Home
last modified time | relevance | path

Searched full:allow (Results 1 – 25 of 3563) sorted by relevance

12345678910>>...143

/freebsd/tests/sys/acl/
H A Dtools-nfs4-psarc.test43 > owner@:rw-p--aARWcCos:-------:allow
44 > group@:r-----a-R-c--s:-------:allow
45 > everyone@:r-----a-R-c--s:-------:allow
48 > owner@:rw-p--aARWcCos:-------:allow
49 > group@:r-----a-R-c--s:-------:allow
50 > everyone@:r-----a-R-c--s:-------:allow
57 …ttributes/write_attributes/read_xattr/write_xattr/read_acl/write_acl/write_owner/synchronize::allow
58 > group@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
59 > everyone@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
62 $ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx
[all …]
H A Dtools-nfs4.test44 > owner@:rw-p---A-W-Co-:-------:allow
46 > group@:r-------------:-------:allow
48 > everyone@:r-----a-R-c--s:-------:allow
52 > owner@:rw-p---A-W-Co-:-------:allow
54 > group@:r-------------:-------:allow
56 > everyone@:r-----a-R-c--s:-------:allow
64 … owner@:read_data/write_data/append_data/write_attributes/write_xattr/write_acl/write_owner::allow
66 > group@:read_data::allow
68 > everyone@:read_data/read_attributes/read_xattr/read_acl/synchronize::allow
71 $ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx
[all …]
H A Dtools-crossfs.test44 > owner@:rw-p--aARWcCos:-------:allow
45 > group@:r-----a-R-c--s:-------:allow
46 > everyone@:r-----a-R-c--s:-------:allow
98 > owner@:r-----aARWcCos:-------:allow
99 > group@:rwxp--a-R-c--s:-------:allow
100 > everyone@:rw-p--a-R-c--s:-------:allow
108 $ setfacl -a0 u:42:x:allow,g:43:w:allow nfs4/xxx
111 > user:42:--x-----------:-------:allow
112 > group:43:-w------------:-------:allow
113 > owner@:rw-p--aARWcCos:-------:allow
[all …]
H A Dtools-nfs4-trivial.test43 > owner@:rw-p--aARWcCos:-------:allow
44 > group@:r-----a-R-c--s:-------:allow
45 > everyone@:r-----a-R-c--s:-------:allow
50 …cl -a0 owner@:x:deny,owner@:rwpAWCo:allow,group@:wxp:deny,group@:r:allow,everyone@:wxpAWCo:deny,ev…
60 > owner@:rw-p---A-W-Co-:-------:allow
62 > group@:r-------------:-------:allow
64 > everyone@:r-----a-R-c--s:-------:allow
73 > owner@:rw-p---A-W-Co-:-------:allow
75 > group@:r-------------:-------:allow
77 > everyone@:r-----a-R-c--s:-------:allow
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/history/
H A Dhistory_009_pos.ksh61 array=( "allow" "-s @basic snapshot"
62 "allow" "-s @set @basic"
63 "allow" "-c create"
65 "allow" "-c @set"
67 "allow" "-l -u $HIST_USER snapshot"
68 "allow" "-u $HIST_USER snapshot"
70 "allow" "-l -u $HIST_USER @set"
71 "allow" "-u $HIST_USER @set"
73 "allow" "-d -u $HIST_USER snapshot"
74 "allow" "-u $HIST_USER snapshot"
[all …]
/freebsd/tests/sys/cddl/zfs/tests/history/
H A Dhistory_009_pos.ksh86 $ZFS 2>&1 | $GREP "allow" > /dev/null
119 "s-\$@basic" "allow" "-s @basic snapshot" \
120 "S-\$@set" "allow" "-s @set @basic" \
121 "c-\\$" "allow" "-c create" \
123 "C-\\$ @set" "allow" "-c @set" \
125 "ul\$$uid" "allow" "-l -u $HIST_USER snapshot" \
126 "ul\$$uid" "allow" "-u $HIST_USER snapshot" \
128 "Ul\$$uid" "allow" "-l -u $HIST_USER @set" \
129 "Ul\$$uid" "allow" "-u $HIST_USER @set" \
131 "ud\$$uid" "allow" "-d -u $HIST_USER snapshot" \
[all …]
/freebsd/lib/libwrap/
H A Dhosts.allow2 # hosts.allow access control file for "tcp wrapped" applications.
