Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 3574) sorted by relevance

12345678910>>...143

/openbmc/openbmc/poky/bitbake/doc/
H A Dreleases.rst11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>`
17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>`
23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>`
33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>`
39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>`
45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>`
51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>`
57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>`
63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>`
69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>`
[all …]
H A Dindex.rst4 BitBake User Manual
13 bitbake-user-manual/bitbake-user-manual-intro
14 bitbake-user-manual/bitbake-user-manual-execution
15 bitbake-user-manual/bitbake-user-manual-metadata
16 bitbake-user-manual/bitbake-user-manual-ref-variables-context
17 bitbake-user-manual/bitbake-user-manual-fetching
18 bitbake-user-manual/bitbake-user-manual-ref-variables
19 bitbake-user-manual/bitbake-user-manual-library-functions
20 bitbake-user-manual/bitbake-user-manual-hello
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DManager.interface.yaml2 Provides user management functionality. As communication to this service is
9 Creates a new user. If the user already exists, then it will throw an
15 User name which has to be created.
19 List of groups to which the user has to be added.
23 Privilege of the user to be added.
27 User enabled / disabled.
32 - xyz.openbmc_project.User.Common.Error.UserNameExists
33 - xyz.openbmc_project.User.Common.Error.UserNameGroupFail
34 - xyz.openbmc_project.User.Common.Error.UserNamePrivFail
35 - xyz.openbmc_project.User.Common.Error.NoResource
[all …]
H A DREADME.md1 # User Management
5 User Manager service exposes D-Bus methods for user management operations.
7 ### User Manager Interface
9 User manager interface `xyz.openbmc_project.User.Manager` provides following
12 #### xyz.openbmc_project.User.Manager interface
16 - CreateUser - To create new user to the system.
17 - CreateUser2 - To create new user with set of mandatory and optional
19 - RenameUser - To rename existing user to new name in the system.
28 - UserRenamed - Signal sent out when user is renamed in the system.
30 #### xyz.openbmc_project.User.AccountPolicy interface
[all …]
H A DCommon.errors.yaml1 # xyz.openbmc_project.User.Common.Error.UserNameExists
3 description: Specified user name already exists.
4 # xyz.openbmc_project.User.Common.Error.UserNameDoesNotExist
6 description: Specified user name does not exist.
7 # xyz.openbmc_project.User.Common.Error.UserNameGroupFail
9 description: Specified Group related restriction failure for user name.
10 # xyz.openbmc_project.User.Common.Error.UserNamePrivFail
12 description: Specified privilege related restriction failure for user name.
13 # xyz.openbmc_project.User.Common.Error.NoResource
16 # xyz.openbmc_project.User.Common.Error.PrivilegeMappingExists
[all …]
H A DTOTPAuthenticator.interface.yaml3 One-time Password (TOTP) multi-factor authentication at user level to
4 support multi-factor authentication secret key setup for each user. This
5 interface implemented by each user object to support TOTP based
12 secret key for the given user and returns secret key string to share
13 secret key to user.
18 Secret key string which will be shared to user to setup TOTP
27 authenticator secret key for the given user and returns weather this
28 OTP is valid or not which make sure user has setup valid secret key
47 key for the given user.
59 required for the given user to complete Time-based One-time Password
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot2 Documentation Test suite for OpenBMC IPMI user management.
19 ${invalid_username} user%
36 # User defined count.
41 Verify IPMI User Summary
42 [Documentation] Verify IPMI maximum supported IPMI user ID and
43 ... enabled user from user summary.
46 ... Delete Created User ${random_userid}
48 ${initial_user_count} ${maximum_ids}= Get Enabled User Count
50 ${random_userid} ${random_username}= Create Random IPMI User
[all...]
H A Dtest_ipmi_payload.robot92 Verify Set User Access Payload For Standard Payload SOL
95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex}
96 ... AND Delete Created User ${userid}
99 ${userid} ${username}= Create And Verify IPMI User
103 # Get default user access payload values.
104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format}
106 # Disable Standard payload 1 via set user access payload command.
107 Set User Access Payload For Given User ${user_id_in_hex} Disable
112 Verify Set User Access Payload For Operator Privileged User
113 [Documentation] Try to set user access payload using operator privileged user and expect error.
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot4 Documentation Suite to test local user management.
29 [Documentation] Create user via Redfishtool and verify.
31 [Teardown] Redfishtool Delete User "UserT100"
33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
34 Redfishtool Verify User "UserT100" "ReadOnly"
38 [Documentation] Modify user via Redfishtool and verify.
