Searched defs:rules (Results 1 - 25 of 26) sorted by relevance

12

/sssd-io/src/sss_client/sudo/
H A Dsss_sudo.h77 * The number of rules for the user
80 * but no rules match for him, the num_rules element
85 /** List of rules found */
86 struct sss_sudo_rule *rules; member in struct:sss_sudo_result
90 * @brief Send a request to SSSD to retrieve all SUDO rules for a given
93 * @param[in] uid The uid of the user to retrieve the rules for.
94 * @param[in] username The username to retrieve the rules for
106 * the rules for the user. If no rules were found but
112 * tell whether the result contains any rules o
[all...]
H A Dsss_sudo.c39 struct sss_sudo_rule *rules);
204 sss_sudo_free_rules(result->num_rules, result->rules);
208 void sss_sudo_free_rules(unsigned int num_rules, struct sss_sudo_rule *rules) argument
213 if (rules == NULL) {
218 rule = rules + i;
224 free(rules);
/sssd-io/src/providers/ipa/
H A Dipa_access.h52 struct sysdb_attrs **rules; member in struct:hbac_ctx
H A Dipa_deskprofile_rules.c44 struct sysdb_attrs **rules; member in struct:ipa_deskprofile_rule_state
294 struct sysdb_attrs **rules; local
303 &rules);
306 "Could not retrieve Desktop Profile rules\n");
312 state->rules = talloc_realloc(state, state->rules,
315 if (state->rules == NULL) {
322 target = &state->rules[state->rule_count];
323 *target = talloc_steal(state->rules, rules[
[all...]
H A Dipa_hbac_rules.c42 struct sysdb_attrs **rules; member in struct:ipa_hbac_rule_state
246 struct sysdb_attrs **rules; local
251 &rules);
253 DEBUG(SSSDBG_MINOR_FAILURE, "Could not retrieve HBAC rules\n");
259 state->rules = talloc_realloc(state, state->rules,
262 if (state->rules == NULL) {
269 target = &state->rules[state->rule_count];
270 *target = talloc_steal(state->rules, rules[
[all...]
H A Dipa_hbac_common.c75 struct hbac_rule ***rules,
84 if (!rules || !request) return EINVAL;
89 /* First create an array of rules */
103 DEBUG(SSSDBG_CRIT_FAILURE, "Could not construct rules\n");
116 *rules = talloc_steal(mem_ctx, new_rules);
139 ret = sysdb_attrs_get_el(hbac_ctx->rules[idx],
152 ret = sysdb_attrs_get_bool(hbac_ctx->rules[idx], IPA_ENABLED_FLAG,
161 ret = sysdb_attrs_get_string(hbac_ctx->rules[idx],
176 hbac_ctx->rules[idx],
187 hbac_ctx->rules[id
73 hbac_ctx_to_rules(TALLOC_CTX *mem_ctx, struct hbac_ctx *hbac_ctx, struct hbac_rule ***rules, struct hbac_eval_req **request) argument
[all...]
H A Dipa_rules_common.c176 struct sysdb_attrs **rules; local
196 DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up HBAC rules\n");
204 ret = sysdb_msg2attrs(tmp_ctx, rule_count, msgs, &rules);
212 *_rules = talloc_steal(mem_ctx, rules);
261 struct ipa_common_entries *rules,
311 /* Save the rules */
312 if (rules != NULL) {
314 rules->entry_subdir,
316 rules->entry_count,
317 rules
258 ipa_common_save_rules(struct sss_domain_info *domain, struct ipa_common_entries *hosts, struct ipa_common_entries *services, struct ipa_common_entries *rules, time_t *last_update) argument
[all...]
