Replace "sq link" mentions with "sq pki link"

- While the commit b5a7d157104de80b823091cfc37fc7096e752b38 moved the
   "sq link" command under "sq pki", there are some left-overs in the
   error messages.

Signed-off-by: Daiki Ueno <dueno@redhat.com>
This commit is contained in:
Daiki Ueno 2024-04-19 16:00:09 +09:00 committed by Neal H. Walfield
parent 9be9f83e72
commit 9483554e61
No known key found for this signature in database
GPG Key ID: 6863C9AD5B4D22D3
4 changed files with 9 additions and 9 deletions

View File

@ -573,9 +573,9 @@ impl Method {
wprintln!(
"Created the local CA {} for certifying \
certificates downloaded from this service. \
Use `sq link add --ca '*' --amount N {}` \
Use `sq pki link add --ca '*' --amount N {}` \
to change how much it is trusted. Or \
`sq link retract {}` to disable it.",
`sq pki link retract {}` to disable it.",
if let Ok(cert) = cert.to_cert() {
// We really want the self-signed, primary user
// ID.
@ -591,8 +591,8 @@ impl Method {
MSG.call_once(|| {
wprintln!("Note: Created a local CA to record \
provenance information.\n\
Note: See `sq link list --ca` \
and `sq link --help` for more \
Note: See `sq pki link list --ca` \
and `sq pki link --help` for more \
information.");
});
}

View File

@ -339,7 +339,7 @@ pub fn add(config: Config, c: link::AddCommand)
let mut userids =
check_userids(&config, &cert, true, &c.userid, &c.email, &c.pattern)
.context("sq link add: Invalid User IDs")?;
.context("sq pki link add: Invalid User IDs")?;
userids.extend(c.petname.iter().map(|petname| {
// If it is a bare email, we wrap it in angle brackets.
if UserIDQueryParams::is_email(petname).is_ok() {
@ -513,7 +513,7 @@ pub fn add(config: Config, c: link::AddCommand)
} else {
wprintln!("Note: {:?} is NOT a self signed User ID. \
If this was a mistake, use \
`sq link retract {} \"{}\"` to undo it.",
`sq pki link retract {} \"{}\"` to undo it.",
userid_str(), cert.fingerprint(), userid);
}
@ -619,7 +619,7 @@ pub fn retract(config: Config, c: link::RetractCommand)
let mut userids =
check_userids(&config, &cert, false, &c.userid, &c.email, &c.pattern)
.context("sq link retract: Invalid User IDs")?;
.context("sq pki link retract: Invalid User IDs")?;
// Nothing was specified. Retract all known User IDs.
if userids.is_empty() {

View File

@ -997,7 +997,7 @@ impl<'store: 'rstore, 'rstore> Config<'store, 'rstore> {
required level ({} of {}). After checking \
that {} really controls {}, you could certify \
their certificate by running \
`sq link add {} {:?}`.",
`sq pki link add {} {:?}`.",
cert.fingerprint(),
String::from_utf8_lossy(userid.value()),
paths.amount(), wot::FULLY_TRUSTED,

View File

@ -603,7 +603,7 @@ fn sq_link_update_detection() -> Result<()> {
Ok(())
}
// Check that sq link add --temporary works.
// Check that sq pki link add --temporary works.
#[test]
fn sq_link_add_temporary() -> Result<()> {
let dir = TempDir::new()?;