/sssd/src/tools/ |
H A D | sss_useradd.c | 53 { "groups", 'G', POPT_ARG_STRING, NULL, 'G', _("Groups"), NULL }, 62 char *groups = NULL; local 85 groups = poptGetOptArg(pc); 86 if (!groups) { 137 if (groups) { 138 ret = parse_groups(tctx, groups, &tctx->octx->addgroups); 141 "Cannot parse groups to add the user to\n"); 150 "Cannot parse FQDN groups to add the user to\n"); 292 free(groups);
|
H A D | tools_util.c | 135 char **groups) 142 if (!groups) { 146 for (i = 0; groups[i]; ++i) { 147 ret = sss_parse_name(tctx, tctx->snctx, groups[i], &domain, &name); 151 groups[i], ret); 162 talloc_zfree(groups[i]); 163 groups[i] = talloc_strdup(tctx, name); 164 if (groups[i] == NULL) { 134 parse_group_name_domain(struct tools_ctx *tctx, char **groups) argument
|
H A D | sss_groupshow.c | 483 /*==================Recursive search for nested groups================= */ 494 struct group_info **groups; local 502 groups = talloc_zero_array(root, 511 /* Skip circular groups */ 526 &groups[i], &new_group_members, &new_nmembers); 536 root, groups[i], 548 *up_members = groups; 634 printf(_("\n%1$sMember groups: "), padding); 745 "Printing groups only allowed in local domain.\n");
|
/sssd/src/sss_client/ |
H A D | nss_mc_initgr.c | 40 gid_t **groups, long int limit) 70 newgroups = (gid_t *)realloc((*groups), newsize * sizeof(**groups)); 74 *groups = newgroups; 79 SAFEALIGN_COPY_UINT32(&(*groups)[*start], data->gids + i, NULL); 88 gid_t **groups, long int limit) 159 ret = sss_nss_mc_parse_result(rec, start, size, groups, limit); 38 sss_nss_mc_parse_result(struct sss_mc_rec *rec, long int *start, long int *size, gid_t **groups, long int limit) argument 86 sss_nss_mc_initgroups_dyn(const char *name, size_t name_len, gid_t group, long int *start, long int *size, gid_t **groups, long int limit) argument
|
H A D | nss_group.c | 276 gid_t **groups, long int limit, 296 groups, limit); 321 groups, limit); 367 newgroups = (gid_t *)realloc((*groups), newsize * sizeof(**groups)); 374 *groups = newgroups; 383 SAFEALIGN_COPY_UINT32(&(*groups)[*start], repbuf + buf_index, 274 _nss_sss_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop) argument
|
/sssd/src/providers/data_provider/ |
H A D | dp_target_id.c | 93 uint32_t *groups; member in struct:dp_initgr_ctx 128 ctx->groups = talloc_array(mem_ctx, uint32_t, res->count); 129 if (ctx->groups == NULL) { 137 ctx->groups[ctx->gnum] = ldb_msg_find_attr_as_uint(res->msgs[i], 140 if (ctx->groups[ctx->gnum] != 0) { 185 &ctx->groups, num,
|
/sssd/src/lib/ipa_hbac/ |
H A D | ipa_hbac.h | 135 * - Users: user groups (POSIX or non-POSIX) 137 * - Services: PAM service groups. 139 const char **groups; member in struct:hbac_rule_element 150 * Services and service groups 156 * Users and groups for which this 193 * - Users: user groups (POSIX or non-POSIX) 195 * - Services: PAM service groups. 197 const char **groups; member in struct:hbac_request_element 208 * requested, as well as all parent groups 215 * requested, as well as all parent groups [all...] |
/sssd/src/providers/ipa/ |
H A D | ipa_hbac_services.c | 188 * There's no reason to try to process groups 259 /* Look up service groups */ 288 struct sysdb_attrs **groups; local 294 &groups); 303 groups); 329 *target = talloc_steal(state->servicegroups, groups[i]); 447 new_services->groups = talloc_array(new_services, 450 if (new_services->groups == NULL) { 516 "Original DN matched multiple service groups. " 530 new_services->groups[num_servicegroup [all...] |
H A D | ipa_hbac_common.c | 98 size_t group_count, struct sysdb_attrs **groups) 104 || (group_count > 0 && groups == NULL)) { 111 /* Save the entries and groups to the cache */ 128 /* Second, save the groups */ 131 groupattr_name, group_count, groups); 182 el->groups = talloc_array(el, const char *, 1); 183 if (!el->groups) return ENOMEM; 185 el->groups[0] = NULL; 443 /* Get user the user name and groups, 460 /* Get the PAM service and service groups */ 94 ipa_hbac_sysdb_save(struct sss_domain_info *domain, const char *primary_subdir, const char *attr_name, size_t primary_count, struct sysdb_attrs **primary, const char *group_subdir, const char *groupattr_name, size_t group_count, struct sysdb_attrs **groups) argument [all...] |