H A Dipa_sudo_refresh.c60 /* Remove all rules from cache */
68 DEBUG(SSSDBG_TRACE_FUNC, "Issuing a full refresh of sudo rules\n");
114 DEBUG(SSSDBG_TRACE_FUNC, "Successful full refresh of sudo rules\n");
166 /* Download all rules from LDAP that are newer than usn */
188 /* Do not remove any rules that are already in the sysdb. */
190 DEBUG(SSSDBG_TRACE_FUNC, "Issuing a smart refresh of sudo rules "
230 DEBUG(SSSDBG_TRACE_FUNC, "Successful smart refresh of sudo rules\n");
266 char **rules)
291 if (rules == NULL || rules[
263 ipa_sudo_rules_refresh_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct ipa_sudo_ctx *sudo_ctx, char **rules) argument
[all...]
H A Dipa_access.c102 struct ipa_common_entries *rules; member in struct:ipa_fetch_hbac_state
150 state->rules = talloc_zero(state, struct ipa_common_entries);
151 if (state->rules == NULL) {
403 &state->rules->entry_count,
404 &state->rules->entries);
405 state->rules->entry_subdir = HBAC_RULES_SUBDIR;
431 /* No rules were found that apply to this host. */
435 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to remove HBAC rules\n");
444 state->hosts, state->services, state->rules,
448 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to save HBAC rules\
[all...]
H A Dipa_session.c62 struct ipa_common_entries *rules; member in struct:ipa_fetch_deskprofile_state
109 state->rules = talloc_zero(state, struct ipa_common_entries);
110 if (state->rules == NULL) {
142 "No rules were found in the last request.\n"
366 &state->rules->entry_count,
367 &state->rules->entries);
368 state->rules->entry_subdir = DESKPROFILE_RULES_SUBDIR;
394 * rules before saving the new ones */
399 "Unable to remove Desktop Profile rules\n");
409 state->hosts, NULL, state->rules,
709 struct sysdb_attrs **rules; local
[all...]
H A Dipa_sudo_async.c238 struct sysdb_attrs **rules; local
264 DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up sudo rules [%d]: %s\n",
269 ret = sysdb_msg2attrs(tmp_ctx, num_rules, msgs, &rules);
276 *_rules = talloc_steal(mem_ctx, rules);
293 struct sysdb_attrs **rules; local
312 &rules, &num_rules);
330 ret = sysdb_attrs_get_string(rules[i], SYSDB_NAME, &name);
380 struct sysdb_attrs **rules; member in struct:ipa_sudo_fetch_state
449 * modified but we need to fetch associated rules anyway. */
529 DEBUG(SSSDBG_CRIT_FAILURE, "Unable to construct rules filte
854 struct sysdb_attrs **rules; member in struct:ipa_sudo_refresh_state
[all...]
H A Dipa_sudo_conversion.c60 hash_table_t *rules; member in struct:ipa_sudo_conv
371 ret = sss_hash_create(conv, 20, &conv->rules);
403 struct sysdb_attrs **rules,
417 ret = sysdb_attrs_get_string(rules[i], SYSDB_NAME, &key);
424 rule = talloc_zero(conv->rules, struct ipa_sudo_rule);
430 rule->attrs = rules[i];
446 ret = ipa_sudo_conv_store(conv->rules, key, rule);
770 struct sysdb_attrs **rules; member in struct:ipa_sudo_conv_result_ctx
1211 attrs = sysdb_new_attrs(ctx->rules);
1233 ctx->rules[ct
402 ipa_sudo_conv_rules(struct ipa_sudo_conv *conv, struct sysdb_attrs **rules, size_t num_rules) argument
1278 struct sysdb_attrs **rules; local
[all...]
/sssd-io/src/responder/sudo/
H A Dsudosrv_private.h64 struct sysdb_attrs **rules; member in struct:sudo_cmd_ctx
91 struct sysdb_attrs **rules,
103 struct sysdb_attrs **rules);
H A Dsudosrv_cmd.c106 struct sysdb_attrs **rules = cmd_ctx->rules; local
111 * Parent of cmd_ctx->rules is in-memory cache, we must not talloc_free it!
114 /* filter rules by time */
117 "%u rules\n", cmd_ctx->num_rules);
120 cmd_ctx->rules, 0,
121 &num_rules, &rules);
126 DEBUG(SSSDBG_TRACE_FUNC, "Got %u rules after time filter\n",
132 num_rules, rules,
260 ret = sudosrv_get_rules_recv(cmd_ctx, req, &cmd_ctx->rules,
[all...]
