/openbmc/openbmc/poky/bitbake/doc/ |
H A D | releases.rst | 11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>` 17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>` 23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>` 33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>` 39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>` 45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>` 51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>` 57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>` 63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>` 69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>` [all …]
|
H A D | index.rst | 4 BitBake User Manual 13 bitbake-user-manual/bitbake-user-manual-intro 14 bitbake-user-manual/bitbake-user-manual-execution 15 bitbake-user-manual/bitbake-user-manual-metadata 16 bitbake-user-manual/bitbake-user-manual-ref-variables-context 17 bitbake-user-manual/bitbake-user-manual-fetching 18 bitbake-user-manual/bitbake-user-manual-ref-variables 19 bitbake-user-manual/bitbake-user-manual-library-functions 20 bitbake-user-manual/bitbake-user-manual-hello
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 2 Documentation Test suite for OpenBMC IPMI user management. 17 ${invalid_username} user% 34 # User defined count. 39 Verify IPMI User Summary 40 [Documentation] Verify IPMI maximum supported IPMI user ID and 41 ... enabled user from user summary. 44 ... Delete Created User ${random_userid} 46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count 48 ${random_userid} ${random_username}= Create Random IPMI User 50 Run IPMI Standard Command user enable ${random_userid} [all …]
|
H A D | test_ipmi_payload.robot | 92 Verify Set User Access Payload For Standard Payload SOL 95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 96 ... AND Delete Created User ${userid} 99 ${userid} ${username}= Create And Verify IPMI User 103 # Get default user access payload values. 104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 106 # Disable Standard payload 1 via set user access payload command. 107 Set User Access Payload For Given User ${user_id_in_hex} Disable 112 Verify Set User Access Payload For Operator Privileged User 113 [Documentation] Try to set user access payload using operator privileged user and expect error. [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_local_user.robot | 4 Documentation Suite to test local user management. 29 [Documentation] Create user via Redfishtool and verify. 31 [Teardown] Redfishtool Delete User "UserT100" 33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 34 Redfishtool Verify User "UserT100" "ReadOnly" 38 [Documentation] Modify user via Redfishtool and verify. 40 [Teardown] Redfishtool Delete User "UserT100" 42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 43 Redfishtool Update User Role "UserT100" "Administrator" 44 Redfishtool Verify User "UserT100" "Administrator" [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | Manager.interface.yaml | 2 Provides user management functionality. As communication to this service is 9 Creates a new user. If the user already exists, then it will throw an 15 User name which has to be created. 19 List of groups to which the user has to be added. 23 Privilege of the user to be added. 27 User enabled / disabled. 32 - xyz.openbmc_project.User.Common.Error.UserNameExists 33 - xyz.openbmc_project.User.Common.Error.UserNameGroupFail 34 - xyz.openbmc_project.User.Common.Error.UserNamePrivFail 35 - xyz.openbmc_project.User.Common.Error.NoResource [all …]
|
H A D | README.md | 1 # User Management 5 User Manager service exposes D-Bus methods for user management operations. 7 ### User Manager Interface 9 User manager interface `xyz.openbmc_project.User.Manager` provides following 12 #### xyz.openbmc_project.User.Manager interface 16 - CreateUser - To create new user to the system. 17 - RenameUser - To rename existing user to new name in the system. 26 - UserRenamed - Signal sent out when user is renamed in the system. 28 #### xyz.openbmc_project.User.AccountPolicy interface 32 - MaxLoginAttemptBeforeLockout - Permissible attempt before locking out the user [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 25 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$ 29 Create Admin Redfish User And Verify Login Via IPMI 30 [Documentation] Create user using redfish and verify via IPMI. 42 # Delay added for created new user password to get set. 48 Update User Password Via Redfish And Verify Using IPMI 49 [Documentation] Update user password via Redfish and verify using IPMI. 52 # Create user using Redfish. 62 # Update user password using Redfish. 73 Update User Privilege Via Redfish And Verify Using IPMI [all …]
|