5 # Place both 'allow' and 'deny' rules in the hosts.allow file.
22 ALL : ALL : allow
36 # Allow anything from localhost. Note that an IP address (not a host
38 ALL : localhost 127.0.0.1 : allow
40 ALL : [::1] : allow
41 #ALL : my.machine.example.com 192.0.2.35 : allow
44 #ALL : [fe80::%fxp0]/10 : allow
47 #ALL : [2001:db8:2:1::]/64 : allow
50 sendmail : localhost : allow
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/
H A Dzfs_allow_008_pos.ksh36 # A non-root user can use 'zfs allow' to delegate permissions that
37 # they have, if they also have the 'allow' permission.
41 # 2. Verify the non-root user can use 'zfs allow' if they have
42 # 'allow' permission.
47 log_assert "Verify non-root user can allow permissions."
58 log_must zfs allow -l $STAFF1 $perms1 $dtst
59 log_must zfs allow -l $STAFF1 allow $dtst
62 log_must zfs allow -l $STAFF1 $perms2 $childfs
64 log_mustnot user_run $STAFF1 zfs allow $OTHER1 $perms1 $childfs
68 # Verify 'allow' give non-privilege user delegated permission.
[all …]
H A Ddelegate_common.kshlib168 allow)
306 log_must zfs allow -l $STAFF1 $LOCAL_SET $dtst
307 log_must zfs allow -d $STAFF2 $DESC_SET $dtst
308 log_must zfs allow $OTHER1 $LOCAL_DESC_SET $dtst
309 log_must zfs allow $OTHER2 $LOCAL_DESC_SET $dtst
390 log_must zfs allow $user create $fs
397 log_must zfs allow $user mount $fs
404 log_must zfs allow $user mount,create $fs
528 log_must zfs allow $user mount $fs
545 log_must zfs allow $user mount $fs
[all …]
H A Dzfs_allow_009_neg.ksh36 # zfs allow can deal with invalid arguments.(Invalid options or combination)
52 log_mustnot eval "zfs allow -s @$longset $dtst"
54 log_mustnot zfs allow -s @non-existent $dtst
55 log_mustnot zfs allow $STAFF "atime,created,mounted" $dtst
56 log_mustnot zfs allow $dtst $TESTPOOL
57 log_mustnot zfs allow -c $dtst
58 log_mustnot zfs allow -u $STAFF1 $dtst
59 log_mustnot zfs allow -u $STAFF1 -g $STAFF_GROUP "create,destroy" $dtst
60 log_mustnot zfs allow -u $STAFF1 -e "mountpoint" $dtst
/freebsd/tests/sys/cddl/zfs/tests/delegate/
H A Dzfs_allow_008_pos.ksh36 # non-root user can allow any permissions which he is holding to
37 # other else user when it get 'allow' permission.
41 # 2. Verify the non-root user can allow permission if he has allow
56 log_assert "Verify non-root user can allow permissions."
67 log_must $ZFS allow -l $STAFF1 $perms1 $dtst
68 log_must $ZFS allow -l $STAFF1 allow $dtst
71 log_must $ZFS allow -l $STAFF1 $perms2 $childfs
73 log_mustnot user_run $STAFF1 $ZFS allow $OTHER1 $perms1 $childfs
77 # Verify 'allow' give non-privilege user delegated permission.
