/dports/lang/gnustep-base/libs-base-base-1_27_0/Tests/base/GSXML/ |
H A D | basic.m | 68 "Can set a document node (with children) as root node"); 76 "Can create a node with a namespace"); 106 PASS(dat != nil, "Can build a method call with a string"); 109 "Can parse a method call with a string"); 123 PASS(dat != nil, "Can build a method call with an integer"); 126 "Can parse a method call with an integer"); 130 PASS(dat != nil, "Can build a method call with a float"); 133 "Can parse a method call with a float"); 140 "Can parse a method call with binary data"); 145 PASS(dat != nil, "Can build a method call with a date"); [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/syntax/ |
H A D | read-syntax.rkt | 11 "../namespace/namespace.rkt" 12 "../namespace/registry.rkt" 79 #:call-with-root-namespace call-with-root-namespace 90 #:call-with-root-namespace call-with-root-namespace 168 (define (call-with-root-namespace thunk) 169 (define root-ns (namespace-root-namespace (current-namespace))) 170 (if root-ns 171 ;; Switch to the root namespace: 172 (parameterize ([current-namespace root-ns]) 177 (registry-call-with-lock [all …]
|
/dports/lang/racket/racket-8.3/src/expander/syntax/ |
H A D | read-syntax.rkt | 11 "../namespace/namespace.rkt" 12 "../namespace/registry.rkt" 79 #:call-with-root-namespace call-with-root-namespace 90 #:call-with-root-namespace call-with-root-namespace 168 (define (call-with-root-namespace thunk) 169 (define root-ns (namespace-root-namespace (current-namespace))) 170 (if root-ns 171 ;; Switch to the root namespace: 172 (parameterize ([current-namespace root-ns]) 177 (registry-call-with-lock [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/read/ |
H A D | config.rkt | 24 call-with-root-namespace ; around extension callback 50 #:call-with-root-namespace [call-with-root-namespace #f] 64 (or call-with-root-namespace 66 (error 'read "no `call-with-root-namespace` provided")))
|
/dports/lang/racket/racket-8.3/src/expander/read/ |
H A D | config.rkt | 24 call-with-root-namespace ; around extension callback 50 #:call-with-root-namespace [call-with-root-namespace #f] 64 (or call-with-root-namespace 66 (error 'read "no `call-with-root-namespace` provided")))
|
H A D | demo.rkt | 101 (parameterize ([read-curly-brace-with-tag #t]) 107 (with-handlers ([exn:fail:read? exn-message]) 141 #:call-with-root-namespace (lambda (proc) (proc)))) 148 #:call-with-root-namespace (lambda (proc) (proc)))) 155 #:call-with-root-namespace (lambda (proc) (proc)))) 162 #:call-with-root-namespace (lambda (proc) (proc))) 169 (with-handlers ([exn:fail:read? exn-message])
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/network_namespace/t/ |
H A D | rpl_network_namespace.test | 17 # 2. Two network namespaces are created with specific IP addresses # 37 call mtr.add_suppression("Hostname .* does not resolve to"); 38 call mtr.add_suppression("IP address .* could not be resolved"); 68 --exec $EXE_MYSQL --no-defaults -u root --port $MASTER_MYPORT --host 10.0.2.1 --network-namespace=… 85 --exec $EXE_MYSQL --no-defaults -u root --port $SLAVE_MYPORT --host 10.0.1.1 --network-namespace=b… 100 --exec $EXE_MYSQL --no-defaults -u root --port $MASTER_MYPORT --host 10.0.2.1 --network-namespace=… 111 --exec $EXE_MYSQL --no-defaults -u root --port $SLAVE_MYPORT --host 10.0.1.1 --network-namespace=bl… 114 # Now sync slave with master 125 --exec $EXE_MYSQL --no-defaults -u root --port $SLAVE_MYPORT --host 10.0.1.1 --network-namespace=bl… 146 --exec $EXE_MYSQL --no-defaults -u root --port $SLAVE_MYPORT --host 10.0.1.1 --network-namespace=bl… [all …]
|
/dports/lang/racket/racket-8.3/src/expander/namespace/ |
H A D | api.rkt | 47 namespace-call-with-registry-lock) 52 (define ns (namespace->namespace-at-phase (make-namespace) 63 (define root-ctx (namespace-get-root-expand-ctx ns)) 64 (define post-scope (post-expansion-scope (root-expand-context-post-expansion root-ctx))) 67 … (syntax-scope-set (root-expand-context-all-scopes-stx root-ctx) 74 (root-expand-context-all-scopes-stx root-ctx) 122 (root-expand-context-module-scopes 123 (namespace-get-root-expand-ctx ns)))) 256 (syntax-mapped-names (root-expand-context-all-scopes-stx (namespace-get-root-expand-ctx ns)) 265 (define/who (namespace-call-with-registry-lock ns thunk) [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/namespace/ |
H A D | api.rkt | 47 namespace-call-with-registry-lock) 52 (define ns (namespace->namespace-at-phase (make-namespace) 63 (define root-ctx (namespace-get-root-expand-ctx ns)) 64 (define post-scope (post-expansion-scope (root-expand-context-post-expansion root-ctx))) 67 … (syntax-scope-set (root-expand-context-all-scopes-stx root-ctx) 74 (root-expand-context-all-scopes-stx root-ctx) 122 (root-expand-context-module-scopes 123 (namespace-get-root-expand-ctx ns)))) 256 (syntax-mapped-names (root-expand-context-all-scopes-stx (namespace-get-root-expand-ctx ns)) 265 (define/who (namespace-call-with-registry-lock ns thunk) [all …]