H A D | test_user_account.robot | 2 Documentation Test suite for verifying Redfish admin, readonly operation user accounts. 32 Verify Redfish Admin User Persistence After Reboot 33 [Documentation] Verify Redfish admin user persistence after reboot. 36 ... Redfish Create User admin_user TestPwd123 Administrator ${True} 44 Redfish Verify User admin_user TestPwd123 Administrator ${True} 47 Verify Redfish Operator User Persistence After Reboot 48 [Documentation] Verify Redfish operator user persistence after reboot. 51 ... Redfish Create User operator_user TestPwd123 Operator ${True} 59 Redfish Verify User operator_user TestPwd123 Operator ${True} 62 Verify Redfish Readonly User Persistence After Reboot [all …]
|
H A D | test_ldap_configuration.robot | 2 Documentation Test Redfish LDAP user configuration. 39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot 50 ... msg=LDAP user was able to login even though the LDAP service was disabled. 53 # Enabling LDAP so that LDAP user works. 122 Verify LDAP User Login 123 [Documentation] Verify that LDAP user able to login into BMC. 148 Verify LDAP User With Admin Privilege Able To Do BMC Reboot 149 [Documentation] Verify that LDAP user with administrator privilege able to do BMC reboot. 153 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE} 156 # With LDAP user and with right privilege trying to do BMC reboot. [all …]
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
D | user.rst |
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access". 16 ${xpath_user_management_heading} //h1[text()="User management"] 19 ${xpath_add_user} //button[contains(text(),'Add user')] 30 ${xpath_delete_button} //button[text()='Delete user'] 31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')] 37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')] 45 Verify Navigation To User Management Page 46 [Documentation] Verify navigation to user management page. 52 Verify Existence Of All Sections In User Management Page 53 [Documentation] Verify existence of all sections in user management page. [all …]
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 23 Create IPMI User Without Any Privilege And Verify Via Redfish 24 [Documentation] Create user using IPMI without privilege and verify user privilege 28 # Create IPMI user with random id and username. 32 ... user set name ${random_userid} ${random_username} 34 # Verify new user privilege level via Redfish. 40 Create Admin User Via Redfish And Verify Login Via IPMI 41 [Documentation] Create user via redfish and verify via IPMI. 53 # Add delay for a new admin user password to set. 56 Enable IPMI Access To User Using Redfish ${random_username} [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 18 ${xpath_add_user} //button[text()[contains(.,"Add user")]] 29 Verify Existence Of All Sections In Local User Management Page 30 [Documentation] Verify existence of all sections in local user management page. 36 Verify Existence Of All Buttons In Local User Management Page 37 [Documentation] Verify existence of all buttons in local user management page. 46 Verify Existence Of All Input Boxes In Local User Management Page 47 [Documentation] Verify existence of all input boxes in local user management page. 53 Add User And Verify 54 [Documentation] Add user and verify. 57 # Confirm same user does not exist. [all …]
|
/openbmc/docs/architecture/ |
H A D | user-management.md | 1 # User Management - OpenBMC - Design document 6 user-management components. The implementation detail is beyond the scope of 11 1. Use common user-management (e.g. phosphor-user-manager) rather than 12 application-based user-management. Especially, avoid IPMI based 13 user-management. 15 Observe this rule even while creating, modifying or authenticating the user. 16 3. Have applications use the PAM module to authenticate the user instead of 18 4. User creation has to be generic in nature wherever possible. 24 or if the user created doesn't have an 'ipmi' group role. 25 6. User name, Password, Group and Privilege roles are maintained by the common [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | user_mgmt.hpp | 57 // User manager related 59 "xyz.openbmc_project.User.Manager"; 60 static constexpr const char* userMgrObjBasePath = "/xyz/openbmc_project/user"; 61 static constexpr const char* userObjBasePath = "/xyz/openbmc_project/user"; 63 "xyz.openbmc_project.User.Manager"; 65 "xyz.openbmc_project.User.Attributes"; 72 // User manager signal memebers 77 // User interface properties 85 "priv-user", // PRIVILEGE_USER - 2 128 * @enum User update events. [all …]
|
H A D | user_layer.hpp | 47 * User privilege related access data as per IPMI specification.(refer spec 71 * given user and channel. (refer spec sec 24.6) 81 /** @brief initializes user management 87 /** @brief The ipmi get user password layer call 89 * @param[in] userName - user name 98 * @param[in] userName - user name to be removed 104 /** @brief The IPMI call to reuse password entry for the renamed user 107 * @param[in] userName - user name which has to be renamed 108 * @param[in] newUserName - new user name 117 * @param[in] userId - user id [all …]
