Ack from me.
/AndersBj
Hans Feldt wrote:
> osaf/libs/common/immsv/include/immsv_api.h | 2 +-
> osaf/services/saf/immsv/immloadd/imm_loader.cc | 2 +-
> osaf/services/saf/immsv/immnd/ImmModel.cc | 12 ++++++------
> osaf/services/saf/immsv/immnd/ImmModel.hh | 2 +-
> osaf/services/saf/immsv/immnd/immnd_evt.c | 10 +++++-----
> osaf/services/saf/immsv/immnd/immnd_init.h | 2 +-
> samples/immsv/OpensafImm_Upgrade_4.5.xml | 2 +-
> 7 files changed, 16 insertions(+), 16 deletions(-)
>
>
> Generalize the attribute name since it is about access and not administration
> of IMM.
>
> diff --git a/osaf/libs/common/immsv/include/immsv_api.h
> b/osaf/libs/common/immsv/include/immsv_api.h
> --- a/osaf/libs/common/immsv/include/immsv_api.h
> +++ b/osaf/libs/common/immsv/include/immsv_api.h
> @@ -60,7 +60,7 @@ extern "C" {
>
> #define OPENSAF_IMM_LONG_DNS_ALLOWED "longDnsAllowed"
> #define OPENSAF_IMM_ACCESS_CONTROL_MODE "accessControlMode"
> -#define OPENSAF_IMM_ADMIN_GROUP_NAME "adminGroupName"
> +#define OPENSAF_IMM_AUTHORIZED_GROUP "authorizedGroup"
>
> typedef enum {
> ACCESS_CONTROL_DISABLED = 0,
> diff --git a/osaf/services/saf/immsv/immloadd/imm_loader.cc
> b/osaf/services/saf/immsv/immloadd/imm_loader.cc
> --- a/osaf/services/saf/immsv/immloadd/imm_loader.cc
> +++ b/osaf/services/saf/immsv/immloadd/imm_loader.cc
> @@ -335,7 +335,7 @@ void opensafClassCreate(SaImmHandleT imm
> d7.attrFlags = SA_IMM_ATTR_CONFIG | SA_IMM_ATTR_WRITABLE;
> d7.attrDefaultValue = &access_control_mode_default;
>
> - d8.attrName = (char *) OPENSAF_IMM_ADMIN_GROUP_NAME;
> + d8.attrName = (char *) OPENSAF_IMM_AUTHORIZED_GROUP;
> d8.attrValueType = SA_IMM_ATTR_SASTRINGT;
> d8.attrFlags = SA_IMM_ATTR_CONFIG | SA_IMM_ATTR_WRITABLE;
> d8.attrDefaultValue = NULL;
> diff --git a/osaf/services/saf/immsv/immnd/ImmModel.cc
> b/osaf/services/saf/immsv/immnd/ImmModel.cc
> --- a/osaf/services/saf/immsv/immnd/ImmModel.cc
> +++ b/osaf/services/saf/immsv/immnd/ImmModel.cc
> @@ -443,7 +443,7 @@ static const std::string immSyncBatchSiz
> static const std::string immPbeBSlaveName(OPENSAF_IMM_2PBE_APPL_NAME);
> static const std::string immLongDnsAllowed(OPENSAF_IMM_LONG_DNS_ALLOWED);
> static const std::string
> immAccessControlMode(OPENSAF_IMM_ACCESS_CONTROL_MODE);
> -static const std::string immAdminGroupName(OPENSAF_IMM_ADMIN_GROUP_NAME);
> +static const std::string immAuthorizedGroup(OPENSAF_IMM_AUTHORIZED_GROUP);
>
> static const std::string immMngtClass("SaImmMngt");
> static const std::string
> immManagementDn("safRdn=immManagement,safApp=safImmService");
> @@ -907,9 +907,9 @@ immModel_accessControlMode(IMMND_CB *cb)
> }
>
> const char*
> -immModel_adminGroupName(IMMND_CB *cb)
> -{
> - return ImmModel::instance(&cb->immModel)->adminGroupName();
> +immModel_authorizedGroup(IMMND_CB *cb)
> +{
> + return ImmModel::instance(&cb->immModel)->authorizedGroup();
> }
>
> SaBoolT
> @@ -3484,7 +3484,7 @@ ImmModel::accessControlMode()
> }
>
> const char*
> -ImmModel::adminGroupName()
> +ImmModel::authorizedGroup()
> {
> TRACE_ENTER();
> ObjectMap::iterator oi = sObjectMap.find(immObjectDn);
> @@ -3495,7 +3495,7 @@ ImmModel::adminGroupName()
>
> ObjectInfo* immObject = oi->second;
> ImmAttrValueMap::iterator avi =
> - immObject->mAttrValueMap.find(immAdminGroupName);
> + immObject->mAttrValueMap.find(immAuthorizedGroup);
> if (avi == immObject->mAttrValueMap.end())
