1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
|
--- a/man/fort.8
+++ b/man/fort.8
@@ -237,7 +237,7 @@ Fort's entire validation process operate
Because rsync uses delta encoding, you’re advised to keep this cache around. It
significantly speeds up subsequent validation cycles.
.P
-By default, the path is \fI/tmp/fort/repository\fR.
+By default, the path is \fI/var/lib/fort\fR.
.RE
.P
@@ -1047,23 +1047,23 @@ Download the 5 RIR TALs into the /tmp/ta
.RE
.P
-.B fort \-t /tmp/tal \-r /tmp/repository \-\-server.port=9323
+.B fort \-t /etc/tals \-r /var/lib/fort \-\-server.port=9323
.RS 4
Run FORT with all the default values, using a custom TALs directory, a
custom repository directory as well, and binding the RTR server to port 9323.
.RE
.P
-.B fort \-t /tmp/tal \-r /tmp/repository \-\-mode=standalone \-\-output.roa=-
+.B fort \-t /etc/tals \-r /var/lib/fort \-\-mode=standalone \-\-output.roa=-
.RS 4
Run FORT as standalone and output ROAs CSV to the console.
.RE
.P
.nf
-\fBfort \-t /tmp/tal \-r /tmp/repository \\
+\fBfort \-t /etc/tals \-r /var/lib/fort \\
\-\-mode=standalone \\
- \-\-slurm=/tmp/myslurm.slurm\fR
+ \-\-slurm=/etc/fort/slurm/\fR
.fi
.RS 4
Run FORT as standalone and using a SLURM file.
@@ -1077,10 +1077,10 @@ Run FORT using the JSON configuration fi
.P
.nf
-\fBfort \-t /tmp/tal \-r /tmp/repository \\
+\fBfort \-t /etc/tals \-r /var/lib/fort \\
\-\-server.address=::1 \-\-server.port=9323 \\
\-\-server.interval.validation=1800 \\
- \-\-output.roa=/tmp/roas.csv\fR
+ \-\-output.roa=/var/lib/fort/roas.csv\fR
.fi
.RS 4
Run FORT with RTR server listening on IPv6 address \fI::1\fR, port 9323,
@@ -1094,10 +1094,10 @@ This is an example of a valid JSON confi
to a specific value:
.nf
{
- "tal": "/tmp/fort/tal/",
- "local-repository": "/tmp/fort/repository",
+ "tal": "/etc/tals/",
+ "local-repository": "/var/lib/fort/",
"maximum-certificate-depth": 32,
- "slurm": "/tmp/fort/test.slurm",
+ "slurm": "/etc/fort/slurm/",
"mode": "server",
"work-offline": false,
"daemon": false,
@@ -1162,7 +1162,7 @@ to a specific value:
"low-speed-limit": 100000,
"low-speed-time": 10,
"max-file-size": 2000000000,
- "ca-path": "/usr/local/ssl/certs"
+ "ca-path": "/etc/ssl/certs"
},
"log": {
@@ -1208,8 +1208,8 @@ to a specific value:
],
"output": {
- "roa": "/tmp/fort/roas.csv",
- "bgpsec": "/tmp/fort/bgpsec.csv",
+ "roa": "/var/lib/fort/roas.csv",
+ "bgpsec": "/var/lib/fort/bgpsec.csv",
"format": "csv"
},
--- a/src/config.c
+++ b/src/config.c
@@ -937,8 +937,8 @@ set_default_values(void)
* duplicates.
*/
- rpki_config.tal = NULL;
- rpki_config.local_repository = pstrdup("/tmp/fort/repository");
+ rpki_config.tal = pstrdup("/etc/tals");
+ rpki_config.local_repository = pstrdup("/var/lib/fort");
rpki_config.shuffle_tal_uris = false;
rpki_config.maximum_certificate_depth = 32;
rpki_config.slurm = NULL;
|