|
/dports/devel/py-oslo.privsep/oslo.privsep-2.6.2/doc/source/user/ |
H A D | index.rst | 54 The daemon (the root process) task won't stop when timeout 76 overwrite any file in the filesystem, allowing easy escalation to root 89 def get_link_devices(namespace, **kwargs): 91 with get_iproute(namespace) as ip: 95 raise NetworkNamespaceNotFound(netns_name=namespace) 106 The daemon (the root process) task won't stop when timeout 126 * `How to make a privileged call with oslo privsep`_ 128 .. _How to make a privileged call with oslo privsep: https://www.madebymikal.com/how-to-make-a-priv… 136 a filter that would allow you to run chmod as root using the following 139 chmod: CommandFilter, chmod, root [all …]
|
/dports/multimedia/libv4l/linux-5.13-rc2/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as 14 to switch to a different user must be spawned with CAP_SETUID privileges. 15 CAP_SETUID is granted to programs running as root or those running as a non-root 18 capabilities, since using file capabilities to run a program with elevated 19 privileges opens up possible security holes since any user with access to the 23 CAP_SET{U/G}ID capabilities, this is often at odds with the goals of running a 27 especially since programs often only call setuid() to drop privileges to a 45 basically-root-equivalent CAP_SETUID. 59 as fork() calls where the program doesn't immediately call exec() after the 74 without pairing them with other namespace types, which is not always an option. [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as 14 to switch to a different user must be spawned with CAP_SETUID privileges. 15 CAP_SETUID is granted to programs running as root or those running as a non-root 18 capabilities, since using file capabilities to run a program with elevated 19 privileges opens up possible security holes since any user with access to the 23 CAP_SET{U/G}ID capabilities, this is often at odds with the goals of running a 27 especially since programs often only call setuid() to drop privileges to a 45 basically-root-equivalent CAP_SETUID. 59 as fork() calls where the program doesn't immediately call exec() after the 74 without pairing them with other namespace types, which is not always an option. [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 7 from obtaining auxiliary privileges associated with CAP_SET{U/G}ID, such as 14 to switch to a different user must be spawned with CAP_SETUID privileges. 15 CAP_SETUID is granted to programs running as root or those running as a non-root 18 capabilities, since using file capabilities to run a program with elevated 19 privileges opens up possible security holes since any user with access to the 23 CAP_SET{U/G}ID capabilities, this is often at odds with the goals of running a 27 especially since programs often only call setuid() to drop privileges to a 45 basically-root-equivalent CAP_SETUID. 59 as fork() calls where the program doesn't immediately call exec() after the 74 without pairing them with other namespace types, which is not always an option. [all …]
|
/dports/databases/percona57-server/percona-server-5.7.36-39/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|
/dports/databases/mysqlwsrep57-server/mysql-wsrep-wsrep_5.7.35-25.27/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|
/dports/databases/percona57-client/percona-server-5.7.36-39/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|
/dports/databases/mysql57-client/mysql-5.7.36/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|
/dports/databases/percona57-pam-for-mysql/percona-server-5.7.36-39/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|
/dports/databases/xtrabackup/percona-xtrabackup-2.4.21/rapid/plugin/x/tests/mtr/t/ |
H A D | connection_expire.test | 5 call mtr.add_suppression("Plugin mysqlx reported: '1.1: Unsuccessful login attempt"); 6 call mtr.add_suppression("Plugin mysqlx reported: '3.1: Unsuccessful login attempt"); 7 call mtr.add_suppression("Plugin mysqlx reported: '4.1: Unsuccessful login attempt"); 8 call mtr.add_suppression("Plugin mysqlx reported: '5.1: Unsuccessful login attempt"); 75 -->login root 96 -->login root root1 158 namespace: "xplugin" 170 --echo Test: try connecting with non-root user when its password expird and root user password expi… 176 --echo Test: try connecting with Expired password using root user and expect password expire notice 179 --echo Test: try connecting with non-root user when its password expird and root user password expi… [all …]
|
H A D | connection.test | 395 namespace: "xplugin" 406 namespace: "xplugin" 419 namespace: "xplugin" 451 namespace: "xplugin" 462 namespace: "xplugin" 473 namespace: "xplugin" 509 namespace: "xplugin" 527 namespace: "xplugin" 550 namespace: "xplugin" 567 namespace: "xplugin" [all …]
|