/sssd-io/src/util/ |
H A D | session_recording.h | 31 /** Scope of users/groups whose session should be recorded */ 33 SESSION_RECORDING_SCOPE_NONE, /**< None, no users/groups */ 34 SESSION_RECORDING_SCOPE_SOME, /**< Some users/groups specified elsewhere */ 35 SESSION_RECORDING_SCOPE_ALL /**< All users/groups */ 42 * whether to record nobody, everyone, or some users/groups 46 * NULL-terminated list of users whose session should be recorded. 49 char **users; member in struct:session_recording_conf
|
H A D | session_recording.c | 96 /* Read session_recording/users option */ 100 &pconf->users);
|
/sssd-io/src/providers/ldap/ |
H A D | sdap_async_groups_ad.c | 41 struct sysdb_attrs **users; member in struct:sdap_ad_match_rule_state 118 /* Start the loop through the search bases to get all of the users */ 151 "Searching for users with base [%s]\n", 179 struct sysdb_attrs **users; local 181 ret = sdap_get_generic_recv(subreq, state, &count, &users); 191 "Search for users returned %zu results\n", count); 193 /* Add this batch of users to the list */ 195 state->users = talloc_realloc(state, state->users, 198 if (!state->users) { 236 sdap_get_ad_match_rule_members_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, size_t *num_users, struct sysdb_attrs ***users) argument [all...] |
H A D | sdap_async_users.c | 4 Async LDAP Helper routines - retrieving users 393 /* For subdomain users, only create the private group as 649 /* ==Generic-Function-to-save-multiple-users============================= */ 655 struct sysdb_attrs **users, 670 /* Nothing to do if there are no users */ 698 ret = sdap_save_user(tmpctx, opts, dom, users[i], mapped_attrs, 762 struct sysdb_attrs **users; member in struct:sdap_search_user_state 771 struct sysdb_attrs **users, 799 state->users = NULL; 842 "Searching for users wit 651 sdap_save_users(TALLOC_CTX *memctx, struct sysdb_ctx *sysdb, struct sss_domain_info *dom, struct sdap_options *opts, struct sysdb_attrs **users, int num_users, struct sysdb_attrs *mapped_attrs, char **_usn_value) argument 884 struct sysdb_attrs **users; local 945 sdap_search_user_copy_batch(struct sdap_search_user_state *state, struct sysdb_attrs **users, size_t count) argument 965 sdap_search_user_recv(TALLOC_CTX *memctx, struct tevent_req *req, char **higher_usn, struct sysdb_attrs ***users, size_t *count) argument 997 struct sysdb_attrs **users; member in struct:sdap_get_users_state [all...] |
H A D | sdap_async_private.h | 95 struct sysdb_attrs **users,
|
H A D | sdap_async.h | 61 /* Search users in LDAP, return them as attrs */ 79 char **higher_usn, struct sysdb_attrs ***users, 82 /* Search users in LDAP using the request above, save them to cache */ 381 struct sysdb_attrs ***users);
|
/sssd-io/src/tests/cmocka/ |
H A D | test_sdap_initgr.c | 43 struct sysdb_attrs **users, 134 user_base_dn = talloc_strdup_append(user_base_dn, "cn=users,"); 341 struct sysdb_attrs **users; local 364 users = talloc_array(test_ctx, struct sysdb_attrs *, 2); 365 users[0] = mock_sysdb_user(users, object_bases[0], 368 users[1] = mock_sysdb_user(users, object_bases[1], 372 ret = sdap_search_initgr_user_in_batch(initgr_state, users, 2); 381 talloc_zfree(users); 391 struct sysdb_attrs **users; local 439 struct sysdb_attrs **users; local [all...] |
