| /openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
| H A D | Role_v1.xml | 4 <!--# Redfish Schema: Role v1.3.3 --> 32 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role"> 36 <EntityType Name="Role" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 37 …<Annotation Term="OData.Description" String="The `Role` schema contains a Redfish role to use in c… 38 …"OData.LongDescription" String="This resource shall represent the Redfish role for the user accoun… 64 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role.v1_0_0"> 68 <EntityType Name="Role" BaseType="Role.Role"> 71 …n" String="An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 72 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… 76 <Annotation Term="OData.Description" String="The Redfish privileges for this role."/> [all …]
|
| /openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
| H A D | Role_v1.xml | 4 <!--# Redfish Schema: Role v1.3.3 --> 32 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role"> 36 <EntityType Name="Role" BaseType="Resource.v1_0_0.Resource" Abstract="true"> 37 …<Annotation Term="OData.Description" String="The `Role` schema contains a Redfish role to use in c… 38 …"OData.LongDescription" String="This resource shall represent the Redfish role for the user accoun… 64 <Schema xmlns="http://docs.oasis-open.org/odata/ns/edm" Namespace="Role.v1_0_0"> 68 <EntityType Name="Role" BaseType="Role.Role"> 71 …n" String="An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 72 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… 76 <Annotation Term="OData.Description" String="The Redfish privileges for this role."/> [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
| H A D | signing.bbclass | 23 # Recipes access the available keys via a specific role. So, depending on 24 # whether we're building during development or for release, a given role can 26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing 27 # the user to select one of multiple keys for a role when needed. 62 def export(role, k, v): 63 k = k % (role, ) 70 for role in roles: 71 if not set(role).issubset("abcdefghijklmnopqrstuvwxyz0123456789_"): 72 bb.fatal("key role name '%s' must consist of only [a-z0-9_]" % (role,)) 74 pkcs11_uri = d.getVarFlag("SIGNING_PKCS11_URI", role) or d.getVar("SIGNING_PKCS11_URI") [all …]
|
| /openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
| H A D | Role.v1_3_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Role.v1_3_3.json", 3 "$ref": "#/definitions/Role", 56 "Role": { object 58 …"description": "The `Role` schema contains a Redfish role to use in conjunction with a manager acc… 59 … "longDescription": "This resource shall represent the Redfish role for the user account.", 94 "description": "An equivalent role to use when this role is restricted.", 101 "description": "The Redfish privileges for this role.", 105 …escription": "This property shall contain the Redfish privileges for this role. For predefined ro… 125 …ription": "An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 126 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… [all …]
|
| /openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
| H A D | Role.v1_3_3.json | 2 "$id": "http://redfish.dmtf.org/schemas/v1/Role.v1_3_3.json", 3 "$ref": "#/definitions/Role", 56 "Role": { object 58 …"description": "The `Role` schema contains a Redfish role to use in conjunction with a manager acc… 59 … "longDescription": "This resource shall represent the Redfish role for the user account.", 94 "description": "An equivalent role to use when this role is restricted.", 101 "description": "The Redfish privileges for this role.", 105 …escription": "This property shall contain the Redfish privileges for this role. For predefined ro… 125 …ription": "An indication of whether the role is predefined by Redfish or an OEM rather than a clie… 126 …property shall indicate whether the role is predefined by Redfish or an OEM as contrasted with a c… [all …]
|
| H A D | HostInterface.v1_3_3.json | 90 … "description": "The role used for the bootstrap account created for this interface.", 91 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is u… 137 "description": "The role when no authentication on this interface is used.", 138 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is u… 191 … "description": "The Redfish role used for firmware authentication on this interface.", 192 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is c… 242 … "description": "The Redfish role used for kernel authentication on this interface.", 243 …"longDescription": "This property shall contain the `Id` property of the `Role` resource that is c… 317 "$ref": "http://redfish.dmtf.org/schemas/v1/Role.json#/definitions/Role", 318 …"description": "The link to the Redfish role that contains the privileges on this host interface w… [all …]
