osaf/libs/common/immsv/include/immsv_api.h     |   2 +-
 osaf/services/saf/immsv/immloadd/imm_loader.cc |   2 +-
 osaf/services/saf/immsv/immnd/ImmModel.cc      |  12 ++++++------
 osaf/services/saf/immsv/immnd/ImmModel.hh      |   2 +-
 osaf/services/saf/immsv/immnd/immnd_evt.c      |  10 +++++-----
 osaf/services/saf/immsv/immnd/immnd_init.h     |   2 +-
 samples/immsv/OpensafImm_Upgrade_4.5.xml       |   2 +-
 7 files changed, 16 insertions(+), 16 deletions(-)


Generalize the attribute name since it is about access and not administration
of IMM.

diff --git a/osaf/libs/common/immsv/include/immsv_api.h 
b/osaf/libs/common/immsv/include/immsv_api.h
--- a/osaf/libs/common/immsv/include/immsv_api.h
+++ b/osaf/libs/common/immsv/include/immsv_api.h
@@ -60,7 +60,7 @@ extern "C" {
 
 #define OPENSAF_IMM_LONG_DNS_ALLOWED "longDnsAllowed"
 #define OPENSAF_IMM_ACCESS_CONTROL_MODE "accessControlMode"
-#define OPENSAF_IMM_ADMIN_GROUP_NAME "adminGroupName"
+#define OPENSAF_IMM_AUTHORIZED_GROUP "authorizedGroup"
 
 typedef enum {
        ACCESS_CONTROL_DISABLED = 0,
diff --git a/osaf/services/saf/immsv/immloadd/imm_loader.cc 
b/osaf/services/saf/immsv/immloadd/imm_loader.cc
--- a/osaf/services/saf/immsv/immloadd/imm_loader.cc
+++ b/osaf/services/saf/immsv/immloadd/imm_loader.cc
@@ -335,7 +335,7 @@ void opensafClassCreate(SaImmHandleT imm
     d7.attrFlags = SA_IMM_ATTR_CONFIG | SA_IMM_ATTR_WRITABLE;
     d7.attrDefaultValue = &access_control_mode_default;
 
-    d8.attrName = (char *) OPENSAF_IMM_ADMIN_GROUP_NAME;
+    d8.attrName = (char *) OPENSAF_IMM_AUTHORIZED_GROUP;
     d8.attrValueType = SA_IMM_ATTR_SASTRINGT;
     d8.attrFlags = SA_IMM_ATTR_CONFIG | SA_IMM_ATTR_WRITABLE;
     d8.attrDefaultValue = NULL;
diff --git a/osaf/services/saf/immsv/immnd/ImmModel.cc 
b/osaf/services/saf/immsv/immnd/ImmModel.cc
--- a/osaf/services/saf/immsv/immnd/ImmModel.cc
+++ b/osaf/services/saf/immsv/immnd/ImmModel.cc
@@ -443,7 +443,7 @@ static const std::string immSyncBatchSiz
 static const std::string immPbeBSlaveName(OPENSAF_IMM_2PBE_APPL_NAME);
 static const std::string immLongDnsAllowed(OPENSAF_IMM_LONG_DNS_ALLOWED);
 static const std::string immAccessControlMode(OPENSAF_IMM_ACCESS_CONTROL_MODE);
-static const std::string immAdminGroupName(OPENSAF_IMM_ADMIN_GROUP_NAME);
+static const std::string immAuthorizedGroup(OPENSAF_IMM_AUTHORIZED_GROUP);
 
 static const std::string immMngtClass("SaImmMngt");
 static const std::string 
immManagementDn("safRdn=immManagement,safApp=safImmService");
@@ -907,9 +907,9 @@ immModel_accessControlMode(IMMND_CB *cb)
 }
 
 const char*
-immModel_adminGroupName(IMMND_CB *cb)
-{
-    return ImmModel::instance(&cb->immModel)->adminGroupName();
+immModel_authorizedGroup(IMMND_CB *cb)
+{
+    return ImmModel::instance(&cb->immModel)->authorizedGroup();
 }
 
 SaBoolT
@@ -3484,7 +3484,7 @@ ImmModel::accessControlMode()
 }
 
 const char*
-ImmModel::adminGroupName()
+ImmModel::authorizedGroup()
 {
     TRACE_ENTER();
     ObjectMap::iterator oi = sObjectMap.find(immObjectDn);
@@ -3495,7 +3495,7 @@ ImmModel::adminGroupName()
 