H A D | test_responder_cache_req.c | 45 } users[] = {{"test-user1", "upn1@upndomain.com", variable in typeref:struct:test_user 268 users[0].short_name, exp_ret); 280 users[0].upn, exp_ret); 290 cache_refresh_percent, users[0].uid, exp_ret); 491 prepare_user(ctx->tctx->dom, &users[0], 1000, time(NULL)); 495 prepare_user(ctx->tctx->dom, &users[1], 1000, time(NULL)); 523 prepare_user(domain, &users[0], 1000, time(NULL)); 735 prepare_user(domain, &users[0], 1000, time(NULL)); 740 mock_parse_inp(users[0].short_name, NULL, ERR_OK); 745 check_user(test_ctx, &users[ [all...] |
H A D | test_sysdb_sudo.c | 51 } users[] = { { "test_USER1", 1001, 1001 }, variable in typeref:struct:test_user 83 ret = sysdb_add_user(domain, users[i].name, users[i].uid, gid, 84 users[i].name, NULL, "/bin/bash", domain->name, 107 users[i].name); 129 users[i].name); 260 filter = sysdb_sudo_filter_user(test_ctx, users[0].name, NULL, 0); 286 assert_string_equal(result, users[0].name); 307 const char *lowered_name = sss_tc_utf8_str_tolower(test_ctx, users[0].name); 318 filter = sysdb_sudo_filter_user(test_ctx, users[ [all...] |
H A D | test_nested_groups.c | 54 /* put users and groups under the same container so we can easily run the 58 #define USER_BASE_DN "cn=users," OBJECT_BASE_DN 71 struct sysdb_attrs **users; member in struct:nested_groups_test_ctx 128 &ctx->num_users, &ctx->users, 171 assert_null(test_ctx->users); 185 const char *users[] = { "cn=user1,"USER_BASE_DN, local 198 "rootgroup", users); 232 /* Check the users */ 236 compare_sysdb_string_array_noorder(test_ctx->users, 248 const char *users[] local [all...] |
/sssd-io/src/tests/ |
H A D | pyhbac-test.py | 134 users = ["foo", "bar"] 136 return pyhbac.HbacRuleElement(names=users, groups=user_groups) 199 users = ["foo", "bar"] 204 self.assertIsInstance(rule.users, pyhbac.HbacRuleElement) 209 self.assertIsInstance(rule.users.names, list) 210 self.assertIsInstance(rule.users.groups, list) 211 self.assertCountEqual(rule.users.names, []) 212 self.assertCountEqual(rule.users.groups, []) 215 user_el = pyhbac.HbacRuleElement(names=users, groups=user_groups) 217 rule.users [all...] |
H A D | ipa_hbac-tests.c | 74 /* Create a rule that ALLOWs all services, users and 88 rule->users = talloc_zero(rule, struct hbac_rule_element); 89 fail_if (rule->users == NULL); 90 rule->users->category = HBAC_CATEGORY_ALL; 91 rule->users->names = NULL; 92 rule->users->groups = NULL; 263 rules[0]->users->category = HBAC_CATEGORY_NULL; 265 rules[0]->users->names = talloc_array(rules[0], const char *, 2); 266 fail_if(rules[0]->users->names == NULL); 268 rules[0]->users [all...] |
/sssd-io/src/providers/ipa/ |
H A D | ipa_hbac_common.c | 173 /* Get the users */ 177 &new_rule->users); 179 DEBUG(SSSDBG_CRIT_FAILURE, "Could not parse users for rule [%s]\n", 311 * take care of subdomain users as well */ 379 struct hbac_request_element *users; local 390 users = talloc_zero(tmp_ctx, struct hbac_request_element); 391 if (users == NULL) { 401 users->name = talloc_steal(users, shortname); 438 DEBUG(SSSDBG_TRACE_LIBS, "No groups for [%s]\n", users [all...] |
H A D | ipa_hbac_private.h | 124 struct hbac_rule_element **users);
|
H A D | ipa_id.h | 143 struct ldb_message_element *users);
|