40 [Teardown] Redfishtool Delete User "UserT100"
42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true
43 Redfishtool Update User Role "UserT100" "Administrator"
44 Redfishtool Verify User "UserT100" "Administrator"
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ipmi_redfish_user.robot2 Documentation Test IPMI and Redfish combinations for user management.
25 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$
29 Create Admin Redfish User And Verify Login Via IPMI
30 [Documentation] Create user using redfish and verify via IPMI.
42 # Delay added for created new user password to get set.
48 Update User Password Via Redfish And Verify Using IPMI
49 [Documentation] Update user password via Redfish and verify using IPMI.
52 # Create user using Redfish.
62 # Update user password using Redfish.
73 Update User Privilege Via Redfish And Verify Using IPMI
[all …]
H A Dtest_user_account.robot2 Documentation Test suite for verifying Redfish admin, readonly operation user accounts.
33 [Documentation] Verify Redfish admin user persistence after reboot.
36 ... Redfish Create User admin_user TestPwd123 Administrator ${True}
37 ... AND Redfish Create User readonly_user TestPwd123 ReadOnly ${True}
46 Redfish Verify User admin_user TestPwd123 Administrator ${True}
47 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True}
50 Verify Redfish Operator User Persistence After Reboot
51 [Documentation] Verify Redfish operator user persistence after reboot.
54 ... Redfish Create User operator_user TestPwd123 Operator ${True}
62 Redfish Verify User operator_user TestPwd123 Operator ${True}
[all …]
H A Dtest_ldap_configuration.robot2 Documentation Test Redfish LDAP user configuration.
39 [Documentation] Verify that LDAP is disabled and that LDAP user cannot
50 ... msg=LDAP user was able to login even though the LDAP service was disabled.
53 # Enabling LDAP so that LDAP user works.
122 Verify LDAP User Login
123 [Documentation] Verify that LDAP user able to login into BMC.
148 Verify LDAP User With Admin Privilege Able To Do BMC Reboot
149 [Documentation] Verify that LDAP user with administrator privilege able to do BMC reboot.
153 Update LDAP Configuration with LDAP User Role And Group ${LDAP_TYPE}
156 # With LDAP user and with right privilege trying to do BMC reboot.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access".
16 ${xpath_user_management_heading} //h1[text()="User management"]
19 ${xpath_add_user} //button[contains(text(),'Add user')]
30 ${xpath_delete_button} //button[text()='Delete user']
31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')]
37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')]
45 Verify Navigation To User Management Page
46 [Documentation] Verify navigation to user management page.
52 Verify Existence Of All Sections In User Management Page
53 [Documentation] Verify existence of all sections in user management page.
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot2 Documentation Test IPMI and Redfish combinations for user management.
23 Create IPMI User Without Any Privilege And Verify Via Redfish
24 [Documentation] Create user using IPMI without privilege and verify user privilege
28 # Create IPMI user with random id and username.
32 ... user set name ${random_userid} ${random_username}
34 # Verify new user privilege level via Redfish.
40 Create Admin User Via Redfish And Verify Login Via IPMI
41 [Documentation] Create user via redfish and verify via IPMI.
53 # Add delay for a new admin user password to set.
56 Enable IPMI Access To User Using Redfish ${random_username}
[all …]
/openbmc/docs/architecture/
H A Duser-management.md1 # User Management - OpenBMC - Design document
6 user-management components. The implementation detail is beyond the scope of
11 1. Use common user-management (e.g. phosphor-user-manager) rather than
12 application-based user-management. Especially, avoid IPMI based
13 user-management.
15 Observe this rule even while creating, modifying or authenticating the user.
16 3. Have applications use the PAM module to authenticate the user instead of
18 4. User creation has to be generic in nature wherever possible.
24 or if the user created doesn't have an 'ipmi' group role.
25 6. User name, Password, Group and Privilege roles are maintained by the common
[all …]
/openbmc/phosphor-host-ipmid/user_channel/
H A Duser_layer.hpp47 * User privilege related access data as per IPMI specification.(refer spec
71 * given user and channel. (refer spec sec 24.6)
81 /** @brief initializes user management
87 /** @brief The ipmi get user password layer call
89 * @param[in] userName - user name
98 * @param[in] userName - user name to be removed
104 /** @brief The IPMI call to reuse password entry for the renamed user
107 * @param[in] userName - user name which has to be renamed
108 * @param[in] newUserName - new user name
117 * @param[in] userId - user id
[all …]
H A Duser_mgmt.hpp57 // User manager related
59 "xyz.openbmc_project.User.Manager";
60 static constexpr const char* userMgrObjBasePath = "/xyz/openbmc_project/user";
61 static constexpr const char* userObjBasePath = "/xyz/openbmc_project/user";
63 "xyz.openbmc_project.User.Manager";
65 "xyz.openbmc_project.User.Attributes";
72 // User manager signal memebers
77 // User interface properties
85 "priv-user", // PRIVILEGE_USER - 2
128 * @enum User update events.
