/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Role_v1.xml | 4 <!--# Redfish Schema: Role v1.3.3 --> 32 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role"> 36 <EntityType Name="Role" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 37 …<Annotation Term="OData.Description" String="The `Role` schema contains a Redfish role to use in c… 38 …"OData.LongDescription" String="This resource shall represent the Redfish role for the user accoun… 64 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role.v1_0_0"> 68 <EntityType Name="Role" BaseType="Role.Role"> 71 …n" String="An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 72 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… 76 <Annotation Term="OData.Description" String="The Redfish privileges for this role."/> [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | Role_v1.xml | 4 <!--# Redfish Schema: Role v1.3.3 --> 32 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role"> 36 <EntityType Name="Role" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 37 …<Annotation Term="OData.Description" String="The `Role` schema contains a Redfish role to use in c… 38 …"OData.LongDescription" String="This resource shall represent the Redfish role for the user accoun… 64 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role.v1_0_0"> 68 <EntityType Name="Role" BaseType="Role.Role"> 71 …n" String="An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 72 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… 76 <Annotation Term="OData.Description" String="The Redfish privileges for this role."/> [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
H A D | signing.bbclass | 23 # Recipes access the available keys via a specific role. So, depending on 24 # whether we're building during development or for release, a given role can 26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing 27 # the user to select one of multiple keys for a role when needed. 62 def export(role, k, v): 63 k = k % (role, ) 70 for role in roles: 71 if not set(role).issubset("abcdefghijklmnopqrstuvwxyz0123456789_"): 72 bb.fatal("key role name '%s' must consist of only [a-z0-9_]" % (role,)) 74 pkcs11_uri = d.getVarFlag("SIGNING_PKCS11_URI", role) or d.getVar("SIGNING_PKCS11_URI") [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | Role.v1_3_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Role.v1_3_3.json", 3 "$ref": "#/definitions/Role", 56 "Role": { object 58 …"description": "The `Role` schema contains a Redfish role to use in conjunction with a manager acc… 59 … "longDescription": "This resource shall represent the Redfish role for the user account.", 94 "description": "An equivalent role to use when this role is restricted.", 101 "description": "The Redfish privileges for this role.", 105 …escription": "This property shall contain the Redfish privileges for this role. For predefined ro… 125 …ription": "An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 126 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | Role.v1_3_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Role.v1_3_3.json", 3 "$ref": "#/definitions/Role", 56 "Role": { object 58 …"description": "The `Role` schema contains a Redfish role to use in conjunction with a manager acc… 59 … "longDescription": "This resource shall represent the Redfish role for the user account.", 94 "description": "An equivalent role to use when this role is restricted.", 101 "description": "The Redfish privileges for this role.", 105 …escription": "This property shall contain the Redfish privileges for this role. For predefined ro… 125 …ription": "An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 126 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… [all …]
|
H A D | HostInterface.v1_3_3.json | 90 … "description": "The role used for the bootstrap account created for this interface.", 91 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is u… 137 "description": "The role when no authentication on this interface is used.", 138 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is u… 191 … "description": "The Redfish role used for firmware authentication on this interface.", 192 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is c… 242 … "description": "The Redfish role used for kernel authentication on this interface.", 243 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is c… 317 "$ref": "http://redfish.dmtf.org/schemas/v1/Role.json#/definitions/Role", 318 …"description": "The link to the Redfish role that contains the privileges on this host interface w… [all …]