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.hpp | 29 #include <xyz/openbmc_project/User/AccountPolicy/server.hpp> 30 #include <xyz/openbmc_project/User/Manager/server.hpp> 31 #include <xyz/openbmc_project/User/MultiFactorAuthConfiguration/server.hpp> 32 #include <xyz/openbmc_project/User/TOTPState/server.hpp> 42 namespace user namespace 52 using UserMgrIface = sdbusplus::xyz::openbmc_project::User::server::Manager; 56 sdbusplus::xyz::openbmc_project::User::server::AccountPolicy; 59 sdbusplus::xyz::openbmc_project::User::server::MultiFactorAuthConfiguration; 61 using TOTPStateIface = sdbusplus::xyz::openbmc_project::User::server::TOTPState; 88 using MultiFactorAuthType = sdbusplus::common::xyz::openbmc_project::user:: [all …]
|
H A D | users.hpp | 22 #include <xyz/openbmc_project/User/Attributes/server.hpp> 23 #include <xyz/openbmc_project/User/MultiFactorAuthConfiguration/server.hpp> 24 #include <xyz/openbmc_project/User/TOTPAuthenticator/server.hpp> 27 namespace user namespace 31 using UsersIface = base::User::server::Attributes; 33 using TOTPAuthenticatorIface = base::User::server::TOTPAuthenticator; 37 using MultiFactorAuthType = sdbusplus::common::xyz::openbmc_project::user:: 40 sdbusplus::common::xyz::openbmc_project::user::MultiFactorAuthConfiguration; 41 // Place where all user objects has to be created 42 constexpr auto usersObjPath = "/xyz/openbmc_project/user"; [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 2 * Controller for user Accounts 32 * @param {*} user 34 function checkIfRoot(user) { argument 35 return user.UserName === 'root' ? true : false; 40 * @param {*} user 41 * @returns user 43 function mapTableData(user) { argument 44 const accountStatus = user.Locked ? 'Locked' : 45 user.Enabled ? 'Enabled' : 50 enabled: checkIfRoot(user) ? false : true, [all …]
|
/openbmc/qemu/docs/system/devices/ |
H A D | vhost-user.rst | 3 vhost-user back ends 6 vhost-user back ends are way to service the request of VirtIO devices 10 vhost-user device 16 device that connects via a socket to the vhost-user *daemon*. 21 .. list-table:: vhost-user devices 28 * - vhost-user-blk 30 - See contrib/vhost-user-blk 31 * - vhost-user-fs 34 * - vhost-user-gpio 37 * - vhost-user-gpu [all …]
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 2 Documentation Test root user expire password. 17 # If user re-tries more than 5 time incorrectly, the user gets locked for 5 minutes. 29 [Documentation] Expire root user password and expect an error while access via IPMI. 40 [Documentation] Expire root user password and expect an error while access via SSH. 51 Expire And Change Root User Password And Access Via SSH 52 [Documentation] Expire and change root user password and access via SSH. 55 ... Restore Default Password For Root User AND FFDC On Test Case Fail 72 ... Restore Default Password For Root User AND FFDC On Test Case Fail 83 Expire And Change Root User Password Via Redfish And Verify 84 [Documentation] Expire and change root user password via Redfish and verify. [all …]
|
/openbmc/qemu/scripts/ |
H A D | update-syscalltbl.sh | 2 arch/alpha/kernel/syscalls/syscall.tbl,linux-user/alpha/syscall.tbl \ 3 arch/arm/tools/syscall.tbl,linux-user/arm/syscall.tbl \ 4 scripts/syscall.tbl,linux-user/aarch64/syscall_64.tbl \ 5 scripts/syscall.tbl,linux-user/hexagon/syscall.tbl \ 6 scripts/syscall.tbl,linux-user/loongarch64/syscall.tbl \ 7 arch/m68k/kernel/syscalls/syscall.tbl,linux-user/m68k/syscall.tbl \ 8 arch/microblaze/kernel/syscalls/syscall.tbl,linux-user/microblaze/syscall.tbl \ 9 arch/mips/kernel/syscalls/syscall_n32.tbl,linux-user/mips64/syscall_n32.tbl \ 10 arch/mips/kernel/syscalls/syscall_n64.tbl,linux-user/mips64/syscall_n64.tbl \ 11 arch/mips/kernel/syscalls/syscall_o32.tbl,linux-user/mips/syscall_o32.tbl \ [all …]
|
/openbmc/qemu/tests/docker/dockerfiles/ |
H A D | debian-all-test-cross.docker | 7 # to build and run linux-user tests on GitLab 72 …user,arm-linux-user,hppa-linux-user,i386-linux-user,m68k-linux-user,mips-linux-user,mips64-linux-u… 73 # As a final step configure the user (if env is defined) 75 ARG USER 77 RUN if [ "${USER}" ]; then \ 78 id ${USER} 2>/dev/null || useradd -u ${UID} -U ${USER}; fi
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/ |
H A D | meson.build | 13 sdbusplus_current_path = 'xyz/openbmc_project/User' 16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(), 18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml', 32 'xyz/openbmc_project/User/AccountPolicy', 40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(), 42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml', 56 'xyz/openbmc_project/User/Attributes', 64 'xyz/openbmc_project/User/Common__markdown'.underscorify(), 65 input: ['../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'], 78 'xyz/openbmc_project/User/Common', [all …]
|