/sssd/src/lib/ipa_hbac/ |
H A D | hbac_evaluator.c | 74 static void hbac_rule_debug_print(struct hbac_rule *rule); 106 bool hbac_rule_is_complete(struct hbac_rule *rule, uint32_t *missing_attrs) argument 112 if (rule == NULL) { 113 /* No rule passed in? */ 118 if (!hbac_rule_element_is_complete(rule->users)) { 123 if (!hbac_rule_element_is_complete(rule->services)) { 128 if (!hbac_rule_element_is_complete(rule->targethosts)) { 133 if (!hbac_rule_element_is_complete(rule->srchosts)) { 141 enum hbac_eval_result_int hbac_evaluate_rule(struct hbac_rule *rule, 172 /* This rule di 219 hbac_evaluate_rule(struct hbac_rule *rule, struct hbac_eval_req *hbac_req, enum hbac_error_code *error) argument 487 hbac_rule_debug_print(struct hbac_rule *rule) argument [all...] |
H A D | ipa_hbac.h | 108 * Component of an HBAC rule 124 * List of explicit members of this rule component 133 * List of group members of this rule component 143 * HBAC rule object for evaluation 151 * for which this rule applies 157 * rule applies 162 * Target hosts for which this rule apples 167 * Source hosts for which this rule applies 201 * Request object for an HBAC rule evaluation 254 /** Parse error while evaluating rule */ [all...] |
/sssd/src/tests/cmocka/ |
H A D | test_sysdb_sudo.c | 86 static void create_rule_attrs(struct sysdb_attrs *rule, int i) argument 90 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_CN, 94 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_HOST, 98 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_RUNASUSER, 102 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_USER, 107 static void create_rule_attrs_multiple_sudoUser(struct sysdb_attrs *rule) argument 111 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_CN, 115 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_HOST, 119 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_RUNASUSER, 124 ret = sysdb_attrs_add_string_safe(rule, SYSDB_SUDO_CACHE_AT_USE 199 struct sysdb_attrs *rule; local 254 struct sysdb_attrs *rule; local 327 struct sysdb_attrs *rule; local 383 struct sysdb_attrs *rule; local 410 struct sysdb_attrs *rule; local 493 struct sysdb_attrs *rule; local 548 struct sysdb_attrs *rule; local 600 struct sysdb_attrs *rule; local [all...] |
/sssd/src/tests/ |
H A D | pyhbac-test.py | 153 rule = pyhbac.HbacRule(name) 154 self.assertEqual(rule.name, unicode(name)) 156 rule.name = new_name 157 self.assertEqual(rule.name, unicode(new_name)) 160 rule = pyhbac.HbacRule("testRuleGetSetEnabled") 162 rule.enabled = True 163 self.assertEqual(rule.enabled, True) 164 rule.enabled = False 165 self.assertEqual(rule.enabled, False) 167 rule [all...] |
H A D | ipa_hbac-tests.c | 73 struct hbac_rule *rule; local 74 /* Create a rule that ALLOWs all services, users and 77 rule = talloc_zero(mem_ctx, struct hbac_rule); 78 fail_if (rule == NULL); 80 rule->enabled = true; 82 rule->services = talloc_zero(rule, struct hbac_rule_element); 83 fail_if (rule->services == NULL); 84 rule->services->category = HBAC_CATEGORY_ALL; 85 rule 826 struct hbac_rule *rule; local [all...] |
/sssd/src/sss_client/sudo_testcli/ |
H A D | sudo_testcli.c | 118 struct sss_sudo_rule *rule = NULL; local 127 rule = &result->rules[i]; 128 printf("=== Rule %d has %d attributes\n", i, rule->num_attrs); 129 for (j = 0; j < rule->num_attrs; j++) { 130 attr = &rule->attrs[j];
|
/sssd/src/providers/ipa/ |
