/openbmc/linux/drivers/usb/gadget/ |
H A D | u_f.h | 20 #define vla_group(groupname) size_t groupname##__next = 0 argument 21 #define vla_group_size(groupname) groupname##__next argument 23 #define vla_item(groupname, type, name, n) \ argument 24 size_t groupname##_##name##__offset = ({ \ 26 if (groupname##__next != SIZE_MAX) { \ 29 offset = (groupname##__next + align_mask) & \ 32 &groupname##__next)) { \ 33 groupname##__next = SIZE_MAX; \ 40 #define vla_item_with_sz(groupname, type, name, n) \ argument 41 size_t groupname##_##name##__sz = array_size(n, sizeof(type)); \ [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-systemready/recipes-test/arm-systemready-linux-distros/files/unattended-boot-conf/openSUSE/ |
H A D | autoinst.xml | 168 <groupname>users</groupname> 173 <groupname>messagebus</groupname> 178 <groupname>bin</groupname> 183 <groupname>input</groupname> 188 <groupname>kmem</groupname> 193 <groupname>utmp</groupname> 198 <groupname>man</groupname> 203 <groupname>polkitd</groupname> 208 <groupname>systemd-timesync</groupname> 213 <groupname>daemon</groupname> [all …]
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | useradd_base.bbclass | 23 local groupname=`echo "$opts" | awk '{ print $NF }'` 24 local group_exists="`grep "^$groupname:" $rootdir/etc/group || true`" 27 group_exists="`grep "^$groupname:" $rootdir/etc/group || true`" 32 bbnote "${PN}: group $groupname already exists, not re-creating it" 57 …local groupname=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-g" || $i == "--group")… 59 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 68 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 76 local groupname=`echo "$opts" | awk '{ print $NF }'` [all …]
|
H A D | useradd-staticids.bbclass | 115 # Determine the possible groupname 116 # Unless the group name (or gid) is specified, we assume that the LOGIN is the groupname 119 # So if the implicit username-group creation is on, then the implicit groupname (LOGIN) 123 uaargs.groupname = uaargs.gid 125 uaargs.groupname = uaargs.LOGIN 127 uaargs.groupname = 'users' 128 uaargs.groupid = field[3] or uaargs.groupname 136 elif uaargs.groupname and not uaargs.groupname.isdigit(): 138 bb.debug(1, "Adding group %s (gid %s)!" % (uaargs.groupname, uaargs.groupid)) 139 newgroup = "-g %s %s" % (uaargs.groupid, uaargs.groupname) [all …]
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
H A D | ModalAddRoleGroup.vue | 18 <dt>{{ $t('pageLdap.modal.groupName') }}</dt> 19 <dd style="word-break: break-all">{{ form.groupName }}</dd> 26 :label="$t('pageLdap.modal.groupName')" 31 v-model="form.groupName" 32 :state="getValidationState(v$.form.groupName)" 33 @input="v$.form.groupName.$touch()" 97 Object.prototype.hasOwnProperty.call(prop, 'groupName') && 112 groupName: null, 125 this.form.groupName = value.groupName; 132 groupName: { [all …]
|
H A D | TableRoleGroups.vue | 136 key: 'groupName', 138 label: i18n.global.t('pageLdap.tableRoleGroups.groupName'), 168 groupName: RemoteGroup, 228 groupName: row.groupName, 254 saveRoleGroup({ addNew, groupName, groupPrivilege }) { 256 const data = { groupName, groupPrivilege };
|
/openbmc/phosphor-led-manager/manager/ |
H A D | config-validator.cpp | 83 const std::string groupName, in validateConfigV1GroupForLedPriority() argument 89 error::MixedLedAndGroupPriority, groupName, in validateConfigV1GroupForLedPriority() 98 groupName, ledAction.name, in validateConfigV1GroupForLedPriority() 112 for (const auto& [groupName, group] : ledMap) in validateConfigV1ForLedPriority() 114 validateConfigV1GroupForLedPriority(groupName, group, priorityMap); in validateConfigV1ForLedPriority() 119 const std::string groupName, in validateConfigV1GroupForGroupPriority() argument 127 error::MixedLedAndGroupPriority, groupName, led.name, in validateConfigV1GroupForGroupPriority() 135 throw ConfigValidationException(error::InvalidGroupPriority, groupName, in validateConfigV1GroupForGroupPriority() 156 for (const auto& [groupName, group] : ledMap) in validateConfigV1ForGroupPriority() 158 validateConfigV1GroupForGroupPriority(groupName, group); in validateConfigV1ForGroupPriority()