H A Dsudosrv_dp.c42 struct sysdb_attrs **rules; member in struct:sss_dp_get_sudoers_info
56 struct sysdb_attrs **rules)
84 info->rules = rules;
191 ret = sysdb_attrs_get_string(info->rules[i], SYSDB_NAME, &rule_name);
49 sss_dp_get_sudoers_send(TALLOC_CTX *mem_ctx, struct resp_ctx *rctx, struct sss_domain_info *dom, bool fast_reply, enum sss_dp_sudo_type type, const char *name, uint32_t num_rules, struct sysdb_attrs **rules) argument
H A Dsudosrv_query.c196 struct sysdb_attrs **rules,
232 /* rules count */
240 /* rules */
243 ret = sudosrv_response_append_rule(tmp_ctx, rules[i]->num, rules[i]->a,
193 sudosrv_build_response(TALLOC_CTX *mem_ctx, uint32_t error, uint32_t rules_num, struct sysdb_attrs **rules, uint8_t **_response_body, size_t *_response_len) argument
H A Dsudosrv_get_sudorules.c101 sort_sudo_rules(struct sysdb_attrs **rules, size_t count, bool lower_wins) argument
104 DEBUG(SSSDBG_TRACE_FUNC, "Sorting rules with lower-wins logic\n");
105 qsort(rules, count, sizeof(struct sysdb_attrs *),
108 DEBUG(SSSDBG_TRACE_FUNC, "Sorting rules with higher-wins logic\n");
109 qsort(rules, count, sizeof(struct sysdb_attrs *),
126 struct sysdb_attrs **rules; local
137 /* rules are stored inside parent domain tree */
149 DEBUG(SSSDBG_CRIT_FAILURE, "Error looking up SUDO rules\n");
153 ret = sysdb_msg2attrs(tmp_ctx, count, msgs, &rules);
160 *_rules = talloc_steal(mem_ctx, rules);
204 struct sysdb_attrs **rules; local
316 struct sysdb_attrs **rules; local
425 struct sysdb_attrs **rules; local
496 struct sysdb_attrs **rules; local
635 struct sysdb_attrs **rules; member in struct:sudosrv_get_rules_state
[all...]
/sssd-io/src/providers/data_provider/
H A Ddp_custom_data.h30 char **rules; member in struct:dp_sudo_data
H A Ddp_target_sudo.c43 char **rules = NULL; local
78 * rules[rules_num]
89 rules = talloc_zero_array(mem_ctx, char *, num_rules + 1);
90 if (rules == NULL) {
106 /* read the rules */
116 rules[i] = talloc_strdup(rules, rule);
117 if (rules[i] == NULL) {
126 rules[num_rules] = NULL;
136 *_rules = rules;
[all...]
/sssd-io/src/lib/ipa_hbac/
H A Dhbac_evaluator.c78 * evaluation rules
145 enum hbac_eval_result hbac_evaluate(struct hbac_rule **rules, argument
168 for (i = 0; rules[i]; i++) {
169 hbac_rule_debug_print(rules[i]);
170 intermediate_result = hbac_evaluate_rule(rules[i], hbac_req, &ret);
174 rules[i]->name);
177 HBAC_DEBUG(HBAC_DBG_INFO, "ALLOWED by rule [%s].\n", rules[i]->name);
181 (*info)->rule_name = strdup(rules[i]->name);
193 ret, rules[i]->name);
197 (*info)->rule_name = strdup(rules[
[all...]