H A D | ipa_hbac_users.c | 167 struct hbac_rule_element **users) 193 DEBUG(SSSDBG_TRACE_LIBS, "Processing users for rule [%s]\n", rule_name); 248 "Original DN matched multiple users. Skipping \n"); 363 *users = talloc_steal(mem_ctx, new_users); 163 hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx, struct sss_domain_info *domain, const char *rule_name, struct sysdb_attrs *rule_attrs, struct hbac_rule_element **users) argument
|
/sssd-io/src/tests/cwrap/ |
H A D | test_negcache.c | 54 } users[] = { { "test_user1", 1001, 50001 }, variable in typeref:struct:test_user 65 users[i].name, 69 ret = sysdb_add_user(domain, users[i].name, users[i].uid, users[i].gid, 216 users[0].name); 230 users[0].name); 234 users[1].name); 327 users[0].uid); 341 users[ [all...] |
/sssd-io/src/providers/files/ |
H A D | files_ops.c | 54 struct passwd **users = NULL; local 67 users = talloc_zero_array(mem_ctx, struct passwd *, 69 if (users == NULL) { 76 * all users atop a memory context or only return users that differ from 86 pwd = talloc_zero(users, struct passwd); 110 users[n_users] = pwd; 113 users = talloc_realloc(mem_ctx, 114 users, 116 talloc_array_length(users) 460 struct passwd **users = NULL; local [all...] |
/sssd-io/src/lib/ipa_hbac/ |
H A D | ipa_hbac.h | 110 * Components can be one of users, target hosts, 159 struct hbac_rule_element *users; member in struct:hbac_rule
|
H A D | hbac_evaluator.c | 118 if (!hbac_rule_element_is_complete(rule->users)) { 232 if (!rule->users 243 /* Check users */ 244 ret = hbac_evaluate_element(rule->users, 499 if (rule->users) { 501 hbac_rule_element_debug_print(rule->users, "users");
|
/sssd-io/src/tests/python/ |
H A D | sssd-testlib.spec | 115 - Add functions to create POSIX users/groups 117 - Use paramiko to test ssh logins for non-root users 128 - Add functions related to adding, removing, modifying AD users,
|
/sssd-io/src/responder/ifp/ |
H A D | ifp_groups.c | 838 const char **users; local 866 users = NULL; 874 users = talloc_zero_array(tmp_ctx, const char *, num_members + 1); 875 if (users == NULL) { 899 users[num_users] = ifp_users_build_path_from_msg(users, domain, 901 if (users[num_users] == NULL) { 928 *_users = talloc_steal(mem_ctx, users);
|
/sssd-io/src/python/ |
H A D | pyhbac.c | 638 HbacRuleElement *users; member in struct:__anon18 672 self->users = (HbacRuleElement *) HbacRuleElement_new( 681 if (self->services == NULL || self->users == NULL || 684 Py_XDECREF(self->users); 701 Py_CLEAR(self->users); 719 Py_VISIT((PyObject *) self->users); 760 if (HbacRuleElement_init(self->users, empty_tuple, NULL) == -1 || 879 "users %s services %s " 885 users_repr = HbacRuleElement_repr(self->users); 1014 { discard_const_p(char, "users"), T_OBJECT_E [all...] |
/sssd-io/src/db/ |
H A D | sysdb_sudo.c | 888 const char **users = NULL; local 901 &users); 909 if (users == NULL) { 914 for (int i = 0; users[i] != NULL; i++) { 917 users[i]);
|
/sssd-io/src/tests/intg/ |
H A D | test_files_provider.py | 600 Test that enumerating all users works with the default configuration. Also 802 def useradd_list(pwd_ops, users): 803 for usr in users: 807 def user_and_group_setup(pwd_ops, grp_ops, users, groups, reverse): 814 useradd_list(pwd_ops, users) 818 useradd_list(pwd_ops, users) 822 # Test that users are members as per getgrnam 825 # Test that users are members as per initgroups 851 Multiple users are linked with a group 1027 Test that returning exactly FILES_REALLOC_CHUNK users (se [all...] |