H A D | ipa_sudo_conversion.c | 220 struct sysdb_attrs *rule, 233 ret = sysdb_attrs_get_string_array(rule, attr, tmp_ctx, &members); 276 struct ipa_sudo_rule *rule) 278 return process_rulemember(rule, conv, &rule->allow, rule->attrs, 284 struct ipa_sudo_rule *rule) 286 return process_rulemember(rule, conv, &rule->deny, rule 217 process_rulemember(TALLOC_CTX *mem_ctx, struct ipa_sudo_conv *conv, struct ipa_sudo_rulemember *rulemember, struct sysdb_attrs *rule, const char *attr) argument 275 process_allowcmd(struct ipa_sudo_conv *conv, struct ipa_sudo_rule *rule) argument 283 process_denycmd(struct ipa_sudo_conv *conv, struct ipa_sudo_rule *rule) argument 406 struct ipa_sudo_rule *rule = NULL; local 879 convert_attributes(struct ipa_sudo_conv *conv, struct ipa_sudo_rule *rule, struct sysdb_attrs *attrs) argument 1095 convert_sudocommand(struct ipa_sudo_conv *conv, struct ipa_sudo_rule *rule, struct sysdb_attrs *attrs) argument 1133 struct ipa_sudo_rule *rule = item->value.ptr; local [all...] |
H A D | ipa_hbac_common.c | 198 struct hbac_rule **rule); 230 /* Create each rule one at a time */ 262 struct hbac_rule **rule) 275 DEBUG(SSSDBG_CONF_SETTINGS, "rule has no name, assuming '(none)'.\n"); 283 DEBUG(SSSDBG_TRACE_LIBS, "Processing rule [%s]\n", new_rule->name); 301 "Rule [%s] is not an ALLOW rule\n", new_rule->name); 312 DEBUG(SSSDBG_CRIT_FAILURE, "Could not parse users for rule [%s]\n", 323 DEBUG(SSSDBG_CRIT_FAILURE, "Could not parse services for rule [%s]\n", 335 "Could not parse target hosts for rule [%s]\n", 350 "Could not parse source hosts for rule [ 259 hbac_attrs_to_rule(TALLOC_CTX *mem_ctx, struct hbac_ctx *hbac_ctx, size_t idx, struct hbac_rule **rule) argument [all...] |
/sssd/src/providers/data_provider/ |
H A D | dp_target_sudo.c | 42 const char *rule; local 115 dbus_message_iter_get_basic(&array_iter, &rule); 116 rules[i] = talloc_strdup(rules, rule);
|
/sssd/src/sss_client/sudo/ |
H A D | sss_sudo.c | 210 struct sss_sudo_rule *rule = NULL; local 218 rule = rules + i; 220 sss_sudo_free_attrs(rule->num_attrs, rule->attrs); 221 rule->attrs = NULL;
|
/sssd/src/db/ |
H A D | sysdb_sudo.c | 73 static errno_t sysdb_sudo_check_time(struct sysdb_attrs *rule, argument 92 ret = sysdb_attrs_get_string(rule, SYSDB_SUDO_CACHE_AT_CN, &name); 111 ret = sysdb_attrs_get_string_array(rule, SYSDB_SUDO_CACHE_AT_NOTBEFORE, 117 DEBUG(SSSDBG_MINOR_FAILURE, "Invalid time format in rule [%s]!\n", 134 ret = sysdb_attrs_get_string_array(rule, SYSDB_SUDO_CACHE_AT_NOTAFTER, 140 DEBUG(SSSDBG_MINOR_FAILURE, "Invalid time format in rule [%s]!\n", 637 sysdb_sudo_get_rule_name(struct sysdb_attrs *rule) argument 642 ret = sysdb_attrs_get_string(rule, SYSDB_SUDO_CACHE_AT_CN, &name); 644 DEBUG(SSSDBG_MINOR_FAILURE, "Warning: found rule that contains none " 648 DEBUG(SSSDBG_OP_FAILURE, "Unable to obtain rule nam 822 sysdb_sudo_add_sss_attrs(struct sysdb_attrs *rule, const char *name, int cache_timeout, time_t now) argument 855 sysdb_sudo_add_lowered_users(struct sss_domain_info *domain, struct sysdb_attrs *rule) argument 916 sysdb_sudo_store_rule(struct sss_domain_info *domain, struct sysdb_attrs *rule, int cache_timeout, time_t now) argument [all...] |
/sssd/src/python/ |
H A D | pyhbac.c | 282 error->rule_name ? error->rule_name : "no rule"); 539 "(set) A set of categories this rule falls into"); 565 "HbacRuleElement() -> new empty rule element\n" 643 free_hbac_rule(struct hbac_rule *rule); 923 struct hbac_rule *rule; local 932 rule = HbacRule_to_native(self); 933 if (!rule) { 942 is_valid = hbac_rule_is_complete(rule, &missing); 943 free_hbac_rule(rule); 989 "Validate an HBAC rule\ 1077 free_hbac_rule(struct hbac_rule *rule) argument 1093 struct hbac_rule *rule = NULL; local [all...] |
/sssd/src/sbus/ |
H A D | sssd_dbus_signals.c | 173 const char *rule; local 193 rule = talloc_asprintf(tmp_ctx, "type='signal',interface='%s',member='%s'", 195 if (rule == NULL) { 200 dbus_bus_add_match(conn->dbus.conn, rule, &error); 203 "Cannot add D-Bus match rule, cause: %s\n", error.message);
|