/freebsd/contrib/kyua/utils/process/ |
H A D | isolation_test.cpp | 149 _unprivileged_user(unprivileged_user) in check_drop_privileges() 350 unprivileged_user)); in ATF_TEST_CASE_BODY() 370 passwd::user unprivileged_user = passwd::current_user(); in ATF_TEST_CASE_BODY() local 371 unprivileged_user.uid += 1; in ATF_TEST_CASE_BODY() 374 unprivileged_user)); in ATF_TEST_CASE_BODY() 396 passwd::user unprivileged_user = passwd::current_user(); in ATF_TEST_CASE_BODY() local 397 unprivileged_user.gid += 1; in ATF_TEST_CASE_BODY() 400 unprivileged_user)); in ATF_TEST_CASE_BODY() 504 process::isolate_path(unprivileged_user, dir); in do_isolate_path_test() 577 unprivileged_user.gid = ::getgid(); in ATF_TEST_CASE_BODY() [all …]
|
H A D | isolation.cpp | 137 process::isolate_child(const optional< passwd::user >& unprivileged_user, in isolate_child() argument 140 isolate_path(unprivileged_user, work_directory); in isolate_child() 151 if (unprivileged_user && passwd::current_user().is_root()) { in isolate_child() 152 const passwd::user& user = unprivileged_user.get(); in isolate_child() 187 process::isolate_path(const optional< passwd::user >& unprivileged_user, in isolate_path() argument 190 if (!unprivileged_user || !passwd::current_user().is_root()) in isolate_path() 192 const passwd::user& user = unprivileged_user.get(); in isolate_path()
|
H A D | executor.cpp | 118 const optional< passwd::user > unprivileged_user, in setup_child() 146 const optional< passwd::user > unprivileged_user; member 182 unprivileged_user(unprivileged_user_), in impl() 273 const optional< passwd::user > unprivileged_user; member 338 unprivileged_user(unprivileged_user_), in impl() 462 executor::exit_handle::unprivileged_user(void) const in unprivileged_user() function in executor::exit_handle 464 return _pimpl->unprivileged_user; in unprivileged_user() 684 data._pimpl->unprivileged_user, in post_wait() 712 data._pimpl->unprivileged_user, in reap() 820 unprivileged_user, in spawn_post() [all …]
|
H A D | executor.ipp | 77 /// \param unprivileged_user If set, user to switch to before execution. 81 const optional< passwd::user > unprivileged_user) : 85 _unprivileged_user(unprivileged_user) 108 /// \param unprivileged_user If not none, user to switch to before execution. 121 const optional< passwd::user > unprivileged_user, 136 unprivileged_user), 140 timeout, unprivileged_user, child); 172 base.unprivileged_user()),
|
H A D | executor_test.cpp | 317 const optional< passwd::user > unprivileged_user = none, in do_spawn() 322 hook, timeout, unprivileged_user, stdout_target, stderr_target); in do_spawn() 702 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local 706 infinite_timeout, utils::make_optional(unprivileged_user)); in ATF_TEST_CASE_BODY() 711 F("UID = %s\n") % unprivileged_user.uid)); in ATF_TEST_CASE_BODY()
|
H A D | executor.hpp | 161 const utils::optional< utils::passwd::user >& unprivileged_user(void) const;
|
/freebsd/tests/sys/cddl/zfs/tests/cli_user/misc/ |
H A D | misc_test.sh | 33 atf_set "require.config" unprivileged_user 59 atf_set "require.config" unprivileged_user 85 atf_set "require.config" unprivileged_user 111 atf_set "require.config" unprivileged_user 137 atf_set "require.config" unprivileged_user 163 atf_set "require.config" unprivileged_user 189 atf_set "require.config" unprivileged_user 215 atf_set "require.config" unprivileged_user 241 atf_set "require.config" unprivileged_user 267 atf_set "require.config" unprivileged_user [all …]
|
/freebsd/tests/sys/cddl/zfs/tests/cli_user/zpool_iostat/ |
H A D | zpool_iostat_test.sh | 33 atf_set "require.config" unprivileged_user 59 atf_set "require.config" unprivileged_user
|
/freebsd/contrib/kyua/utils/fs/ |
H A D | operations_test.cpp | 462 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local 464 ATF_REQUIRE(::setegid(unprivileged_user.gid) != -1); in ATF_TEST_CASE_BODY() 465 ATF_REQUIRE(::seteuid(unprivileged_user.uid) != -1); in ATF_TEST_CASE_BODY() 520 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local 522 ATF_REQUIRE(::setegid(unprivileged_user.gid) != -1); in ATF_TEST_CASE_BODY() 523 ATF_REQUIRE(::seteuid(unprivileged_user.uid) != -1); in ATF_TEST_CASE_BODY()
|
/freebsd/usr.bin/kyua/ |
H A D | kyua.conf-default | 10 unprivileged_user = 'tests'
|
/freebsd/tests/sys/cddl/zfs/tests/cli_user/zpool_list/ |
H A D | zpool_list_test.sh | 33 atf_set "require.config" unprivileged_user
|
/freebsd/contrib/kyua/integration/ |
H A D | cmd_config_test.sh | 48 unprivileged_user = "$(id -u -n)" 60 unprivileged_user = $(id -u -n)
|
/freebsd/tests/sys/cddl/zfs/tests/cli_user/ |
H A D | cli.cfg | 31 export UNPRIVILEGED_USER=`atf_config_get unprivileged_user`
|
/freebsd/contrib/kyua/examples/ |
H A D | kyua.conf | 60 unprivileged_user = "nobody"
|
/freebsd/contrib/kyua/engine/ |
H A D | scheduler.cpp | 1296 optional< passwd::user > unprivileged_user; in spawn_test() local 1299 unprivileged_user = user_config.lookup< engine::user_node >( in spawn_test() 1307 unprivileged_user); in spawn_test()
|
/freebsd/contrib/kyua/ |
H A D | NEWS.md | 200 dropping group privileges when `unprivileged_user` is set. Also fixes 223 * Issue #100: Do not try to drop privileges to `unprivileged_user` when we 226 root and the current user and `unprivileged_user` do not match.
|