     ObjectInfo* immObject =  oi->second;
     ImmAttrValueMap::iterator avi =
-        immObject->mAttrValueMap.find(immAdminGroupName);
+        immObject->mAttrValueMap.find(immAuthorizedGroup);
     if (avi == immObject->mAttrValueMap.end())
        return NULL;
     osafassert(!(avi->second->isMultiValued()));
diff --git a/osaf/services/saf/immsv/immnd/ImmModel.hh 
b/osaf/services/saf/immsv/immnd/ImmModel.hh
--- a/osaf/services/saf/immsv/immnd/ImmModel.hh
+++ b/osaf/services/saf/immsv/immnd/ImmModel.hh
@@ -103,7 +103,7 @@ public:
 
     bool                nocaseCompare(const std::string& s1, 
                                      const std::string& s2) const;
-    const char*         adminGroupName();
+    const char*         authorizedGroup();
     OsafImmAccessControlModeT accessControlMode();
     bool                schemaChangeAllowed();
     bool                protocol41Allowed();
diff --git a/osaf/services/saf/immsv/immnd/immnd_evt.c 
b/osaf/services/saf/immsv/immnd/immnd_evt.c
--- a/osaf/services/saf/immsv/immnd/immnd_evt.c
+++ b/osaf/services/saf/immsv/immnd/immnd_evt.c
@@ -753,9 +753,9 @@ static uint32_t immnd_evt_proc_imm_init(
                } else if (getgid() == sinfo->gid) {
                        TRACE("same group");
                } else {
-                       const char *admin_group_name = 
immModel_adminGroupName(immnd_cb);
-                       if ((admin_group_name != NULL) &&
-                               (osaf_user_is_member_of_group(sinfo->uid, 
admin_group_name) == true)) {
+                       const char *authorized_group = 
immModel_authorizedGroup(immnd_cb);
+                       if ((authorized_group != NULL) &&
+                               (osaf_user_is_member_of_group(sinfo->uid, 
authorized_group) == true)) {
                                TRACE("configured group");
                        } else {
                                if (mode == ACCESS_CONTROL_PERMISSIVE) {
@@ -764,7 +764,7 @@ static uint32_t immnd_evt_proc_imm_init(
                                                syslog(LOG_AUTH, "access 
violation by %s(uid=%d)",
                                                                pwd->pw_name, 
sinfo->uid);
                                        TRACE_2("access violation, uid:%d, 
pid:%d, group_name:%s",
-                                                       sinfo->uid, sinfo->pid, 
admin_group_name);
+                                                       sinfo->uid, sinfo->pid, 
authorized_group);
                                } else {
                                        // mode ENFORCING
                                        struct passwd *pwd = 
getpwuid(sinfo->uid);
@@ -772,7 +772,7 @@ static uint32_t immnd_evt_proc_imm_init(
                                                syslog(LOG_AUTH, "access denied 
for %s(uid=%d)",
                                                                pwd->pw_name, 
sinfo->uid);
                                        TRACE_2("access denied, uid:%d, pid:%d, 
group_name:%s",
-                                                       sinfo->uid, sinfo->pid, 
admin_group_name);
+                                                       sinfo->uid, sinfo->pid, 
authorized_group);
                                        error = SA_AIS_ERR_ACCESS_DENIED;
                                        goto agent_rsp;
                                }
diff --git a/osaf/services/saf/immsv/immnd/immnd_init.h 
b/osaf/services/saf/immsv/immnd/immnd_init.h
--- a/osaf/services/saf/immsv/immnd/immnd_init.h
+++ b/osaf/services/saf/immsv/immnd/immnd_init.h
@@ -298,7 +298,7 @@ extern "C" {
        SaBoolT immModel_protocol45Allowed(IMMND_CB *cb);
        SaBoolT immModel_oneSafe2PBEAllowed(IMMND_CB *cb);
        OsafImmAccessControlModeT immModel_accessControlMode(IMMND_CB *cb);
-       const char *immModel_adminGroupName(IMMND_CB *cb);
+       const char *immModel_authorizedGroup(IMMND_CB *cb);
 
        SaBoolT immModel_purgeSyncRequest(IMMND_CB *cb, SaUint32T clientId);
 
diff --git a/samples/immsv/OpensafImm_Upgrade_4.5.xml 
b/samples/immsv/OpensafImm_Upgrade_4.5.xml
--- a/samples/immsv/OpensafImm_Upgrade_4.5.xml
+++ b/samples/immsv/OpensafImm_Upgrade_4.5.xml
@@ -16,7 +16,7 @@
       <default-value>0</default-value>
     </attr>
     <attr>
-      <name>adminGroupName</name>
+      <name>authorizedGroup</name>
       <type>SA_STRING_T</type>
       <category>SA_CONFIG</category>
       <flag>SA_WRITABLE</flag>

------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Opensaf-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/opensaf-devel

Reply via email to