|
| /openbmc/phosphor-webui/app/common/directives/ |
| H A D | ldap-user-roles.html | 1 <!-- Add & Remove Role Groups Buttons --> 11 <span>Add role group</span> 20 <span>Remove role groups</span> 23 <!-- LDAP Role Groups Table --> 25 <!-- LDAP Role Groups Table Header --> 79 <div class="table__cell-ldap-role"> 84 <!-- LDAP Disabled Role Groups Table Row --> 89 No role groups have been created yet. 92 LDAP authentication must be enabled before creating role groups. 98 <!-- Enabled LDAP Role Groups Table Rows --> [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/librole/ |
| H A D | librole-tiny-perl_2.002004.bb | 1 SUMMARY = "Role::Tiny - Roles. Like a nouvelle cousine portion size of Moose." 2 DESCRIPTION = "\"Role::Tiny\" is a minimalist role composition tool." 6 HOMEPAGE = "https://metacpan.org/pod/Role::Tiny" 11 SRC_URI = "${CPAN_MIRROR}/authors/id/H/HA/HAARG/Role-Tiny-${PV}.tar.gz" 14 S = "${WORKDIR}/Role-Tiny-${PV}"
|
| /openbmc/bmcweb/redfish-core/lib/ |
| H A D | roles.hpp | 45 std::string_view role) in getAssignedPrivFromRole() argument 48 if (role == "Administrator") in getAssignedPrivFromRole() 56 else if (role == "Operator") in getAssignedPrivFromRole() 62 else if (role == "ReadOnly") in getAssignedPrivFromRole() 91 messages::resourceNotFound(asyncResp->res, "Role", roleId); in requestRoutesRoles() 96 asyncResp->res.jsonValue["@odata.type"] = "#Role.v1_2_2.Role"; in requestRoutesRoles() 97 asyncResp->res.jsonValue["Name"] = "User Role"; in requestRoutesRoles() 98 asyncResp->res.jsonValue["Description"] = roleId + " User Role"; in requestRoutesRoles() 146 std::string role = getRoleFromPrivileges(priv); in requestRoutesRoleCollection() local 147 if (!role.empty()) in requestRoutesRoleCollection() [all …]
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/State/BMC/ |
| H A D | Redundancy.interface.yaml | 5 - name: Role 6 type: enum[self.Role] 11 The redundancy role of the BMC. 79 - name: Role 81 Defines the redundancy role of the BMC. 85 The role is unknown. 88 The role is for the active BMC. This is the fully functioning 92 The role is for the passive BMC, which is the opposite of the
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
| H A D | ModalAddRoleGroup.vue | 3 id="modal-role-group" 12 <b-form id="role-group" @submit.prevent="handleSubmit"> 13 <!-- Edit role group --> 21 <!-- Add new role group --> 25 label-for="role-group-name" 28 id="role-group-name" 33 <b-form-invalid-feedback role="alert"> 56 <b-form-invalid-feedback role="alert"> 68 <b-button form="role-group" type="submit" variant="primary" @click="onOk">
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 43 Redfishtool Update User Role "UserT100" "Administrator" 114 Verify Error While Creating User With Invalid Role 115 [Documentation] Verify error while creating a user with invalid role using Redfishtool. 176 # roleId The role of user (e.g. "Administrator", "Operator", etc.). 192 Redfishtool Update User Role 193 [Documentation] Update user role. 199 # newRole The new role of user (e.g. "Administrator", "Operator", etc.). 230 [Documentation] Verify role of the user. 231 [Arguments] ${user_name} ${role} 235 # role The new role of user (e.g. "Administrator", "Operator", etc.). [all …]
|
| H A D | Redfish_Service_Validator.robot | 43 #username password role enabled 51 [Arguments] ${username} ${password} ${role} ${enabled} 57 # role The role of the user to be created 63 Redfish Create User ${username} ${password} ${role} ${enabled}
|
| /openbmc/qemu/docs/sphinx/ |
| H A D | compat.py | 117 # Get the role instance, but don't *execute it* - we lack the 120 role = env.get_domain(domain).roles[rolename] 121 assert isinstance(role, XRefRole) 128 assert not role.lowercase 129 assert not role.fix_parens 138 "refwarn": role.warn_dangling, 140 refnode = role.nodeclass(target, **options) 141 title, target = role.process_link(env, refnode, False, target, target) 144 refnode += role.innernodeclass(target, title, classes=classes) 150 # actual implementation of role.result_nodes in this case [all …]
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_ldap_configuration.robot | 153 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 168 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 192 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 407 [Setup] Update LDAP Configuration with LDAP User Role And Group 410 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 444 [Template] Update LDAP User Role And Host Poweroff 462 [Template] Update LDAP User Role And Host Poweron 480 [Template] Update LDAP User Role And Configure IP Address 496 [Template] Update LDAP User Role And Delete IP Address 512 [Template] Update LDAP User Role And Read Network Configuration [all …]
