| /openbmc/qemu/tests/ |
| H A D | dbus-vmstate-daemon.sh | 39 <allow send_type="signal"/> 40 <allow send_requested_reply="true" send_type="method_return"/> 41 <allow send_requested_reply="true" send_type="error"/> 44 <allow receive_type="method_call"/> 45 <allow receive_type="method_return"/> 46 <allow receive_type="error"/> 47 <allow receive_type="signal"/> 49 <!-- Allow anyone to talk to the message bus --> 50 <allow send_destination="org.freedesktop.DBus" 52 <allow send_destination="org.freedesktop.DBus" [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/klibc/files/ |
| H A D | klcc-cross-accept-clang-options.patch | 13 + # Allow clang options 16 + # Allow clang options 19 + # Allow clang options 22 + # Allow clang options 25 + # Allow clang options 28 + # Allow clang options 31 + # Allow clang options 34 + # Allow clang options
|
| /openbmc/qemu/rust/ |
| H A D | Cargo.toml | 26 # and ensures that we do not have misspelled allow() attributes. 27 unknown_lints = "allow" 33 private_intra_doc_links = "allow" 44 result_unit_err = "allow" 47 unused_self = "allow" 49 upper_case_acronyms = "allow" 51 # default-allow lints
|
| /openbmc/btbridge/ |
| H A D | org.openbmc.HostIpmi.conf | 14 <allow own="org.openbmc.HostIpmi"/> 15 <allow send_destination="org.openbmc.HostIpmi"/> 16 <allow receive_sender="org.openbmc.HostIpmi"/> 20 <allow send_destination="org.openbmc.HostIpmi"/> 21 <allow receive_sender="org.openbmc.HostIpmi"/>
|
| /openbmc/qemu/tests/qapi-schema/ |
| H A D | allow-preconfig-test.err | 1 allow-preconfig-test.json: In command 'allow-preconfig-test': 2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
|
| H A D | allow-preconfig-test.json | 1 # Check against allow-preconfig illegal value 2 { 'command': 'allow-preconfig-test', 'allow-preconfig': 'some-string' }
|
| H A D | oob-coroutine.json | 1 # Check that incompatible flags allow-oob and coroutine are rejected 2 { 'command': 'oob-command-1', 'allow-oob': true, 'coroutine': true }
|
| /openbmc/openbmc/poky/meta/recipes-support/user-creation/files/ |
| H A D | system-xuser.conf | 5 <allow send_destination="net.connman"/> 6 <allow send_destination="net.connman.vpn"/> 7 <allow send_destination="org.ofono"/> 8 <allow send_destination="org.bluez"/>
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
| H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 53 - "Access-Control-Allow-Credentials": "true", 54 - "Access-Control-Allow-Origin": "*", 61 + "Access-Control-Allow-Credentials": [ 64 + "Access-Control-Allow-Origin": [ 123 - "Access-Control-Allow-Credentials": "true", 124 - "Access-Control-Allow-Origin": "*", 131 + "Access-Control-Allow-Credentials": [ 134 + "Access-Control-Allow-Origin": [ 193 - "Access-Control-Allow-Credentials": "true", 194 - "Access-Control-Allow-Origin": "*", [all …]
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-authz-listfile.c | 67 "default-allow.cfg", in test_authz_default_allow() 68 "{ \"policy\": \"allow\" }"); in test_authz_default_allow() 90 " \"policy\": \"allow\" }"); in test_authz_explicit_deny() 108 "explicit-allow.cfg", in test_authz_explicit_allow() 111 " \"policy\": \"allow\"," in test_authz_explicit_allow() 135 " \"policy\": \"allow\"," in test_authz_complex() 138 " \"policy\": \"allow\"," in test_authz_complex() 144 " \"policy\": \"allow\"," in test_authz_complex() 185 g_test_add_func("/auth/list/default/allow", test_authz_default_allow); in main() 187 g_test_add_func("/auth/list/explicit/allow", test_authz_explicit_allow); in main()
|
| /openbmc/qemu/tests/qemu-iotests/tests/ |
| H A D | fuse-allow-other.out | 1 QA output created by fuse-allow-other 6 --- allow-other=off --- 15 'allow-other': 'off' 35 --- allow-other=on --- 44 'allow-other': 'on' 62 --- allow-other=auto --- 71 'allow-other': 'auto'
|
| H A D | fuse-allow-other | 4 # Test FUSE exports' allow-other option 91 # $1: allow-other value ('on'/'off'/'auto') 104 'allow-other': '$1'" 116 # Should only work with allow-other: Otherwise, no permissions can be 126 # This is already prevented by the permissions (without allow-other, FUSE 131 # to stat the export as nobody; it should not work without allow-other, 160 echo "--- allow-other=$ao ---"
|
| /openbmc/phosphor-logging/dist/busconfig/ |
| H A D | phosphor-logging.conf | 5 <allow own_prefix="xyz.openbmc_project.Logging"/> 6 <allow send_destination="xyz.openbmc_project.Logging"/> 10 <allow send_destination="xyz.openbmc_project.Logging"/>
|
| /openbmc/openbmc/poky/meta/recipes-core/systemd/systemd/ |