|
H A D | config-validator.hpp | 47 const std::string& groupName, in ConfigValidationException() argument 52 "GROUP", groupName, "MSG", msg.c_str()); in ConfigValidationException() 56 const std::string& groupName, in ConfigValidationException() argument 63 "GROUP", groupName, "LED", ledName, "MSG", msg.c_str()); in ConfigValidationException()
|
H A D | json-parser.hpp | 107 const std::string groupName = entry.value("group", ""); in loadJsonConfigV1Group() local 109 tmpPath /= groupName; in loadJsonConfigV1Group() 113 lg2::debug("config for '{GROUP}'", "GROUP", groupName); in loadJsonConfigV1Group()
|
/openbmc/phosphor-user-manager/phosphor-ldap-config/ |
H A D | ldap_mapper_entry.cpp | 17 const std::string& groupName, in LDAPMapperEntry() argument 24 Interfaces::groupName(groupName, true); in LDAPMapperEntry() 40 std::string LDAPMapperEntry::groupName(std::string value) in groupName() function in phosphor::ldap::LDAPMapperEntry 42 if (value == Interfaces::groupName()) in groupName() 48 auto val = Interfaces::groupName(value); in groupName()
|
H A D | ldap_mapper_serialize.cpp | 33 archive(entry.groupName(), entry.privilege()); in save() 48 std::string groupName{}; in load() local 51 archive(groupName, privilege); in load() 54 groupName(groupName, true); in load()
|
H A D | ldap_mapper_entry.hpp | 43 * @param[in] groupName - LDAP group name 48 const char* filePath, const std::string& groupName, 73 std::string groupName(std::string value) override; 87 groupName;
|
H A D | ldap_config.cpp | 743 ObjectPath Config::create(std::string groupName, std::string privilege) in create() argument 745 checkPrivilegeMapper(groupName); in create() 761 groupName, privilege, *this); in create() 783 void Config::checkPrivilegeMapper(const std::string& groupName) in checkPrivilegeMapper() argument 785 if (groupName.empty()) in checkPrivilegeMapper() 794 if (val.second.get()->groupName() == groupName) in checkPrivilegeMapper() 796 lg2::error("Group name '{GROUPNAME}' already exists", "GROUPNAME", in checkPrivilegeMapper() 797 groupName); in checkPrivilegeMapper()
|
H A D | ldap_config.hpp | 203 * @param[in] groupName - Group Name to which the privilege needs to be 210 ObjectPath create(std::string groupName, std::string privilege) override; 225 * @param[in] groupName - LDAP group name 229 void checkPrivilegeMapper(const std::string& groupName);
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 127 void checkAndThrowsForGroupChangeAllowed(const std::string& groupName) in checkAndThrowsForGroupChangeAllowed() argument 132 if (groupName.starts_with(prefix)) in checkAndThrowsForGroupChangeAllowed() 141 groupName); in checkAndThrowsForGroupChangeAllowed() 143 Argument::ARGUMENT_VALUE(groupName.c_str())); in checkAndThrowsForGroupChangeAllowed() 207 const std::string& groupName) in checkAndThrowForDisallowedGroupCreation() argument 209 if (groupName.size() > maxSystemGroupNameLength || in checkAndThrowForDisallowedGroupCreation() 210 !std::regex_match(groupName.c_str(), in checkAndThrowForDisallowedGroupCreation() 213 lg2::error("Invalid group name '{GROUP}'", "GROUP", groupName); in checkAndThrowForDisallowedGroupCreation() 215 Argument::ARGUMENT_VALUE(groupName.c_str())); in checkAndThrowForDisallowedGroupCreation() 217 checkAndThrowsForGroupChangeAllowed(groupName); in checkAndThrowForDisallowedGroupCreation() 414 checkDeleteGroupConstraints(const std::string & groupName) checkDeleteGroupConstraints() argument 425 deleteGroup(std::string groupName) deleteGroup() argument 443 checkCreateGroupConstraints(const std::string & groupName) checkCreateGroupConstraints() argument 460 createGroup(std::string groupName) createGroup() argument 1010 getUsersInGroup(const std::string & groupName) getUsersInGroup() argument 1186 executeGroupCreation(const char * groupName) executeGroupCreation() argument 1191 executeGroupDeletion(const char * groupName) executeGroupDeletion() argument 1257 std::string groupName; getUserInfo() local [all...] |