/sssd-io/src/providers/ldap/
H A Dsdap_async_sudo.c38 struct sysdb_attrs **rules; member in struct:sdap_sudo_load_sudoers_state
63 state->rules = NULL;
74 DEBUG(SSSDBG_TRACE_FUNC, "About to fetch sudo rules\n");
107 &state->rules);
114 DEBUG(SSSDBG_IMPORTANT_INFO, "Received %zu sudo rules\n",
125 struct sysdb_attrs ***rules)
134 *rules = talloc_steal(mem_ctx, state->rules);
493 struct sysdb_attrs **rules,
504 ret = sysdb_attrs_get_el_ext(rules[
122 sdap_sudo_load_sudoers_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, size_t *num_rules, struct sysdb_attrs ***rules) argument
492 sdap_sudo_qualify_names(struct sss_domain_info *dom, struct sysdb_attrs **rules, size_t rules_count) argument
551 struct sysdb_attrs **rules = NULL; local
[all...]
H A Dsdap_sudo_refresh.c63 /* Download all rules from LDAP */
71 /* Remove all rules from cache */
79 DEBUG(SSSDBG_TRACE_FUNC, "Issuing a full refresh of sudo rules\n");
128 DEBUG(SSSDBG_TRACE_FUNC, "Successful full refresh of sudo rules\n");
182 /* Download all rules from LDAP that are newer than usn */
199 /* Do not remove any rules that are already in the sysdb
202 DEBUG(SSSDBG_TRACE_FUNC, "Issuing a smart refresh of sudo rules "
241 DEBUG(SSSDBG_TRACE_FUNC, "Successful smart refresh of sudo rules\n");
276 char **rules)
290 if (rules
274 sdap_sudo_rules_refresh_send(TALLOC_CTX *mem_ctx, struct sdap_sudo_ctx *sudo_ctx, char **rules) argument
[all...]
/sssd-io/src/tests/
H A Dipa_hbac-tests.c190 struct hbac_rule **rules; local
206 /* Create the rules to evaluate against */
207 rules = talloc_array(test_ctx, struct hbac_rule *, 2);
208 fail_if (rules == NULL);
210 get_allow_all_rule(rules, &rules[0]);
211 rules[0]->name = talloc_strdup(rules[0], "Allow All");
212 fail_if(rules[0]->name == NULL);
213 rules[
238 struct hbac_rule **rules; local
316 struct hbac_rule **rules; local
434 struct hbac_rule **rules; local
513 struct hbac_rule **rules; local
591 struct hbac_rule **rules; local
670 struct hbac_rule **rules; local
748 struct hbac_rule **rules; local
[all...]
/sssd-io/src/db/
H A Dsysdb_sudo.c183 struct sysdb_attrs **rules = NULL; local
200 rules = talloc_realloc(tmp_ctx, rules, struct sysdb_attrs *,
202 NULL_CHECK(rules, ret, done);
204 rules[num_rules - 1] = in_rules[i];
209 *_rules = talloc_steal(mem_ctx, rules);
397 * overridden group names/gids since the rules contains the original
697 DEBUG(SSSDBG_TRACE_FUNC, "Deleting all cached sudo rules\n");
721 struct sysdb_attrs **rules,
728 DEBUG(SSSDBG_TRACE_FUNC, "About to remove rules fro
720 sysdb_sudo_purge_byrules(struct sss_domain_info *dom, struct sysdb_attrs **rules, size_t num_rules) argument
756 struct sysdb_attrs **rules; local
801 sysdb_sudo_purge(struct sss_domain_info *domain, const char *delete_filter, struct sysdb_attrs **rules, size_t num_rules) argument
970 sysdb_sudo_store(struct sss_domain_info *domain, struct sysdb_attrs **rules, size_t num_rules) argument
[all...]
/sssd-io/src/tests/cmocka/
H A Dtest_sysdb_sudo.c59 } rules[] = { { "test_rule1", "test_host1.test_domain.test", "root" }, variable in typeref:struct:test_rule
95 rules[i].name);
99 rules[i].host);
103 rules[i].as_user);
116 rules[0].name);
120 rules[0].host);
124 rules[0].as_user);
271 assert_string_equal(result, rules[0].name);
276 assert_string_equal(result, rules[0].host);
281 assert_string_equal(result, rules[
[all...]

Completed in 43 milliseconds

12