78 log_must user_run $STAFF1 $ZFS allow -l $OTHER1 $perms1 $dtst
[all …]
H A Ddelegate_common.kshlib174 allow)
361 log_must $ZFS allow -l $STAFF1 $LOCAL_SET $dtst
362 log_must $ZFS allow -d $STAFF2 $DESC_SET $dtst
363 log_must $ZFS allow $OTHER1 $LOCAL_DESC_SET $dtst
364 log_must $ZFS allow $OTHER2 $LOCAL_DESC_SET $dtst
449 log_must $ZFS allow $user create $fs
456 log_must $ZFS allow $user mount $fs
463 log_must $ZFS allow $user mount,create $fs
588 log_must $ZFS allow $user mount $fs
603 log_must $ZFS allow $user mount $fs
[all …]
H A Dzfs_allow_009_neg.ksh36 # zfs allow can deal with invalid arguments.(Invalid options or combination)
61 log_mustnot eval "$ZFS allow -s @$longset $dtst"
64 log_mustnot $ZFS allow -s @non-existent $dtst
65 log_mustnot $ZFS allow $STAFF "atime,created,mounted" $dtst
66 log_mustnot $ZFS allow $dtst $TESTPOOL
67 log_mustnot $ZFS allow -c $dtst
68 log_mustnot $ZFS allow -u $STAFF1 $dtst
69 log_mustnot $ZFS allow -u $STAFF1 -g $STAFF_GROUP "create,destroy" $dtst
70 log_mustnot $ZFS allow -u $STAFF1 -e "mountpoint" $dtst
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzfs-allow.837 .Nm zfs-allow
41 .Cm allow
48 .Cm allow
55 .Cm allow
61 .Cm allow
99 .Cm allow
105 .Nm zfs Cm allow
121 .Cm allow
130 .Cm allow
141 Allow only for the descendent file systems.
[all …]
H A Dzfs-unallow.837 .Nm zfs-allow
41 .Cm allow
48 .Cm allow
55 .Cm allow
61 .Cm allow
99 .Cm allow
105 .Nm zfs Cm allow
121 .Cm allow
130 .Cm allow
141 Allow only for the descendent file systems.
[all …]
/freebsd/tests/sys/cam/ctl/
H A Dprevent.sh34 atf_test_case allow cleanup
37 atf_set "descr" "SCSI PREVENT ALLOW MEDIUM REMOVAL will prevent a CD from being ejected"
51 atf_check sg_prevent --allow /dev/$dev
64 atf_set "descr" "SCSI PREVENT ALLOW MEDIUM REMOVAL is idempotent when run from the same initiator"
73 atf_check sg_prevent --allow /dev/$dev
74 atf_check sg_prevent --allow /dev/$dev
77 # Even though we ran --allow twice, a single --prevent command should
78 # suffice to prevent ejecting. Multiple ALLOW/PREVENT commands from
90 atf_set "descr" "SCSI PREVENT ALLOW MEDIUM REMOVAL may not be used on non-removable media"
109 atf_set "descr" "SCSI PREVENT ALLOW MEDIUM REMOVAL will prevent a CD from being ejected"
[all …]
/freebsd/tests/sys/cddl/zfs/tests/cli_user/misc/
H A Dzfs_allow_001_neg.ksh38 # zfs allow returns an error when run as a user
56 # check to see if we have zfs allow
57 $ZFS 2>&1 | $GREP "allow" > /dev/null
59 log_unsupported "ZFS allow not supported on this machine."
62 log_assert "zfs allow returns an error when run as a user"
64 log_must run_unprivileged "$ZFS allow $TESTPOOL/$TESTFS"
65 log_mustnot run_unprivileged "$ZFS allow `$LOGNAME` create $TESTPOOL/$TESTFS"
68 # checking for any allow output. ( if no allows are granted,
70 OUTPUT=$(run_unprivileged "$ZFS allow $TESTPOOL/$TESTFS" | $GREP "Local+Descendent" )
73 log_fail "zfs allow permissions were granted on $TESTPOOL/$TESTFS"
[all …]
/freebsd/share/man/man7/
H A Dfirewall.7266 # the entire rule set. Allow established tcp connections through,
275 add 01000 allow tcp from any to any established
276 add 01001 allow all from any to any out via fxp0
277 add 01001 allow all from any to any out via fxp1
278 add 01001 allow all from any to any out via fxp2
305 #add 01010 allow all from 10.0.0.0/8 to 10.0.0.0/8
306 #add 01011 allow all from 192.100.5.0/24 to 192.100.5.0/24
311 # If using a more restrictive firewall, allow specific LANs
317 add 01012 allow tcp from 10.0.1.0/8 to 10.0.1.1 139
318 add 01012 allow udp from 10.0.1.0/8 to 10.0.1.1 137,138
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D03-custom_verify.cnf7 test-2 = 2-verify-custom-allow