H A D | ipa_id.c | 217 struct ldb_message **groups; member in struct:ipa_initgr_get_overrides_state 234 struct ldb_message **groups, 250 state->groups = groups; 298 ipa_uuid = ldb_msg_find_attr_as_string(state->groups[state->group_idx], 302 * of groups includes "uuid=*" 306 ldb_dn_get_linearized(state->groups[state->group_idx]->dn), 311 talloc_free(state->ar); /* Avoid spiking memory with many groups */ 328 DEBUG(SSSDBG_CRIT_FAILURE, "Unsupported groups ID type [%s].\n", 370 state->groups[stat 229 ipa_initgr_get_overrides_send(TALLOC_CTX *memctx, struct tevent_context *ev, struct ipa_id_ctx *ipa_ctx, struct sss_domain_info *user_dom, size_t groups_count, struct ldb_message **groups, const char *groups_id_attr) argument [all...] |
H A D | ipa_subdomains_ext_groups.c | 92 /* no IPA groups, try next external group. */ 181 char **groups = NULL; local 265 groups = talloc_zero_array(mem_ctx, char *, g_count + 1); 266 if (groups == NULL) { 281 groups[c] = talloc_strdup(groups, entry->key.str); 282 if (groups[c] == NULL) { 300 *_groups = groups; 310 char **groups, 329 for (c = 0; groups[ 307 add_ad_user_to_cached_groups(struct ldb_dn *user_dn, struct sss_domain_info *user_dom, struct sss_domain_info *group_dom, char **groups, bool *missing_groups) argument 631 char **groups = NULL; local 707 char **groups; member in struct:add_ad_membership_state 716 ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_id_ctx *sdap_id_ctx, struct ldb_dn *user_dn, struct sss_domain_info *user_dom, char **groups, struct sss_domain_info *group_dom) argument [all...] |
H A D | ipa_subdomains_id.c | 464 * the pac attached, we only have look up the missing groups 465 * and add the user to all groups. */ 701 /* We read users and groups from GC. From groups, we may switch to 1290 struct ldb_message **groups = NULL; local 1364 /* Lookup all groups the user is a member of which do not have ORIGINALAD 1372 attrs, &groups_count, &groups); 1378 if (groups != NULL) { 1381 groups, SYSDB_SID_STR); 1409 "IPA resolve user groups override [all...] |
/sssd/src/providers/simple/ |
H A D | simple_access_check.c | 75 * We need to make sure none of the user's groups 424 struct ldb_message **groups; local 436 DEBUG(SSSDBG_TRACE_LIBS, "Looking up groups for user %s\n", username); 461 attrs, &group_count, &groups); 467 "User %s is a member of %zu supplemental groups\n", 482 * provider to work correctly, we need to resolve the groups before 484 * even more tricky b/c the groups HAVE name, but their name 487 ret = simple_check_process_group(state, groups[i]); 506 /* If all groups could have been resolved by name, we are 509 DEBUG(SSSDBG_TRACE_FUNC, "All groups ha [all...] |
/sssd/src/responder/nss/ |
H A D | nsssrv.c | 333 uint32_t *groups, 342 nss_update_initgr_memcache(nctx, user, domain, num_groups, groups); 329 nss_memorycache_update_initgroups(struct sbus_request *sbus_req, void *data, const char *user, const char *domain, uint32_t *groups, int num_groups) argument
|
/sssd/src/responder/sudo/ |
H A D | sudosrv_get_sudorules.c | 174 char **groups, 182 filter = sysdb_sudo_filter_expired(NULL, username, groups, uid); 306 char **groups, 326 ret = sudosrv_cached_rules_by_user(tmp_ctx, domain, uid, username, groups, 332 ret = sudosrv_cached_rules_by_ng(tmp_ctx, domain, uid, username, groups, 415 char **groups, 431 ret = sudosrv_cached_rules(mem_ctx, domain, uid, username, groups, 484 char **groups) 504 ret = sudosrv_expired_rules(state, domain, uid, username, groups, 610 char **groups; member in struct:sudosrv_get_rules_state 170 sudosrv_expired_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 302 sudosrv_cached_rules(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 410 sudosrv_fetch_rules(TALLOC_CTX *mem_ctx, enum sss_sudo_type type, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups, bool inverse_order, struct sysdb_attrs ***_rules, uint32_t *_num_rules) argument 478 sudosrv_refresh_rules_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct resp_ctx *rctx, struct sss_domain_info *domain, uid_t uid, const char *username, char **groups) argument [all...] |
/sssd/src/python/ |
