09-24-2014
Regarding suggestion
Hello Admin/moderators Team,
Greetings !!
This is regarding a suggestion which may help our forum if this is possible.
Quote:
Hello Team,
Could we please make a status/flag/identifier to each POST(only answers to Requestor's post). Example is as follows.
Lets say if a Requestor has posted a question and we have 5 answers to it, out of them 1 is accurate answer of it and others are helpful answers. So we can make a button where Requestor/Admin can decide which post is accurate and which is helpful and once Requestor/Admin selects the same that POST will be attached with a GREEN color and other helpful posts(Selected by Requestor) made by other users can be turned to yellow etc color. Coloring/Setting flags doesn't mean the posts which are helpful are not correct it will only help people/users.
This may benifit us, when we are searching for a specific solution and we have very short time for same so for time being we can see flag of the post and can directly read the GREEN color post(which is the accurate answer of post seleced by Requestor) in spite of reading all posts, also we can refer other helpful posts too and can save our time.
This is just my opinion to make this wonderful forum more helpful for people, if this helps us I will be grateful.
Want to know the thoughts of all admins/moderators/Advisors/users on same.
Thanks,
R. Singh
Thanks,
R. Singh
"GOD helps those who help themselves"
9 More Discussions You Might Find Interesting
1. Post Here to Contact Site Administrators and Moderators
As I was just pondering to myself I relized that emergency's do happen and there are times when people need an anwser to their problem ASAP. So what i was thinking why not add a live chat to this board this way people could chat amongst each other in real time. I know this could be done with a... (1 Reply)
Discussion started by: tovsky
1 Replies
2. Programming
I am a student and I love the computer very much ,
especially in programming. However I know little about
programming .
I don't know which I should learn (JAVA and C++).
Would you like to give me a suggestion ?
Thanks! (6 Replies)
Discussion started by: camel
6 Replies
3. Shell Programming and Scripting
can anyone rite here guide me. i want to know which reference books that all of you recommended for C Shell dummies like me...(beginner) (1 Reply)
Discussion started by: unknown2205
1 Replies
4. Shell Programming and Scripting
Hi all:
I need your suggestion about how to making this script
Purpose:-
Monitor log for the system
OS: Unix Sun Solaris 10
Hold oracle database 10 g
Life time for the system cycle to 48 hours
the system working as the follow
1- the system is divided into three steps
2-... (0 Replies)
Discussion started by: dellsh
0 Replies
5. Post Here to Contact Site Administrators and Moderators
Can we have a forum that is dedicated to topics concerning power management ? It'd be great to have a few moderators to address these issues concerning the power-management. More-so-ever since research related to power management at the OS level is kicking up a lot of dust and becoming a hot area... (7 Replies)
Discussion started by: vishwamitra
7 Replies
6. UNIX for Dummies Questions & Answers
Hello,
I'm working on a Linux 2.6.32-33-server (Ubuntu 4.4.3).
I typed in man -k package and got e.g. apt
I typed in apt --help and got:
The program 'apt' is currently not installed. You can install it by typing:
sudo apt-get install openjdk-6-jdkI don't understand where this... (2 Replies)
Discussion started by: daWonderer
2 Replies
7. Shell Programming and Scripting
Hi,
I have the requirement to run multiple SQLs against database running on a server and save the output of SQL executed to a log.
I thought about writing a Function in sh that will take file name as argument and function should return the SQL output to calling program. E.g.
function Run_SQL... (0 Replies)
Discussion started by: bhupinder08
0 Replies
8. Shell Programming and Scripting
Hi folks,
Any good suggestion concerning this BASH search script?
#Any good suggestions for this simple search shell?
#================================
#!/bin/bash
clear
echo "Enter File Name for search"
echo
read filename
locate $filename
if ;
then
echo No such file... (1 Reply)
Discussion started by: leo_ultra_leo
1 Replies
9. IP Networking
I'm searching to learn linux coding for a month but no clear about the where to start . Right now i'm in networking but not much interested in this maintenance jobs . I'm looking to create my own product in wireless network and also having idea about gadget that can be useful for students . But i... (1 Reply)
Discussion started by: Cholasivam
1 Replies
LEARN ABOUT SUSE
request-key.conf
REQUEST-KEY.CONF(5) Linux Key Management Utilities REQUEST-KEY.CONF(5)
NAME
request-key.conf - Instantiation handler configuration file
DESCRIPTION
This file is used by the /sbin/request-key program to determine which program it should run to instantiate a key.
request-key works scans through the file a line at a time until it finds a match, which it will then use. If it doesn't find a match, it'll
return an error and the kernel will automatically negate the key.
Any blank line or line beginning with a hash mark '#' is considered to be a comment and ignored.
All other lines are assumed to be command lines with a number of white space separated fields:
<op> <type> <description> <callout-info> <prog> <arg1> <arg2> ...
The first four fields are used to match the parameters passed to request-key by the kernel. op is the operation type; currently the only
supported operation is "create".
type, description and callout-info match the three parameters passed to keyctl request2 or the request_key() system call. Each of these may
contain one or more asterisk '*' characters as wildcards anywhere within the string.
Should a match be made, the program specified by <prog> will be exec'd. This must have a fully qualified path name. argv[0] will be set
from the part of the program name that follows the last slash '/' character.
If the program name is prefixed with a pipe bar character '|', then the program will be forked and exec'd attached to three pipes. The
callout information will be piped to it on it's stdin and the intended payload data will be retrieved from its stdout. Anything sent to
stderr will be posted in syslog. If the program exits 0, then /sbin/request-key will attempt to instantiate the key with the data read from
stdout. If it fails in any other way, then request-key will attempt to execute the appropriate 'negate' operation command.
The program arguments can be substituted with various macros. Only complete argument substitution is supported - macro substitutions can't
be embedded. All macros begin with a percent character '%'. An argument beginning with two percent characters will have one of them dis-
carded.
The following macros are supported:
%o Operation type
%k Key ID
%t Key type
%d Key description
%c Callout information
%u Key UID
%g Key GID
%T Requestor's thread keyring
%P Requestor's process keyring
%S Requestor's session keyring
There's another macro substitution too that permits the interpolation of the contents of a key:
%{<type>:<description>}
This performs a lookup for a key of the given type and description on the requestor's keyrings, and if found, substitutes the contents for
the macro. If not found an error will be logged and the key under construction will be negated.
EXAMPLE
A basic file will be installed in the /etc. This will contain two debugging lines that can be used to test the installation:
create user debug:* negate /bin/keyctl negate %k 30 %S
create user debug:loop:* * |/bin/cat
create user debug:* * /usr/share/keyutils/request-key-debug.sh %k %d %c %S
negate * * * /bin/keyctl negate %k 30 %S
This is set up so that something like:
keyctl request2 user debug:xxxx negate
will create a negative user-defined key, something like:
keyctl request2 user debug:yyyy spoon
will create an instantiated user-defined key with "Debug spoon" as the payload, and something like:
keyctl request2 user debug:loop:zzzz abcdefghijkl
will create an instantiated user-defined key with the callout information as the payload.
FILES
/etc/request-key.conf
SEE ALSO
keyctl(1), request-key.conf(5)
Linux 11 July 2005 REQUEST-KEY.CONF(5)