| H A D | org.freedesktop.hostname1_no_polkit.conf | 7 <allow own="org.freedesktop.hostname1"/> 8 <allow send_destination="org.freedesktop.hostname1"/> 9 <allow receive_sender="org.freedesktop.hostname1"/>
|
| /openbmc/openbmc-build-scripts/config/gitlint/ |
| H A D | block_comment.py | 25 # allow a quoted string to be over the line limit 41 # allow footnote url links to be as long as needed example 47 # allow signed-off-by 51 # allow Fixes
|
| /openbmc/openbmc/poky/meta/recipes-devtools/distcc/files/ |
| H A D | distcc | 42 ALLOW="" 45 ALLOW="$ALLOW --allow $net" 64 --exec $DAEMON -- $DAEMON_ARGS $ALLOW || 96 --exec $DAEMON -- $DAEMON_ARGS $ALLOW ||
|
| /openbmc/openbmc/meta-google/recipes-phosphor/flash/google-key/ |
| H A D | verify-bmc-image.sh | 17 echo "$ARG0 [--allow-dev] <image file> <sig file>" >&2 21 opts="$(getopt -o 'd' -l 'allow-dev' -- "$@")" || exit 26 --allow-dev|-d) 54 command gpg --batch --allow-non-selfsigned-uid --no-tty "$@"
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/ |
| H A D | CVE-2024-6221.patch | 23 …headers in this list will be included in the :http:header:`Access-Control-Allow-Headers` response … 26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network` 30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network` 36 + :http:header:`Access-Control-Allow-Private-Network` will not be set. 92 + If True, the response header `Access-Control-Allow-Private-Network` 96 + If False, the reponse header `Access-Control-Allow-Private-Network` 102 + `Access-Control-Allow-Private-Network` will not be set.
|
| /openbmc/qemu/rust/bits/src/ |
| H A D | lib.rs | 106 $( #[allow(dead_code)] $(#[$const_meta])* 112 #[allow(dead_code)] 118 #[allow(dead_code)] 124 #[allow(dead_code)] 130 #[allow(dead_code)] 136 #[allow(dead_code)] 142 #[allow(dead_code)] 148 #[allow(dead_code)] 154 #[allow(dead_code)] 160 #[allow(dead_code)] [all …]
|
| /openbmc/bmcweb/redfish-core/include/generated/enums/ |
| H A D | allow_deny.hpp | 18 Allow, enumerator 36 {AllowType::Allow, "Allow"},
|
| /openbmc/u-boot/cmd/mvebu/ |
| H A D | Kconfig | 21 Allow usage of NAND flash as a target for "bubt" command 30 Allow usage of SPI flash as a target for "bubt" command 39 Allow usage of eMMC/SD device as a target for "bubt" command
|
| /openbmc/qemu/docs/system/ |
| H A D | authz.rst | 112 { "match": "fred", "policy": "allow", "format": "exact" }, 113 { "match": "bob", "policy": "allow", "format": "exact" }, 115 { "match": "dan*", "policy": "allow", "format": "glob" } 158 { "match": "fred", "policy": "allow", "format": "exact" }, 159 { "match": "bob", "policy": "allow", "format": "exact" }, 161 { "match": "dan*", "policy": "allow", "format": "glob" } 179 mechanisms that are implemented outside of QEMU. In order to allow maximum 205 account requisite pam_listfile.so item=user sense=allow \ 206 file=/etc/qemu/vnc.allow
|
| /openbmc/openbmc/poky/bitbake/ |
| H A D | ChangeLog | 6 - Allow operations other than assignment on flag variables 37 - Allow the -b -e option combination to take regular expressions 62 - Add MULTI_PROVIDER_WHITELIST variable to allow known safe multiple providers to be listed 75 - Allow multiple options for deptask flag 83 - Disable task number acceleration since it can allow the tasks to run 113 - Make fetcher timestamp updating non-fatal when permissions don't allow 145 - Allow to checkout CVS by Date and Time. Just add HHmm to the SRCDATE. 168 - Export more variables to the fetcher commands to allow ssh checkouts and checkouts through 170 - Also allow user and pswd options in SRC_URIs globally (from Poky) 194 - Allow debug domains to be specified on the commandline (-l) [all …]
|
| /openbmc/qemu/qapi/ |
| H A D | block-export.json | 27 # @max-connections: The maximum number of connections to allow at the 79 'allow-preconfig': true } 173 # @allow-other: If this is off, only QEMU's user is allowed access to 175 # Enabling this option will allow other users access to the export 188 '*allow-other': 'FuseExportAllowOther' }, 260 'allow-preconfig': true } 310 'allow-preconfig': true } 321 'allow-preconfig': true } 376 # @allow-inactive: If true, the export allows the exported node to be inactive. 393 '*allow-inactive': 'bool' }, [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/bb/fetch2/ |
| H A D | README | 10 iii) allow work to continue even with downtime upstream 11 iv) allow for changes upstream in incompatible ways 12 v) allow rebuilding of the software in X years time 41 allow our automated upgrage code to function (it is implied this does always
|