H A D | user_mgr.hpp | 170 * @param[in] groupName - Group to be updated.. 270 void createGroup(std::string groupName) override; 272 void deleteGroup(std::string groupName) override; 399 virtual void executeGroupCreation(const char* groupName); 401 virtual void executeGroupDeletion(const char* groupName); 417 void throwForInvalidGroups(const std::vector<std::string>& groupName); 422 * @param groupName - group to check 424 void checkCreateGroupConstraints(const std::string& groupName); 427 * @param groupName - group to check 429 void checkDeleteGroupConstraints(const std::string& groupName); [all …]
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | LdapStore.js | 187 { groupName, groupPrivilege }, field in LdapStore.actions.AnonymousClassb567187a0c01 196 RemoteGroup: groupName, 209 groupName, field in AnonymousClassb567187a0e01 217 async saveRoleGroup({ dispatch, getters }, { groupName, groupPrivilege }) { field in LdapStore.actions.AnonymousClassb567187a1001 222 if (group.RemoteGroup === groupName) { 224 RemoteGroup: groupName, 240 i18n.global.t('pageLdap.toast.successSaveRoleGroup', { groupName }), field in AnonymousClassb567187a1101 252 if (find(roleGroups, { groupName: group.RemoteGroup })) { property in LdapStore.actions.deleteRoleGroup.AnonymousClassb567187a1401
|
/openbmc/phosphor-mrw-tools/ |
H A D | gen_led_groups.pl | 168 my $groupName = $groups[$i]; 169 printDebug("$groupName\n"); 184 $hashGroup{$groupName}{$name}{"Action"} = $action; 185 $hashGroup{$groupName}{$name}{"Period"} = $period; 186 $hashGroup{$groupName}{$name}{"DutyOn"} = $dutyCycle; 187 $hashGroup{$groupName}{$name}{"Priority"} = $priority; 213 my $groupName = $device . "Fault"; 214 printDebug("$device :: $groupName\n"); 219 $hashGroup{$groupName}{$led}{"Action"} = "'On'"; 220 $hashGroup{$groupName}{$led}{"Period"} = 0; [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 093 | 333 groupname = "group%d" % i 334 params['group'] = groupname 336 self.verify_name(devname, groupname) 345 groupname = "group%d" % i 346 self.verify_name(devname, groupname) 355 groupname = "group%d" % i 356 self.verify_name(devname, groupname) 365 groupname = "group%d" % i 366 self.verify_name(devname, groupname)
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 79 DbusUserObjProperties properties = {std::make_pair("GroupName", group), in createPrivilegeMapperDbusObject() 1038 std::string groupName(maxSystemGroupNameLength + 1, 'A'); in TEST_F() local 1040 checkAndThrowForDisallowedGroupCreation(groupName), in TEST_F() 1075 std::string groupName = "openbmc_rfr_role"; in TEST_F() local 1076 groupName += std::to_string(i); in TEST_F() 1077 EXPECT_NO_THROW(createGroup(groupName)); in TEST_F() 1084 std::string groupName = "openbmc_rfr_role"; in TEST_F() local 1085 groupName += std::to_string(i); in TEST_F() 1086 EXPECT_NO_THROW(deleteGroup(groupName)); in TEST_F() 1092 std::string groupName in TEST_F() local 1152 std::string groupName = "openbmc_rfr_role1"; TEST_F() local [all...] |
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | PrivilegeMapperEntry.interface.yaml | 5 - name: GroupName 9 LDAP, the GroupName will be the LDAP group the user is part of.
|
H A D | PrivilegeMapper.interface.yaml | 23 - name: GroupName 27 of LDAP, the GroupName will be the LDAP group the user is part
|
H A D | Manager.interface.yaml | 106 - name: GroupName 120 - name: GroupName
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 205 openbmctool.py <connection options> ldap privilege-mapper create --groupName=<groupName> --privileg… 211 openbmctool.py <connection options> ldap privilege-mapper delete --groupName=<groupName>
|
/openbmc/openbmc/poky/scripts/lib/ |
H A D | argparse_oe.py | 61 def add_subparser_group(self, groupname, groupdesc, order=0): argument 62 self._subparser_groups[groupname] = (groupdesc, order)
|