f ../my_acl_file -v
ctaclfck -c -u fluffy -f my_acl_file -v -s