Home
last modified time | relevance | path

Searched refs:unprivileged_user (Results 1 – 16 of 16) sorted by relevance

/freebsd/contrib/kyua/utils/process/
H A Disolation_test.cpp148 check_drop_privileges(const passwd::user& unprivileged_user) : in check_drop_privileges() argument
149 _unprivileged_user(unprivileged_user) in check_drop_privileges()
346 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local
350 unprivileged_user)); in ATF_TEST_CASE_BODY()
370 passwd::user unprivileged_user = passwd::current_user(); in ATF_TEST_CASE_BODY() local
371 unprivileged_user.uid += 1; in ATF_TEST_CASE_BODY()
374 unprivileged_user)); in ATF_TEST_CASE_BODY()
396 passwd::user unprivileged_user = passwd::current_user(); in ATF_TEST_CASE_BODY() local
397 unprivileged_user.gid += 1; in ATF_TEST_CASE_BODY()
400 unprivileged_user)); in ATF_TEST_CASE_BODY()
[all …]
H A Disolation.cpp137 process::isolate_child(const optional< passwd::user >& unprivileged_user, in isolate_child() argument
140 isolate_path(unprivileged_user, work_directory); in isolate_child()
151 if (unprivileged_user && passwd::current_user().is_root()) { in isolate_child()
152 const passwd::user& user = unprivileged_user.get(); in isolate_child()
187 process::isolate_path(const optional< passwd::user >& unprivileged_user, in isolate_path() argument
190 if (!unprivileged_user || !passwd::current_user().is_root()) in isolate_path()
192 const passwd::user& user = unprivileged_user.get(); in isolate_path()
H A Dexecutor.cpp118 const optional< passwd::user > unprivileged_user, in setup_child()
123 process::isolate_path(unprivileged_user, control_directory); in setup_child()
124 process::isolate_child(unprivileged_user, work_directory); in setup_child()
146 const optional< passwd::user > unprivileged_user; member
182 unprivileged_user(unprivileged_user_), in impl()
273 const optional< passwd::user > unprivileged_user; member
338 unprivileged_user(unprivileged_user_), in impl()
462 executor::exit_handle::unprivileged_user(void) const in unprivileged_user() function in executor::exit_handle
464 return _pimpl->unprivileged_user; in unprivileged_user()
684 data._pimpl->unprivileged_user, in post_wait()
[all …]
H A Dexecutor.ipp77 /// \param unprivileged_user If set, user to switch to before execution.
81 const optional< passwd::user > unprivileged_user) :
85 _unprivileged_user(unprivileged_user)
108 /// \param unprivileged_user If not none, user to switch to before execution.
121 const optional< passwd::user > unprivileged_user,
136 unprivileged_user),
140 timeout, unprivileged_user, child);
172 base.unprivileged_user()),
H A Dexecutor_test.cpp317 const optional< passwd::user > unprivileged_user = none, in do_spawn()
322 hook, timeout, unprivileged_user, stdout_target, stderr_target); in do_spawn()
702 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local
706 infinite_timeout, utils::make_optional(unprivileged_user)); in ATF_TEST_CASE_BODY()
711 F("UID = %s\n") % unprivileged_user.uid)); in ATF_TEST_CASE_BODY()
H A Dexecutor.hpp161 const utils::optional< utils::passwd::user >& unprivileged_user(void) const;
/freebsd/tests/sys/cddl/zfs/tests/cli_user/misc/
H A Dmisc_test.sh33 atf_set "require.config" unprivileged_user
59 atf_set "require.config" unprivileged_user
85 atf_set "require.config" unprivileged_user
111 atf_set "require.config" unprivileged_user
137 atf_set "require.config" unprivileged_user
163 atf_set "require.config" unprivileged_user
189 atf_set "require.config" unprivileged_user
215 atf_set "require.config" unprivileged_user
241 atf_set "require.config" unprivileged_user
267 atf_set "require.config" unprivileged_user
[all …]
/freebsd/tests/sys/cddl/zfs/tests/cli_user/zpool_iostat/
H A Dzpool_iostat_test.sh33 atf_set "require.config" unprivileged_user
59 atf_set "require.config" unprivileged_user
/freebsd/contrib/kyua/utils/fs/
H A Doperations_test.cpp462 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local
464 ATF_REQUIRE(::setegid(unprivileged_user.gid) != -1); in ATF_TEST_CASE_BODY()
465 ATF_REQUIRE(::seteuid(unprivileged_user.uid) != -1); in ATF_TEST_CASE_BODY()
520 const passwd::user unprivileged_user = passwd::find_user_by_name( in ATF_TEST_CASE_BODY() local
522 ATF_REQUIRE(::setegid(unprivileged_user.gid) != -1); in ATF_TEST_CASE_BODY()
523 ATF_REQUIRE(::seteuid(unprivileged_user.uid) != -1); in ATF_TEST_CASE_BODY()
/freebsd/usr.bin/kyua/
H A Dkyua.conf-default10 unprivileged_user = 'tests'
/freebsd/tests/sys/cddl/zfs/tests/cli_user/zpool_list/
H A Dzpool_list_test.sh33 atf_set "require.config" unprivileged_user
/freebsd/contrib/kyua/integration/
H A Dcmd_config_test.sh48 unprivileged_user = "$(id -u -n)"
60 unprivileged_user = $(id -u -n)
/freebsd/tests/sys/cddl/zfs/tests/cli_user/
H A Dcli.cfg31 export UNPRIVILEGED_USER=`atf_config_get unprivileged_user`
/freebsd/contrib/kyua/examples/
H A Dkyua.conf60 unprivileged_user = "nobody"
/freebsd/contrib/kyua/engine/
H A Dscheduler.cpp1296 optional< passwd::user > unprivileged_user; in spawn_test() local
1299 unprivileged_user = user_config.lookup< engine::user_node >( in spawn_test()
1307 unprivileged_user); in spawn_test()
/freebsd/contrib/kyua/
H A DNEWS.md200 dropping group privileges when `unprivileged_user` is set. Also fixes
223 * Issue #100: Do not try to drop privileges to `unprivileged_user` when we
226 root and the current user and `unprivileged_user` do not match.