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js2 * Controller for user Accounts
32 * @param {*} user
34 function checkIfRoot(user) { argument
35 return user.UserName === 'root' ? true : false;
40 * @param {*} user
41 * @returns user
43 function mapTableData(user) { argument
44 const accountStatus = user.Locked ? 'Locked' :
45 user.Enabled ? 'Enabled' :
50 enabled: checkIfRoot(user) ? false : true,
[all …]
/openbmc/qemu/scripts/
H A Dupdate-syscalltbl.sh2 arch/alpha/kernel/syscalls/syscall.tbl,linux-user/alpha/syscall.tbl \
3 arch/arm/tools/syscall.tbl,linux-user/arm/syscall.tbl \
4 scripts/syscall.tbl,linux-user/aarch64/syscall_64.tbl \
5 scripts/syscall.tbl,linux-user/hexagon/syscall.tbl \
6 scripts/syscall.tbl,linux-user/loongarch64/syscall.tbl \
7 arch/m68k/kernel/syscalls/syscall.tbl,linux-user/m68k/syscall.tbl \
8 arch/microblaze/kernel/syscalls/syscall.tbl,linux-user/microblaze/syscall.tbl \
9 arch/mips/kernel/syscalls/syscall_n32.tbl,linux-user/mips64/syscall_n32.tbl \
10 arch/mips/kernel/syscalls/syscall_n64.tbl,linux-user/mips64/syscall_n64.tbl \
11 arch/mips/kernel/syscalls/syscall_o32.tbl,linux-user/mips/syscall_o32.tbl \
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_expire_password.robot2 Documentation Test root user expire password.
17 # If user re-tries more than 5 time incorrectly, the user gets locked for 5 minutes.
29 [Documentation] Expire root user password and expect an error while access via IPMI.
40 [Documentation] Expire root user password and expect an error while access via SSH.
51 Expire And Change Root User Password And Access Via SSH
52 [Documentation] Expire and change root user password and access via SSH.
55 ... Restore Default Password For Root User AND FFDC On Test Case Fail
72 ... Restore Default Password For Root User AND FFDC On Test Case Fail
83 Expire And Change Root User Password Via Redfish And Verify
84 [Documentation] Expire and change root user password via Redfish and verify.
[all …]
/openbmc/qemu/tests/docker/dockerfiles/
H A Ddebian-all-test-cross.docker93 ENV DEF_TARGET_LIST aarch64-linux-user,arm-linux-user,hppa-linux-user,i386-linux-user,m68k-linux-user,mips-linux-user,mips64-linux-user,mips64el-linux-user,mipsel-linux-user,ppc-linux-user,ppc6
[all...]
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/
H A Dmeson.build13 sdbusplus_current_path = 'xyz/openbmc_project/User'
16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(),
18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml',
32 'xyz/openbmc_project/User/AccountPolicy',
40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(),
42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml',
56 'xyz/openbmc_project/User/Attributes',
64 'xyz/openbmc_project/User/Common__markdown'.underscorify(),
66 '../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml',
80 'xyz/openbmc_project/User/Common',
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libconfuse/files/
H A DCVE-2022-40320.patch22 /* ~user or ~user/path */
23 - char *user;
24 + char *user; /* ~user or ~user/path */
31 - user = malloc(file - filename);
33 + user = malloc(len + 1);
34 if (!user)
37 - strncpy(user, filename + 1, file - filename - 1);
38 + strncpy(user, &filename[1], len);
39 + user[len] = 0;
40 passwd = getpwnam(user);
[all …]
/openbmc/phosphor-mboxd/vpnor/test/
H A Dtoc_flags.cpp26 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main()
27 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
31 assert(!(part.data.user.data[0])); in main()
32 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main()
36 assert(!(part.data.user.data[0])); in main()
37 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main()
42 assert(!(part.data.user.data[0])); in main()
43 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
47 assert(!(part.data.user.data[0])); in main()
48 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main()
[all …]
/openbmc/hiomapd/vpnor/test/
H A Dtoc_flags.cpp28 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main()
29 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
33 assert(!(part.data.user.data[0])); in main()
34 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main()
38 assert(!(part.data.user.data[0])); in main()
39 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main()
44 assert(!(part.data.user.data[0])); in main()
45 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
49 assert(!(part.data.user.data[0])); in main()
50 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main()
[all …]

12345678910>>...143