|
/openbmc/phosphor-webui/app/common/directives/ |
H A D | ldap-user-roles.html | 1 <!-- Add & Remove Role Groups Buttons --> 11 <span>Add role group</span> 20 <span>Remove role groups</span> 23 <!-- LDAP Role Groups Table --> 25 <!-- LDAP Role Groups Table Header --> 79 <div class="table__cell-ldap-role"> 84 <!-- LDAP Disabled Role Groups Table Row --> 89 No role groups have been created yet. 92 LDAP authentication must be enabled before creating role groups. 98 <!-- Enabled LDAP Role Groups Table Rows --> [all …]
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/librole/ |
H A D | librole-tiny-perl_2.002004.bb | 1 SUMMARY = "Role::Tiny - Roles. Like a nouvelle cousine portion size of Moose." 2 DESCRIPTION = "\"Role::Tiny\" is a minimalist role composition tool." 6 HOMEPAGE = "https://metacpan.org/pod/Role::Tiny" 11 SRC_URI = "${CPAN_MIRROR}/authors/id/H/HA/HAARG/Role-Tiny-${PV}.tar.gz" 14 S = "${WORKDIR}/Role-Tiny-${PV}"
|
/openbmc/bmcweb/redfish-core/lib/ |
H A D | roles.hpp | 45 std::string_view role) in getAssignedPrivFromRole() argument 48 if (role == "Administrator") in getAssignedPrivFromRole() 56 else if (role == "Operator") in getAssignedPrivFromRole() 62 else if (role == "ReadOnly") in getAssignedPrivFromRole() 91 messages::resourceNotFound(asyncResp->res, "Role", roleId); in requestRoutesRoles() 96 asyncResp->res.jsonValue["@odata.type"] = "#Role.v1_2_2.Role"; in requestRoutesRoles() 97 asyncResp->res.jsonValue["Name"] = "User Role"; in requestRoutesRoles() 98 asyncResp->res.jsonValue["Description"] = roleId + " User Role"; in requestRoutesRoles() 146 std::string role = getRoleFromPrivileges(priv); in requestRoutesRoleCollection() local 147 if (!role.empty()) in requestRoutesRoleCollection() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/State/BMC/ |
H A D | Redundancy.interface.yaml | 6 - name: Role 7 type: enum[self.Role] 12 The redundancy role of the BMC. 69 - name: Role 71 Defines the redundancy role of the BMC. 75 The role is unknown. 78 The role is for the active BMC. This is the fully functioning 82 The role is for the passive BMC, which is the opposite of the
|
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
H A D | ModalAddRoleGroup.vue | 2 <b-modal id="modal-role-group" ref="modal" @ok="onOk" @hidden="resetForm"> 14 <b-form id="role-group" @submit.prevent="handleSubmit"> 15 <!-- Edit role group --> 23 <!-- Add new role group --> 27 label-for="role-group-name" 30 id="role-group-name" 35 <b-form-invalid-feedback role="alert"> 58 <b-form-invalid-feedback role="alert"> 70 <b-button form="role-group" type="submit" variant="primary" @click="onOk">
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_local_user.robot | 43 Redfishtool Update User Role "UserT100" "Administrator" 114 Verify Error While Creating User With Invalid Role 115 [Documentation] Verify error while creating a user with invalid role using Redfishtool. 176 # roleId The role of user (e.g. "Administrator", "Operator", etc.). 192 Redfishtool Update User Role 193 [Documentation] Update user role. 199 # newRole The new role of user (e.g. "Administrator", "Operator", etc.). 230 [Documentation] Verify role of the user. 231 [Arguments] ${user_name} ${role} 235 # role The new role of user (e.g. "Administrator", "Operator", etc.). [all …]
|
H A D | Redfish_Service_Validator.robot | 43 #username password role enabled 51 [Arguments] ${username} ${password} ${role} ${enabled} 57 # role The role of the user to be created 63 Redfish Create User ${username} ${password} ${role} ${enabled}
|
/openbmc/qemu/docs/sphinx/ |
H A D | compat.py | 117 # Get the role instance, but don't *execute it* - we lack the 120 role = env.get_domain(domain).roles[rolename] 121 assert isinstance(role, XRefRole) 128 assert not role.lowercase 129 assert not role.fix_parens 138 "refwarn": role.warn_dangling, 140 refnode = role.nodeclass(target, **options) 141 title, target = role.process_link(env, refnode, False, target, target) 144 refnode += role.innernodeclass(target, title, classes=classes) 150 # actual implementation of role.result_nodes in this case [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_ldap.robot | 20 ${xpath_add_role_group_button} //button[@type='button']//*[contains(text(),'Add role group… 21 ${xpath_remove_role_groups_button} //button[@type='button']//*[contains(text(),'Remove role gr… 30 Page Should Contain Role groups 43 # Buttons under role groups section 66 Wait Until Page Contains Configure LDAP settings and manage role groups