11 test-6 = 6-noverify-accept-custom-allow
68 [2-verify-custom-allow]
69 ssl_conf = 2-verify-custom-allow-ssl
71 [2-verify-custom-allow-ssl]
72 server = 2-verify-custom-allow-server
73 client = 2-verify-custom-allow-client
75 [2-verify-custom-allow-server]
80 [2-verify-custom-allow-client]
87 client = 2-verify-custom-allow-client-extra
[all …]
/freebsd/usr.sbin/jail/
H A Djail.8219 .Va allow.dying
221 It used to allow making changes to a
381 to allow unrestricted access to all system addresses,
441 .Va allow.mount
443 .Va allow.mount.devfs
516 .It Va allow.*
520 .Va allow.set_hostname
522 .Va allow.reserved_ports ,
525 .It Va allow.set_hostname
530 .It Va allow.sysvipc
[all …]
/freebsd/tests/sys/netinet6/
H A DMakefile20 execenv_jail_params="vnet allow.raw_sockets"
22 execenv_jail_params="vnet allow.raw_sockets"
24 execenv_jail_params="vnet allow.raw_sockets"
26 execenv_jail_params="vnet allow.raw_sockets"
28 execenv_jail_params="vnet allow.raw_sockets" \
31 execenv_jail_params="vnet allow.raw_sockets"
33 execenv_jail_params="vnet allow.raw_sockets"
35 execenv_jail_params="vnet allow.raw_sockets"
/freebsd/sys/contrib/openzfs/include/sys/
H A Dmntent.h63 #define MNTOPT_GROUP "group" /* allow group mount */
64 #define MNTOPT_NOGROUP "nogroup" /* do not allow group mount */
67 #define MNTOPT_NBMAND "mand" /* allow non-blocking mandatory locks */
71 #define MNTOPT_RELATIME "relatime" /* allow relative time updates */
72 #define MNTOPT_NORELATIME "norelatime" /* do not allow relative time updates */
85 #define MNTOPT_OWNER "owner" /* allow owner mount */
86 #define MNTOPT_NOOWNER "noowner" /* do not allow owner mount */
91 #define MNTOPT_USER "user" /* allow user mount */
92 #define MNTOPT_NOUSER "nouser" /* do not allow user mount */
93 #define MNTOPT_USERS "users" /* allow user mount */
[all …]
/freebsd/contrib/pjdfstest/tests/granular/
H A D02.t29 expect 0 prependacl ${n0} user:65534:read_acl::allow
36 expect EPERM -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow
37 expect 0 prependacl ${n0} user:65534:write_acl::allow
38 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_data::allow
44 expect 0 prependacl ${n0} user:65534:write_acl::allow
64 expect 0 prependacl ${n0} user:65534:write_acl::allow
71 expect 0 prependacl ${n0} user:65534:write_acl::allow
78 expect 0 prependacl ${n0} user:65534:write_acl::allow
84 expect 0 prependacl ${n0} user:65534:write_acl::allow
85 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:write_data::allow
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_user/misc/
H A Dzfs_allow_001_neg.ksh38 # zfs allow returns an error when run as a user
47 log_assert "zfs allow returns an error when run as a user"
49 log_must zfs allow $TESTPOOL/$TESTFS
50 log_mustnot zfs allow $(id -un) create $TESTPOOL/$TESTFS
53 # checking for any allow output. ( if no allows are granted,
55 if zfs allow $TESTPOOL/$TESTFS | grep -q "Local+Descendent"
57 log_fail "zfs allow permissions were granted on $TESTPOOL/$TESTFS"
60 log_pass "zfs allow returns an error when run as a user"
/freebsd/contrib/bc/locales/
H A Den_AU.ISO8859-1.msg66 16 "POSIX does not allow names longer than 1 character: %s"
67 17 "POSIX does not allow '#' script comments"
68 18 "POSIX does not allow the following keyword: %s"
69 19 "POSIX does not allow a period ('.') as a shortcut for the last result"
71 21 "POSIX does not allow the following operator: %s"
72 22 "POSIX does not allow comparison operators outside if statements or loops"
76 26 "POSIX does not allow exponential notation"
77 27 "POSIX does not allow array references as function parameters"
78 28 "POSIX does not allow void functions"
80 30 "POSIX does not allow string
[all...]

12345678910>>...143