Searched defs:group (Results 1 - 25 of 28) sorted by relevance

12

/sssd-io/src/tests/intg/
H A Dldap_ent.py57 def group(base_dn, cn, gidNumber, member_uids=()): function
59 Generate an RFC2307 group add-modlist for passing to ldap.add*.
74 Generate an RFC2307bis group add-modlist for passing to ldap.add*.
134 """Add an RFC2307 group add-modlist."""
135 self.append(group(base_dn or self.base_dn,
141 """Add an RFC2307bis group add-modlist."""
H A Dsssd_ldb.py32 group = 2 variable in class:TsCacheEntry
68 elif entry_type == TsCacheEntry.group:
/sssd-io/src/sss_client/
H A Dnss_compat.h48 const char *group; member in union:__netgrent::__anon41
H A Dnss_mc_initgr.c87 gid_t group, long int *start, long int *size,
86 sss_nss_mc_initgroups_dyn(const char *name, size_t name_len, gid_t group, long int *start, long int *size, gid_t **groups, long int limit) argument
H A Dnss_group.c270 enum nss_status _nss_sss_initgroups_dyn(const char *user, gid_t group, argument
291 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
316 ret = sss_nss_mc_initgroups_dyn(user, user_len, group, start, size,
393 enum nss_status _nss_sss_getgrnam_r(const char *name, struct group *result,
512 enum nss_status _nss_sss_getgrgid_r(gid_t gid, struct group *result,
647 static enum nss_status internal_getgrent_r(struct group *result,
722 enum nss_status _nss_sss_getgrent_r(struct group *result,
/sssd-io/src/providers/ldap/
H A Dsdap_async_groups_ad.c54 struct sysdb_attrs *group,
84 /* Get the DN of the group */
85 ret = sysdb_attrs_get_string(group, SYSDB_ORIG_DN, &group_dn);
88 "Could not retrieve originalDN for group: %s\n",
97 "Could not sanitize group DN: %s\n",
50 sdap_get_ad_match_rule_members_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_options *opts, struct sdap_handle *sh, struct sysdb_attrs *group, int timeout) argument
H A Dsdap_async_initgroups_ad.c90 /* Request all of the group attributes that we know
260 "User is not a member of any group in the search bases\n");
263 /* Get the current sysdb group list for this user
277 * nested group searches, so we can just update the
498 /* Get the current sysdb group list for this user so we can update it. */
656 * next group. This may happen for example if the group is built-in,
909 "Could not retrieve group name from sysdb\n");
914 /* This is a new group. For now, we will store it under the name
915 * of its SID. When a direct lookup of the group o
1548 struct sysdb_attrs *group; member in struct:sdap_nested_group
[all...]
H A Dsdap_async_groups.c125 /* Don't search if the group is non-POSIX */
180 /* Non-POSIX AD group. Skip. */
204 * the very rare scenario of AD POSIX group that is primary group of
268 DEBUG(SSSDBG_MINOR_FAILURE, "No memory to allocate group attrs\n");
356 * gidNumber set to zero even if updating existing group */
369 DEBUG(SSSDBG_OP_FAILURE, "Could not store group %s\n", name);
423 DEBUG(SSSDBG_TRACE_FUNC, "The group has %d members\n", memberel->num_values);
439 "Error reading group members from group_attrs: [%s]\n",
481 "Adding ghost member for group [
1174 struct sysdb_attrs *group; member in struct:sdap_process_group_state
1223 sdap_process_group_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct sss_domain_info *dom, struct sysdb_ctx *sysdb, struct sdap_options *opts, struct sdap_handle *sh, struct sysdb_attrs *group, bool enumeration) argument
2262 struct sysdb_attrs *group = state->groups[0]; local
[all...]
H A Dsdap_async_initgroups.c32 /* ==Save-fake-group-list=====================================*/
83 DEBUG(SSSDBG_CRIT_FAILURE, "search for group failed [%d]: %s\n",
112 /* The group is not in sysdb, need to add a fake entry */
118 "The group has no name attribute\n");
133 DEBUG(SSSDBG_MINOR_FAILURE, "No SID for group [%s] " \
141 "Mapping group [%s] objectSID to unix ID\n", groupname);
147 /* Convert the SID into a UNIX group ID */
160 "Treating as a non-POSIX group\n",
169 DEBUG(SSSDBG_TRACE_LIBS, "The group %s gid was %s\n",
172 "Marking group
1387 sdap_initgr_nested_get_membership_diff(TALLOC_CTX *mem_ctx, struct sysdb_ctx *sysdb, struct sdap_options *opts, struct sss_domain_info *dom, struct sysdb_attrs *group, struct sysdb_attrs **all_groups, int groups_count, struct membership_diff **_mdiff) argument
1579 struct sysdb_attrs *group; member in struct:sdap_nested_group
2076 struct sdap_nested_group *group; local
[all...]