> return NULL;
> osafassert(!(avi->second->isMultiValued()));
> diff --git a/osaf/services/saf/immsv/immnd/ImmModel.hh
> b/osaf/services/saf/immsv/immnd/ImmModel.hh
> --- a/osaf/services/saf/immsv/immnd/ImmModel.hh
> +++ b/osaf/services/saf/immsv/immnd/ImmModel.hh
> @@ -103,7 +103,7 @@ public:
>
> bool nocaseCompare(const std::string& s1,
> const std::string& s2) const;
> - const char* adminGroupName();
> + const char* authorizedGroup();
> OsafImmAccessControlModeT accessControlMode();
> bool schemaChangeAllowed();
> bool protocol41Allowed();
> diff --git a/osaf/services/saf/immsv/immnd/immnd_evt.c
> b/osaf/services/saf/immsv/immnd/immnd_evt.c
> --- a/osaf/services/saf/immsv/immnd/immnd_evt.c
> +++ b/osaf/services/saf/immsv/immnd/immnd_evt.c
> @@ -753,9 +753,9 @@ static uint32_t immnd_evt_proc_imm_init(
> } else if (getgid() == sinfo->gid) {
> TRACE("same group");
> } else {
> - const char *admin_group_name =
> immModel_adminGroupName(immnd_cb);
> - if ((admin_group_name != NULL) &&
> - (osaf_user_is_member_of_group(sinfo->uid,
> admin_group_name) == true)) {
> + const char *authorized_group =
> immModel_authorizedGroup(immnd_cb);
> + if ((authorized_group != NULL) &&
> + (osaf_user_is_member_of_group(sinfo->uid,
> authorized_group) == true)) {
> TRACE("configured group");
> } else {
> if (mode == ACCESS_CONTROL_PERMISSIVE) {
> @@ -764,7 +764,7 @@ static uint32_t immnd_evt_proc_imm_init(
> syslog(LOG_AUTH, "access
> violation by %s(uid=%d)",
> pwd->pw_name,
> sinfo->uid);
> TRACE_2("access violation, uid:%d,
> pid:%d, group_name:%s",
> - sinfo->uid, sinfo->pid,
> admin_group_name);
> + sinfo->uid, sinfo->pid,
> authorized_group);
> } else {
> // mode ENFORCING
> struct passwd *pwd =
> getpwuid(sinfo->uid);
> @@ -772,7 +772,7 @@ static uint32_t immnd_evt_proc_imm_init(
> syslog(LOG_AUTH, "access denied
> for %s(uid=%d)",
> pwd->pw_name,
> sinfo->uid);
> TRACE_2("access denied, uid:%d, pid:%d,
> group_name:%s",
> - sinfo->uid, sinfo->pid,
> admin_group_name);
> + sinfo->uid, sinfo->pid,
> authorized_group);
> error = SA_AIS_ERR_ACCESS_DENIED;
> goto agent_rsp;
> }
> diff --git a/osaf/services/saf/immsv/immnd/immnd_init.h
> b/osaf/services/saf/immsv/immnd/immnd_init.h
> --- a/osaf/services/saf/immsv/immnd/immnd_init.h
> +++ b/osaf/services/saf/immsv/immnd/immnd_init.h
> @@ -298,7 +298,7 @@ extern "C" {
> SaBoolT immModel_protocol45Allowed(IMMND_CB *cb);
> SaBoolT immModel_oneSafe2PBEAllowed(IMMND_CB *cb);
> OsafImmAccessControlModeT immModel_accessControlMode(IMMND_CB *cb);
> - const char *immModel_adminGroupName(IMMND_CB *cb);
> + const char *immModel_authorizedGroup(IMMND_CB *cb);
>
> SaBoolT immModel_purgeSyncRequest(IMMND_CB *cb, SaUint32T clientId);
>
> diff --git a/samples/immsv/OpensafImm_Upgrade_4.5.xml
> b/samples/immsv/OpensafImm_Upgrade_4.5.xml
> --- a/samples/immsv/OpensafImm_Upgrade_4.5.xml
> +++ b/samples/immsv/OpensafImm_Upgrade_4.5.xml
> @@ -16,7 +16,7 @@
> <default-value>0</default-value>
> </attr>
> <attr>
> - <name>adminGroupName</name>
> + <name>authorizedGroup</name>
> <type>SA_STRING_T</type>
> <category>SA_CONFIG</category>
> <flag>SA_WRITABLE</flag>
>
------------------------------------------------------------------------------
Slashdot TV.
Video for Nerds. Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Opensaf-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/opensaf-devel