H A D | pysss.c | 151 " * ``groups``: List of groups the user is member of\n"); 169 "create_home", "groups", NULL }; 200 tctx->octx->addgroups = PyList_AsStringList(tctx, py_groups, "groups"); 415 " * ``addgroups``: List of groups to add the user to\n" 416 " * ``rmgroups``: List of groups to remove the user from\n" 748 * Get list of groups user belongs to 751 "Get list of groups user belongs to.\n\n" 759 gid_t *groups = NULL; local 777 groups [all...] |
/sssd/src/responder/ifp/ |
H A D | ifp_groups.c | 303 "groups by filter [%d]: %s\n", ret, sss_strerror(ret)); 391 "groups by filter [%d]: %s\n", ret, sss_strerror(ret)); 789 const char **groups; local 817 groups = NULL; 831 groups = talloc_zero_array(tmp_ctx, const char *, num_members + 1); 832 if (groups == NULL) { 858 groups[num_groups] = ifp_groups_build_path_from_msg(groups, 860 if (groups[num_groups] == NULL) { 886 *_groups = talloc_steal(mem_ctx, groups); [all...] |
/sssd/src/sss_client/nfs/ |
H A D | sss_nfs_client.c | 550 char *secname, char *princ, gid_t *groups, int *ngroups, 549 sss_nfs_gss_princ_to_grouplist( char *secname, char *princ, gid_t *groups, int *ngroups, extra_mapping_params **ex) argument
|
/sssd/src/tests/cwrap/ |
H A D | test_negcache.c | 80 } groups[] = { { "test_group1", 50001 }, variable in typeref:struct:test_group 96 groups[i].name, 100 ret = sysdb_add_group(domain, fqname, groups[i].gid, 438 groups[0].name); 452 groups[0].name); 456 groups[1].name);
|
/sssd/src/db/ |
H A D | sysdb_sudo.c | 382 struct ldb_message_element *groups; local 412 /* resolve secondary groups */ 414 groups = ldb_msg_find_element(msg, SYSDB_MEMBEROF); 415 if (!groups || groups->num_values == 0) { 416 /* No groups for this user in sysdb currently */ 420 num_groups = groups->num_values; 424 /* Get a list of the groups by groupname only */ 425 for (i = 0; i < groups->num_values; i++) { 428 (const char *)groups [all...] |
/sssd/src/monitor/ |
H A D | monitor_netlink.c | 452 static int nlw_groups_subscribe(struct nlw_handle *nlp, int *groups) argument 457 for (i=0; groups[i]; i++) { 458 ret = nlw_group_subscribe(nlp, groups[i]); 795 int groups[] = { RTNLGRP_LINK, RTNLGRP_IPV4_ROUTE, RTNLGRP_IPV6_ROUTE, local 840 ret = nlw_groups_subscribe(nlctx->nlp, groups);
|
/sssd/src/tests/cmocka/ |
H A D | test_sysdb_views.c | 774 static const char *groups[] = { "one", "two", "three", NULL }; variable 857 enum_test_add_groups(test_ctx, groups); 868 enum_test_del_groups(test_ctx->domain, groups); 898 assert_int_equal(res->count, N_ELEMENTS(groups)-1);
|
H A D | test_nested_groups.c | 54 /* put users and groups under the same container so we can easily run the 57 #define GROUP_BASE_DN "cn=groups," OBJECT_BASE_DN 72 struct sysdb_attrs **groups; member in struct:nested_groups_test_ctx 100 /* Check the returned groups. The order is irrelevant. */ 129 &ctx->num_groups, &ctx->groups, 174 assert_non_null(test_ctx->groups); 175 assert_true(rootgroup == test_ctx->groups[0]); 308 const char *groups[] = { "cn=emptygroup1,"GROUP_BASE_DN, local 321 "rootgroup", groups); 361 compare_sysdb_string_array_noorder(test_ctx->groups, 372 const char *groups[] = { "cn=emptygroup1,"GROUP_BASE_DN, local [all...] |
/sssd/src/providers/ldap/ |
H A D | sdap_async_initgroups_ad.c | 46 struct sysdb_attrs **groups; member in struct:sdap_ad_match_rule_initgr_state 147 * groups to which this user belongs. 181 "Searching for groups with base [%s]\n", 211 struct sysdb_attrs **groups; local 214 ret = sdap_get_generic_recv(subreq, state, &count, &groups); 225 /* Add this batch of groups to the list */ 227 state->groups = talloc_realloc(state, state->groups, 230 if (!state->groups) { 235 /* Copy the new groups int 856 char **groups = NULL; local 1425 struct sysdb_attrs **groups; member in struct:sdap_ad_get_domain_local_groups_state 1435 sdap_ad_get_domain_local_groups_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct sdap_domain *local_sdom, struct sdap_options *opts, struct sysdb_ctx *sysdb, struct sss_domain_info *dom, struct sysdb_attrs **groups, size_t num_groups) argument 1555 struct sysdb_attrs *groups[1]; local [all...] |
/sssd/src/sss_client/libwbclient/ |
H A D | wbc_ctx_sssd.c | 123 const char ***groups) 120 wbcCtxListGroups(struct wbcContext *ctx, const char *domain_name, uint32_t *num_groups, const char ***groups) argument
|