H A Dsdap_async_nested_groups.c88 struct sysdb_attrs *group);
261 struct sysdb_attrs *group)
272 group, "", &need_filter);
289 ret = sysdb_attrs_get_uint32_t(group, map[SDAP_AT_GROUP_GID].sys_name,
294 "The group's gid was %s\n", ret == ENOENT ? "missing" : "zero");
296 "Marking group as non-POSIX and setting GID=0!\n");
299 ret = sysdb_attrs_add_uint32(group,
303 "Failed to add a GID to non-POSIX group!\n");
308 ret = sysdb_attrs_add_bool(group, SYSDB_POSIX, false);
311 "Error: Failed to mark group a
260 sdap_nested_group_hash_group(struct sdap_nested_group_ctx *group_ctx, struct sysdb_attrs *group) argument
715 sdap_nested_group_add_ext_members(struct sdap_nested_group_ctx *group_ctx, struct sysdb_attrs *group, struct ldb_message_element *ext_members) argument
751 sdap_nested_group_ext_members(struct sdap_options *opts, struct sysdb_attrs *group) argument
780 sdap_nested_group_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_domain *sdom, struct sdap_options *opts, struct sdap_handle *sh, struct sysdb_attrs *group) argument
997 sdap_nested_group_process_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_nested_group_ctx *group_ctx, int nesting_level, struct sysdb_attrs *group) argument
1858 struct sysdb_attrs *group; member in struct:sdap_nested_group_lookup_group_state
1947 struct sysdb_attrs **group = NULL; local
[all...]
/sssd-io/src/responder/nss/
H A Dnss_protocol_netgr.c78 struct sized_string group; local
88 to_sized_string(&group, entry->value.groupname);
90 ret = sss_packet_grow(packet, sizeof(uint32_t) + group.len);
99 SAFEALIGN_SET_STRING(&body[*_rp], group.str, group.len, _rp);
/sssd-io/src/providers/ipa/
H A Dipa_deskprofile_rules.c66 char *group; local
195 ret = sss_parse_internal_fqname(state, group_clean, &group, NULL);
204 IPA_MEMBER_USER, group);
H A Dipa_deskprofile_rules_util.c52 * 1 = user, group, host, hostgroup
53 * 2 = user, group, hostgroup, host
54 * 3 = user, host, group, hostgroup
55 * 4 = user, host, hostgroup, group
56 * 5 = user, hostgroup, group, host
57 * 6 = user, hostgroup, host, group
58 * 7 = group, user, host, hostgroup
59 * 8 = group, user, hostgroup, host
60 * 9 = group, host, user, hostgroup
61 * 10 = group, hos
358 bool group = false; local
[all...]
H A Dipa_netgroups.c692 const char *group; member in struct:extract_state
721 if (strcmp((char *)el->values[j].data, state->group) == 0) {
806 state->group = process[pi];
H A Dipa_sudo_conversion.c246 DEBUG(SSSDBG_TRACE_INTERNAL, "Found sudo command group %s\n",
485 DEBUG(SSSDBG_MINOR_FAILURE, "Failed to get command group DN, "
505 DEBUG(SSSDBG_OP_FAILURE, "Failed to store command group into "
782 const char *group; local
809 group = talloc_asprintf(mem_ctx, "+%s", rdn);
812 return group;
822 const char *group; local
849 group = talloc_asprintf(mem_ctx, "%%%s", rdn);
852 return group;
H A Dipa_s2n_exop.c325 ID belongs to a user or a group */
420 * group PosixGroup,
477 struct group group; member in union:resp_attrs::__anon9
706 attrs->a.group.gr_mem = talloc_zero_array(attrs, char *,
708 if (attrs->a.group.gr_mem == NULL) {
727 attrs->a.group.gr_mem[mc] =
728 sss_create_internal_fqname(attrs->a.group.gr_mem,
730 if (attrs->a.group.gr_mem[mc] == NULL) {
739 attrs->a.group
[all...]
/sssd-io/src/providers/simple/
H A Dsimple_access_check.c29 #define NON_EXIST_GRP_ALLOW "The group %s does not exist. Possible typo in simple_allow_groups.\n"
30 #define NON_EXIST_GRP_DENY "The group %s does not exist. Possible typo in simple_deny_groups.\n"
33 is_posix(const struct ldb_message *group) argument
37 val = ldb_msg_find_attr_as_string(group, SYSDB_POSIX, NULL);
135 /* Now process allow and deny group rules
143 "Checking against allow list group name [%s].\n",
164 /* If any group has matched, we can skip out on the
177 /* Finally, process the deny group rules */
182 "Checking against deny list group name [%s].\n",
203 /* If any group ha
307 struct ldb_message *group; local
587 simple_check_process_group(struct simple_check_groups_state *state, struct ldb_message *group) argument
[all...]
