Searched refs:users (Results 1 - 25 of 37) sorted by relevance

12

/sssd-io/src/util/
H A Dsession_recording.h31 /** Scope of users/groups whose session should be recorded */
33 SESSION_RECORDING_SCOPE_NONE, /**< None, no users/groups */
34 SESSION_RECORDING_SCOPE_SOME, /**< Some users/groups specified elsewhere */
35 SESSION_RECORDING_SCOPE_ALL /**< All users/groups */
42 * whether to record nobody, everyone, or some users/groups
46 * NULL-terminated list of users whose session should be recorded.
49 char **users; member in struct:session_recording_conf
H A Dsession_recording.c96 /* Read session_recording/users option */
100 &pconf->users);
/sssd-io/src/providers/ldap/
H A Dsdap_async_groups_ad.c41 struct sysdb_attrs **users; member in struct:sdap_ad_match_rule_state
118 /* Start the loop through the search bases to get all of the users */
151 "Searching for users with base [%s]\n",
179 struct sysdb_attrs **users; local
181 ret = sdap_get_generic_recv(subreq, state, &count, &users);
191 "Search for users returned %zu results\n", count);
193 /* Add this batch of users to the list */
195 state->users = talloc_realloc(state, state->users,
198 if (!state->users) {
236 sdap_get_ad_match_rule_members_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, size_t *num_users, struct sysdb_attrs ***users) argument
[all...]
H A Dsdap_async_users.c4 Async LDAP Helper routines - retrieving users
393 /* For subdomain users, only create the private group as
649 /* ==Generic-Function-to-save-multiple-users============================= */
655 struct sysdb_attrs **users,
670 /* Nothing to do if there are no users */
698 ret = sdap_save_user(tmpctx, opts, dom, users[i], mapped_attrs,
762 struct sysdb_attrs **users; member in struct:sdap_search_user_state
771 struct sysdb_attrs **users,
799 state->users = NULL;
842 "Searching for users wit
651 sdap_save_users(TALLOC_CTX *memctx, struct sysdb_ctx *sysdb, struct sss_domain_info *dom, struct sdap_options *opts, struct sysdb_attrs **users, int num_users, struct sysdb_attrs *mapped_attrs, char **_usn_value) argument
884 struct sysdb_attrs **users; local
945 sdap_search_user_copy_batch(struct sdap_search_user_state *state, struct sysdb_attrs **users, size_t count) argument
965 sdap_search_user_recv(TALLOC_CTX *memctx, struct tevent_req *req, char **higher_usn, struct sysdb_attrs ***users, size_t *count) argument
997 struct sysdb_attrs **users; member in struct:sdap_get_users_state
[all...]
H A Dsdap_async_private.h95 struct sysdb_attrs **users,
H A Dsdap_async.h61 /* Search users in LDAP, return them as attrs */
79 char **higher_usn, struct sysdb_attrs ***users,
82 /* Search users in LDAP using the request above, save them to cache */
381 struct sysdb_attrs ***users);
/sssd-io/src/tests/cmocka/
H A Dtest_sdap_initgr.c43 struct sysdb_attrs **users,
134 user_base_dn = talloc_strdup_append(user_base_dn, "cn=users,");
341 struct sysdb_attrs **users; local
364 users = talloc_array(test_ctx, struct sysdb_attrs *, 2);
365 users[0] = mock_sysdb_user(users, object_bases[0],
368 users[1] = mock_sysdb_user(users, object_bases[1],
372 ret = sdap_search_initgr_user_in_batch(initgr_state, users, 2);
381 talloc_zfree(users);
391 struct sysdb_attrs **users; local
439 struct sysdb_attrs **users; local
[all...]
H A Dtest_responder_cache_req.c45 } users[] = {{"test-user1", "upn1@upndomain.com", variable in typeref:struct:test_user
268 users[0].short_name, exp_ret);
280 users[0].upn, exp_ret);
290 cache_refresh_percent, users[0].uid, exp_ret);
491 prepare_user(ctx->tctx->dom, &users[0], 1000, time(NULL));
495 prepare_user(ctx->tctx->dom, &users[1], 1000, time(NULL));
523 prepare_user(domain, &users[0], 1000, time(NULL));
735 prepare_user(domain, &users[0], 1000, time(NULL));
740 mock_parse_inp(users[0].short_name, NULL, ERR_OK);
745 check_user(test_ctx, &users[
[all...]
H A Dtest_sysdb_sudo.c51 } users[] = { { "test_USER1", 1001, 1001 }, variable in typeref:struct:test_user
83 ret = sysdb_add_user(domain, users[i].name, users[i].uid, gid,
84 users[i].name, NULL, "/bin/bash", domain->name,
107 users[i].name);
129 users[i].name);
260 filter = sysdb_sudo_filter_user(test_ctx, users[0].name, NULL, 0);
286 assert_string_equal(result, users[0].name);
307 const char *lowered_name = sss_tc_utf8_str_tolower(test_ctx, users[0].name);
318 filter = sysdb_sudo_filter_user(test_ctx, users[
[all...]
H A Dtest_nested_groups.c54 /* put users and groups under the same container so we can easily run the
58 #define USER_BASE_DN "cn=users," OBJECT_BASE_DN
71 struct sysdb_attrs **users; member in struct:nested_groups_test_ctx
128 &ctx->num_users, &ctx->users,
171 assert_null(test_ctx->users);
185 const char *users[] = { "cn=user1,"USER_BASE_DN, local
198 "rootgroup", users);
232 /* Check the users */
236 compare_sysdb_string_array_noorder(test_ctx->users,
248 const char *users[] local
[all...]
/sssd-io/src/tests/