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ldap_configuration.robot | 153 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 168 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 192 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 407 [Setup] Update LDAP Configuration with LDAP User Role And Group 410 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 444 [Template] Update LDAP User Role And Host Poweroff 462 [Template] Update LDAP User Role And Host Poweron 480 [Template] Update LDAP User Role And Configure IP Address 496 [Template] Update LDAP User Role And Delete IP Address 512 [Template] Update LDAP User Role And Read Network Configuration [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_ldap_sub_menu.robot | 19 ${xpath_add_role_group_button} //button[contains(text(),'Add role group')] 26 ${xpath_add_group_name} //*[@id="role-group-name"] 50 Page Should Contain Role groups 61 # Buttons under role groups section. 146 [Teardown] Run Keywords Redfish.Login AND Delete LDAP Role Group ${GROUP_NAME} 148 Update LDAP Configuration with LDAP User Role And Group ${GROUP_NAME} ${GROUP_PRIVILEGE} 165 [Template] Update LDAP User Role And Read Network Configuration Via GUI 285 Update LDAP Configuration With LDAP User Role And Group 286 [Documentation] Update LDAP configuration update with LDAP user role and group. 305 Delete LDAP Role Group [all …]
|
/openbmc/phosphor-webui/app/access-control/directives/ |
H A D | role-table.html | 1 <div class="role-table"> 6 <span ng-if="roleTableCtrl.isCollapsed">View privilege role descriptions</span> 7 <span ng-if="!roleTableCtrl.isCollapsed">Hide privilege role descriptions</span>
|
H A D | role-table.js | 5 * Role table 6 * Table of privilege role descriptions 13 template: require('./role-table.html'), 28 // TODO: When API changed from D-Bus to Redfish, 'Operator' role
|
/openbmc/ipmitool/src/plugins/lanplus/ |
H A D | lanplus_strings.c | 15 { IPMI_RAKP_STATUS_INVALID_ROLE, "invalid role" }, 16 { IPMI_RAKP_STATUS_UNAUTHORIZED_ROLE_REQUESTED, "unauthorized role requested" }, 17 { IPMI_RAKP_STATUS_INSUFFICIENT_RESOURCES_FOR_ROLE, "insufficient resources for role" },
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | ldap-controller.html | 7 <p>Configure LDAP settings and manage role groups.</p> 22 LDAP authentication must be enabled to modify role groups. 84 … ng-class="{'visible' : ldap__configuration.ldap__uri.$touched || submitted}" role="alert"> 94 … ng-class="{'visible' : ldap__configuration.ldap__bind__dn.$touched || submitted}" role="alert"> 109 … ng-class="{'visible' : ldap__configuration.ldap__bind_pw.$touched || submitted}" role="alert"> 119 … ng-class="{'visible' : ldap__configuration.ldap__base__dn.$touched || submitted}" role="alert"> 147 Role groups 151 …<ldap-user-roles role-groups="roleGroups" role-group-type="roleGroupType" enabled="ldapProperties.…
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | serial_interface.hpp | 82 enum class Role{ enum 160 NLOHMANN_JSON_SERIALIZE_ENUM(Role, { 161 {Role::Invalid, "Invalid"}, 162 {Role::Client, "Client"}, 163 {Role::Server, "Server"},
|
/openbmc/u-boot/drivers/usb/musb-new/ |
H A D | Kconfig | 11 Enables the MUSB USB dual-role controller in host mode. 19 Enables the MUSB USB dual-role controller in gadget mode. 26 Say y here to enable support for the dual role high
|
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/static/js/ |
H A D | newcustomimage_modal.js | 96 newCustomImgBtn.find('[data-role="loading-state"]').hide(); 97 newCustomImgBtn.find('[data-role="submit-state"]').show(); 107 newCustomImgBtn.find('[data-role="submit-state"]').hide(); 108 newCustomImgBtn.find('[data-role="loading-state"]').show(); 159 var imageSelector = $('#new-custom-image-modal [data-role="image-selector"]'); 160 var imageSelectRadiosContainer = $('#new-custom-image-modal [data-role="image-selector-radios"]'); 163 imageSelector.remove('[data-role="image-radio"]'); 180 '<div class="radio"><label data-role="image-radio">' +
|
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/templates/ |
H A D | newcustomimage_modal.html | 29 <div data-role="image-selector" style="display:none;"> 32 <div data-role="image-selector-radios"></div> 52 <span data-role="submit-state">Create custom image</span> 53 <span data-role="loading-state" style="display:none">
|