/sssd-io/src/sss_client/idmap/
H A Dsss_nss_ex.c421 int sss_nss_getgrnam_timeout(const char *name, struct group *grp,
422 char *buffer, size_t buflen, struct group **result,
452 int sss_nss_getgrgid_timeout(gid_t gid, struct group *grp,
453 char *buffer, size_t buflen, struct group **result,
483 int sss_nss_getgrouplist_timeout(const char *name, gid_t group, argument
505 inp.result.initgrrep.groups[0] = group;
/sssd-io/src/tests/
H A Dstress-tests.c77 * Look up one group. If the user is not found using getgrnam, the success
82 struct group *grp = NULL;
102 int run_one_testcase(const char *name, int group, int enoent_fail) argument
104 if (group) {
/sssd-io/src/monitor/
H A Dmonitor_netlink.c424 static int nlw_group_subscribe(struct nlw_handle *nlp, int group) argument
429 ret = nl_socket_add_membership(nlp, group);
440 &group, sizeof(group));
595 * multicast group memberships periodically. We need to discard such
839 /* Subscribe to the LINK group for internal carrier signals */
/sssd-io/src/responder/ifp/
H A Difp_groups.c162 "group [%d]: %s\n", ret, sss_strerror(ret));
231 "group [%d]: %s\n", ret, sss_strerror(ret));
452 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to lookup group %u@%s [%d]: %s\n",
463 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to lookup group %s@%s [%d]: %s\n",
514 DEBUG(SSSDBG_OP_FAILURE, "Unable to retrieve group from cache\n");
544 struct ldb_message *group; local
567 ret = ifp_groups_group_get(sbus_req, data, &domain, &group);
572 name = ldb_msg_find_attr_as_string(group, SYSDB_NAME, NULL);
608 struct ldb_message *group; local
616 &state->domain, &group);
834 struct ldb_message *group; local
1000 struct ldb_message *group; local
1019 struct ldb_message *group; local
[all...]
/sssd-io/src/tools/
H A Dsss_cache.c83 char *group; member in struct:input_values
238 free(values->group);
365 /* Update group filter */
445 type_string = "group";
677 { "group", 'g', POPT_ARG_STRING, &(values.group), 0,
678 _("Invalidate particular group"), NULL },
768 if (idb == INVALIDATE_NONE && !values.user && !values.group &&
797 } else if (values.group) {
798 ctx->group_name = talloc_strdup(ctx, values.group);
[all...]
H A Dsss_override.c131 struct override_group *group)
134 {"name", 'n', POPT_ARG_STRING, &group->name, 0, _("Override name"), NULL },
135 {"gid", 'g', POPT_ARG_INT, &group->gid, 0, _("Override gid"), NULL },
139 return parse_cmdline(cmdline, tool_ctx, options, &group->input_name,
140 &group->orig_name, &group->domain);
145 struct override_group *group)
147 return parse_cmdline(cmdline, tool_ctx, NULL, &group->input_name,
148 &group->orig_name, &group
129 parse_cmdline_group_add(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_group *group) argument
143 parse_cmdline_group_del(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_group *group) argument
151 parse_cmdline_group_show(struct sss_cmdline *cmdline, struct sss_tool_ctx *tool_ctx, struct override_group *group) argument
391 build_group_attrs(TALLOC_CTX *mem_ctx, struct override_group *group) argument
598 get_group_domain_msg(struct sss_tool_ctx *tool_ctx, struct override_group *group) argument
826 struct override_group group; local
1670 struct override_group group = {NULL}; local
1696 struct override_group group = {NULL}; local
[all...]
/sssd-io/src/providers/ad/
H A Dad_id.c374 case BE_REQ_GROUP: /* group */
767 "memberships for %s, group memberships might be "
778 const struct ldb_message *group,
873 ad_group_extra_members(TALLOC_CTX *mem_ctx, const struct ldb_message *group, argument
890 om = ldb_msg_find_element(group, SYSDB_ORIG_MEMBER);
891 m = ldb_msg_find_element(group, SYSDB_MEMBER);
892 name = ldb_msg_find_attr_as_string(group, SYSDB_NAME, NULL);
894 DEBUG(SSSDBG_OP_FAILURE, "A group with no name!\n");
911 * linked to the group
913 ret = ad_group_stored_orig_members(tmp_ctx, dom, group
[all...]
/sssd-io/src/tests/cmocka/
H A Dtest_responder_cache_req.c129 /* NOTE: Please, instead of adding new create_[user|group] bool,
345 struct test_group *group,
356 ret = sysdb_attrs_add_string(attrs, SYSDB_SID_STR, group->sid);
359 fqname = sss_create_internal_fqname(attrs, group->short_name, domain->name);
362 ret = sysdb_store_group(domain, fqname, group->gid, attrs,
393 struct test_group *group,
406 group->short_name);
411 assert_string_equal(ldbsid, group->sid);
415 assert_int_equal(ldbgid, group->gid);
1580 /* Setup group
344 prepare_group(struct sss_domain_info *domain, struct test_group *group, uint64_t timeout, time_t transaction_time) argument
392 check_group(struct cache_req_test_ctx *test_ctx, struct test_group *group, struct sss_domain_info *exp_dom) argument
[all...]

Completed in 78 milliseconds

12