H A Dpyhbac-test.py134 users = ["foo", "bar"]
136 return pyhbac.HbacRuleElement(names=users, groups=user_groups)
199 users = ["foo", "bar"]
204 self.assertIsInstance(rule.users, pyhbac.HbacRuleElement)
209 self.assertIsInstance(rule.users.names, list)
210 self.assertIsInstance(rule.users.groups, list)
211 self.assertCountEqual(rule.users.names, [])
212 self.assertCountEqual(rule.users.groups, [])
215 user_el = pyhbac.HbacRuleElement(names=users, groups=user_groups)
217 rule.users
[all...]
H A Dipa_hbac-tests.c74 /* Create a rule that ALLOWs all services, users and
88 rule->users = talloc_zero(rule, struct hbac_rule_element);
89 fail_if (rule->users == NULL);
90 rule->users->category = HBAC_CATEGORY_ALL;
91 rule->users->names = NULL;
92 rule->users->groups = NULL;
263 rules[0]->users->category = HBAC_CATEGORY_NULL;
265 rules[0]->users->names = talloc_array(rules[0], const char *, 2);
266 fail_if(rules[0]->users->names == NULL);
268 rules[0]->users
[all...]
/sssd-io/src/providers/ipa/
H A Dipa_hbac_common.c173 /* Get the users */
177 &new_rule->users);
179 DEBUG(SSSDBG_CRIT_FAILURE, "Could not parse users for rule [%s]\n",
311 * take care of subdomain users as well */
379 struct hbac_request_element *users; local
390 users = talloc_zero(tmp_ctx, struct hbac_request_element);
391 if (users == NULL) {
401 users->name = talloc_steal(users, shortname);
438 DEBUG(SSSDBG_TRACE_LIBS, "No groups for [%s]\n", users
[all...]
H A Dipa_hbac_private.h124 struct hbac_rule_element **users);
H A Dipa_id.h143 struct ldb_message_element *users);
H A Dipa_hbac_users.c167 struct hbac_rule_element **users)
193 DEBUG(SSSDBG_TRACE_LIBS, "Processing users for rule [%s]\n", rule_name);
248 "Original DN matched multiple users. Skipping \n");
363 *users = talloc_steal(mem_ctx, new_users);
163 hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *rule_name, struct sysdb_attrs *rule_attrs, struct hbac_rule_element **users) argument
/sssd-io/src/tests/cwrap/
H A Dtest_negcache.c54 } users[] = { { "test_user1", 1001, 50001 }, variable in typeref:struct:test_user
65 users[i].name,
69 ret = sysdb_add_user(domain, users[i].name, users[i].uid, users[i].gid,
216 users[0].name);
230 users[0].name);
234 users[1].name);
327 users[0].uid);
341 users[
[all...]
/sssd-io/src/providers/files/
H A Dfiles_ops.c54 struct passwd **users = NULL; local
67 users = talloc_zero_array(mem_ctx, struct passwd *,
69 if (users == NULL) {
76 * all users atop a memory context or only return users that differ from
86 pwd = talloc_zero(users, struct passwd);
110 users[n_users] = pwd;
113 users = talloc_realloc(mem_ctx,
114 users,
116 talloc_array_length(users)
460 struct passwd **users = NULL; local
[all...]
/sssd-io/src/lib/ipa_hbac/
H A Dipa_hbac.h110 * Components can be one of users, target hosts,
159 struct hbac_rule_element *users; member in struct:hbac_rule
H A Dhbac_evaluator.c118 if (!hbac_rule_element_is_complete(rule->users)) {
232 if (!rule->users
243 /* Check users */
244 ret = hbac_evaluate_element(rule->users,
499 if (rule->users) {
501 hbac_rule_element_debug_print(rule->users, "users");
/sssd-io/src/tests/python/
H A Dsssd-testlib.spec115 - Add functions to create POSIX users/groups
117 - Use paramiko to test ssh logins for non-root users
128 - Add functions related to adding, removing, modifying AD users,
/sssd-io/src/responder/ifp/
H A Difp_groups.c838 const char **users; local
866 users = NULL;
874 users = talloc_zero_array(tmp_ctx, const char *, num_members + 1);
875 if (users == NULL) {
899 users[num_users] = ifp_users_build_path_from_msg(users, domain,
901 if (users[num_users] == NULL) {
928 *_users = talloc_steal(mem_ctx, users);
/sssd-io/src/python/
H A Dpyhbac.c638 HbacRuleElement *users; member in struct:__anon18
672 self->users = (HbacRuleElement *) HbacRuleElement_new(
681 if (self->services == NULL || self->users == NULL ||
684 Py_XDECREF(self->users);
701 Py_CLEAR(self->users);
719 Py_VISIT((PyObject *) self->users);
760 if (HbacRuleElement_init(self->users, empty_tuple, NULL) == -1 ||
879 "users %s services %s "
885 users_repr = HbacRuleElement_repr(self->users);
1014 { discard_const_p(char, "users"), T_OBJECT_E
[all...]
/sssd-io/src/db/
H A Dsysdb_sudo.c888 const char **users = NULL; local
901 &users);
909 if (users == NULL) {
914 for (int i = 0; users[i] != NULL; i++) {
917 users[i]);
/sssd-io/src/tests/intg/
H A Dtest_files_provider.py600 Test that enumerating all users works with the default configuration. Also
802 def useradd_list(pwd_ops, users):
803 for usr in users:
807 def user_and_group_setup(pwd_ops, grp_ops, users, groups, reverse):
814 useradd_list(pwd_ops, users)
818 useradd_list(pwd_ops, users)
822 # Test that users are members as per getgrnam
825 # Test that users are members as per initgroups
851 Multiple users are linked with a group
1027 Test that returning exactly FILES_REALLOC_CHUNK users (se
[all...]

Completed in 43 milliseconds

12