/illumos-gate/usr/src/test/zfs-tests/tests/functional/delegate/ |
H A D | zfs_allow_001_pos.ksh | 36 # "everyone" is interpreted as the keyword "everyone" whatever the same 40 # 1. Create user 'everyone'. 41 # 2. Verify 'everyone' is interpreted as keywords. 42 # 3. Create group 'everyone'. 43 # 4. Verify 'everyone' is interpreted as keywords. 51 del_user everyone 54 del_group everyone 60 log_assert "everyone' is interpreted as a keyword even if a user " \ 61 "or group named 'everyone' exist [all...] |
H A D | zfs_allow_005_pos.ksh | 40 # 1. Allow create permissions to everyone on $ROOT_TESTFS locally. 55 log_must zfs allow -l everyone create,mount $ROOT_TESTFS
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/cli_user/misc/ |
H A D | zfs_unallow_001_neg.ksh | 54 log_mustnot zfs unallow everyone $TESTPOOL/$TESTFS/allowed
|
H A D | setup.ksh | 112 log_must zfs allow everyone create $TESTPOOL/$TESTFS/allowed
|
/illumos-gate/usr/src/common/acl/ |
H A D | acl_common.h | 43 uint32_t everyone; /* allow mask matching mode */ member in struct:trivial_acl
|
H A D | acl_common.c | 1627 masks->everyone = ACE_READ_ACL|ACE_READ_ATTRIBUTES|ACE_READ_NAMED_ATTRS| 1630 masks->everyone |= read_mask; 1632 masks->everyone |= write_mask; 1634 masks->everyone |= execute_mask; 1674 SET_ACE(acl, index, -1, masks.everyone, ACE_ACCESS_ALLOWED_ACE_TYPE, 1685 * owner, group, everyone entries. ACL can't
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_rwacl_001_pos.ksh | 36 # Verify assigned read_acl/write_acl to owner@/group@/everyone@, 45 # 4. Verify access permission, after everyone was assigned read_acl/write. 46 # 5. Verify everyone@ was deny except specificied user, this user can read 158 chmod A0+everyone@:read_acl/write_acl:$flag $node 171 log_must usr_exec chmod A0+everyone@:read_acl/write_acl:deny $node 193 log_must usr_exec chmod A0+everyone@:read_acl/write_acl:deny $node
|
H A D | zfs_acl_chmod_rwx_004_pos.ksh | 58 # When everyone@ were deny, this file can't execute. 90 log_must usr_exec chmod A+everyone@:$access:$flag $node
|
H A D | zfs_acl_chmod_rwx_002_pos.ksh | 37 # everyone@ correctly alters mode bits . 50 "or everyone@ correctly alters mode bits." 54 set -A a_flag owner group everyone 148 if [[ $acl_flag == "owner" || $acl_flag == "everyone" ]]; then 151 if [[ $acl_flag == "group" || $acl_flag == "everyone" ]]; then 154 if [[ $acl_flag == "everyone" ]]; then 244 "or everyone@ correctly alters mode bits passed."
|
H A D | zfs_acl_chmod_aclmode_001_pos.ksh | 377 everyone@)
|
/illumos-gate/usr/src/lib/pyzfs/common/ |
H A D | allow.py | 54 # type is "user", "group", "everyone", or "" (for sets) 55 # name is a user, group, or set name, or "" (for everyone) 85 nwho = "3everyone" 185 elif w == "everyone": 285 u = _("""unallow [-rldug] <"everyone"|user|group>[,...] 294 allow [-ldug] <"everyone"|user|group>[,...] <perm|@setname>[,...] 312 parser.add_option("-e", action="store_true", dest="everyone", 313 help=_("%s permission for everyone") % verb) 342 if sum((bool(options.everyone), bool(options.user), 357 options.group or options.everyone o [all...] |
/illumos-gate/usr/src/lib/libsec/common/ |
H A D | acl_lex.l | 113 <TS>everyone@: {
|
/illumos-gate/usr/src/cmd/zfs/ |
H A D | zfs_main.c | 288 "<\"everyone\"|user|group>[,...] <perm|@setname>[,...]\n" 297 "<\"everyone\"|user|group>[,...]\n" 4154 uu_avl_t *fsp_uge_avl; /* user,group,everyone */ 4707 boolean_t everyone; member in struct:allow_opts 4736 "-e", gettext("set permission for everyone"), 4813 int uge_sum = opts->user + opts->group + opts->everyone; 4844 } else if (opts->everyone) { 4849 } else if (uge_sum == 0 && argc > 0 && strcmp(argv[0], "everyone") 4851 opts->everyone = B_TRUE; 5025 } else if (opts->everyone) { [all...] |
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zfs_acl.c | 1393 * We preserve owner@, group@, or @everyone 1441 zfs_set_ace(aclp, zacep, masks.everyone, ALLOW, -1, ACE_EVERYONE);
|
/illumos-gate/usr/src/grub/grub-0.97/docs/ |
H A D | texinfo.tex | 1902 % @url synonym for @uref, since that's how everyone uses it.
|