You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@knox.apache.org by kr...@apache.org on 2019/03/03 21:12:17 UTC

svn commit: r1854744 - in /knox: site/books/knox-1-3-0/user-guide.html trunk/books/1.3.0/config.md

Author: krisden
Date: Sun Mar  3 21:12:17 2019
New Revision: 1854744

URL: http://svn.apache.org/viewvc?rev=1854744&view=rev
Log:
Fix minor typos

Modified:
    knox/site/books/knox-1-3-0/user-guide.html
    knox/trunk/books/1.3.0/config.md

Modified: knox/site/books/knox-1-3-0/user-guide.html
URL: http://svn.apache.org/viewvc/knox/site/books/knox-1-3-0/user-guide.html?rev=1854744&r1=1854743&r2=1854744&view=diff
==============================================================================
--- knox/site/books/knox-1-3-0/user-guide.html (original)
+++ knox/site/books/knox-1-3-0/user-guide.html Sun Mar  3 21:12:17 2019
@@ -1678,8 +1678,8 @@ ls -alrt {GATEWAY_HOME}/data/deployment
 </code></pre>
   </li>
   <li>
-    <p>Verify that clients can use the CA authority cert to access Knox (which is the goal of using  public signed cert) using curl or a web browsers which has the CA certificate installed</p>
-    <pre><code>curl --cacert supwin12ad.cer -u hdptester:hadoop -X GET &#39;https://$fqdn_knox:8443/gateway/$topologyname/webhdfs/v1/tmp?op=LISTSTATUS&#39;
+    <p>Verify that clients can use the CA authority cert to access Knox (which is the goal of using  public signed cert) using curl or a web browser which has the CA certificate installed</p>
+    <pre><code>curl --cacert PATH_TO_CA_CERT -u tom:tom-password -X GET https://localhost:8443/gateway/sandbox/webhdfs/v1?op=GETHOMEDIRECTORY
 </code></pre>
   </li>
 </ol>

Modified: knox/trunk/books/1.3.0/config.md
URL: http://svn.apache.org/viewvc/knox/trunk/books/1.3.0/config.md?rev=1854744&r1=1854743&r2=1854744&view=diff
==============================================================================
--- knox/trunk/books/1.3.0/config.md (original)
+++ knox/trunk/books/1.3.0/config.md Sun Mar  3 21:12:17 2019
@@ -1041,9 +1041,9 @@ configure the Knox Gateway to use it.
         ls -alrt {GATEWAY_HOME}/data/deployment
 
 6. Verify that clients can use the CA authority cert to access Knox (which is the goal of using 
-   public signed cert) using curl or a web browsers which has the CA certificate installed
+   public signed cert) using curl or a web browser which has the CA certificate installed
 
-        curl --cacert supwin12ad.cer -u hdptester:hadoop -X GET 'https://$fqdn_knox:8443/gateway/$topologyname/webhdfs/v1/tmp?op=LISTSTATUS'
+        curl --cacert PATH_TO_CA_CERT -u tom:tom-password -X GET https://localhost:8443/gateway/sandbox/webhdfs/v1?op=GETHOMEDIRECTORY
   
 
 ##### Credential Store #####