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_ldap_sub_menu.robot | 19 ${xpath_add_role_group_button} //button[contains(text(),'Add role group')] 26 ${xpath_add_group_name} //*[@id="role-group-name"] 50 Page Should Contain Role groups 61 # Buttons under role groups section. 147 [Teardown] Run Keywords Redfish.Login AND Delete LDAP Role Group ${GROUP_NAME} 149 Update LDAP Configuration with LDAP User Role And Group ${GROUP_NAME} ${GROUP_PRIVILEGE} 166 [Template] Update LDAP User Role And Read Network Configuration Via GUI 285 Update LDAP Configuration With LDAP User Role And Group 286 [Documentation] Update LDAP configuration update with LDAP user role and group. 305 Delete LDAP Role Group [all …]
|
| /openbmc/phosphor-webui/app/access-control/directives/ |
| H A D | role-table.html | 1 <div class="role-table"> 6 <span ng-if="roleTableCtrl.isCollapsed">View privilege role descriptions</span> 7 <span ng-if="!roleTableCtrl.isCollapsed">Hide privilege role descriptions</span>
|
| H A D | role-table.js | 5 * Role table 6 * Table of privilege role descriptions 13 template: require('./role-table.html'), 28 // TODO: When API changed from D-Bus to Redfish, 'Operator' role
|
| /openbmc/ipmitool/src/plugins/lanplus/ |
| H A D | lanplus_strings.c | 15 { IPMI_RAKP_STATUS_INVALID_ROLE, "invalid role" }, 16 { IPMI_RAKP_STATUS_UNAUTHORIZED_ROLE_REQUESTED, "unauthorized role requested" }, 17 { IPMI_RAKP_STATUS_INSUFFICIENT_RESOURCES_FOR_ROLE, "insufficient resources for role" },
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | ldap-controller.html | 7 <p>Configure LDAP settings and manage role groups.</p> 22 LDAP authentication must be enabled to modify role groups. 84 … ng-class="{'visible' : ldap__configuration.ldap__uri.$touched || submitted}" role="alert"> 94 … ng-class="{'visible' : ldap__configuration.ldap__bind__dn.$touched || submitted}" role="alert"> 109 … ng-class="{'visible' : ldap__configuration.ldap__bind_pw.$touched || submitted}" role="alert"> 119 … ng-class="{'visible' : ldap__configuration.ldap__base__dn.$touched || submitted}" role="alert"> 147 Role groups 151 …<ldap-user-roles role-groups="roleGroups" role-group-type="roleGroupType" enabled="ldapProperties.…
|
| /openbmc/bmcweb/redfish-core/include/generated/enums/ |
| H A D | serial_interface.hpp | 82 enum class Role{ enum 160 NLOHMANN_JSON_SERIALIZE_ENUM(Role, { 161 {Role::Invalid, "Invalid"}, 162 {Role::Client, "Client"}, 163 {Role::Server, "Server"},
|
| /openbmc/u-boot/drivers/usb/musb-new/ |
| H A D | Kconfig | 11 Enables the MUSB USB dual-role controller in host mode. 19 Enables the MUSB USB dual-role controller in gadget mode. 26 Say y here to enable support for the dual role high
|
| /openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/static/js/ |
| H A D | newcustomimage_modal.js | 96 newCustomImgBtn.find('[data-role="loading-state"]').hide(); 97 newCustomImgBtn.find('[data-role="submit-state"]').show(); 107 newCustomImgBtn.find('[data-role="submit-state"]').hide(); 108 newCustomImgBtn.find('[data-role="loading-state"]').show(); 159 var imageSelector = $('#new-custom-image-modal [data-role="image-selector"]'); 160 var imageSelectRadiosContainer = $('#new-custom-image-modal [data-role="image-selector-radios"]'); 163 imageSelector.remove('[data-role="image-radio"]'); 180 '<div class="radio"><label data-role="image-radio">' +
|
| /openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/templates/ |
| H A D | newcustomimage_modal.html | 29 <div data-role="image-selector" style="display:none;"> 32 <div data-role="image-selector-radios"></div> 52 <span data-role="submit-state">Create custom image</span> 53 <span data-role="loading-state" style="display:none">
|
| /openbmc/docs/designs/ |
| H A D | redfish-authorization.md | 33 authenticated Redfish role are sufficient to complete the operation in the 104 To map Redfish role to their assigned Redfish privileges, BMCWeb implements the 143 proper Redfish role and is authorized to access certain resources without 175 - It rejects deletion of OEM Redfish privileges if any OEM Redfish role is 210 representing that a user is a specific Redfish role. BMCWeb then uses a 211 hardcoded table to map Redfish role to Redfish privileges. 214 well with OEM Redfish Roles where a Redfish role maps to a dynamic set of OEM 230 role. OEM redfish roles will get prefix "openbmc-orfr-". "orfr" refers to OEM 231 Redfish role. For example, the base Redfish role "Administrator" will result in 242 **Username to Redfish Role Mapping** Mapping a username to Redfish role becomes [all …]
|