| /openbmc/openbmc-test-automation/lib/ |
| H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 57 # username The host username. 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 82 # username The host username. 89 $username@$host\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 110 # username The host username. 118 set_var_default interface [get_host_default_interface $host $username\ 121 $username@$host 'cat /sys/class/net/$interface/address'" \ [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/hashserv/ |
| H A D | client.py | 83 def __init__(self, username=None, password=None): argument 86 self.username = username 93 if self.username: 96 await self.auth(self.username, self.password) 241 async def auth(self, username, token): argument 242 result = await self.invoke({"auth": {"username": username, "token": token}}) 243 self.username = username 248 async def refresh_token(self, username=None): argument 250 if username: 251 m["username"] = username [all …]
|
| H A D | server.py | 184 If allow_self_service is True, and the "username" property in the request 195 username = request.get("username", self.user.username) 196 if username == self.user.username: 197 request["username"] = self.user.username 202 username = "Anonymous user" 205 username = self.user.username 210 username, 216 f"{username} is not allowed to access permissions(s) {', '.join(permissions)}" 271 def raise_no_user_error(self, username): argument 272 raise bb.asyncrpc.InvokeError(f"No user named '{username}' exists") [all …]
|
| H A D | sqlite.py | 41 ("username", "TEXT NOT NULL", "UNIQUE"), 95 username=row["username"], 469 def _get_user(self, username): argument 473 SELECT username, permissions, token FROM users WHERE username=:username 476 "username": username, 481 async def lookup_user_token(self, username): argument 482 row = self._get_user(username) 487 async def lookup_user(self, username): argument 488 return map_user(self._get_user(username)) 490 async def set_user_token(self, username, token): argument [all …]
|
| H A D | sqlalchemy.py | 79 username = Column(Text, nullable=False) variable in Users 83 __table_args__ = (UniqueConstraint("username"),) 117 def __init__(self, url, username=None, password=None): argument 121 if username is not None: 122 self.url = self.url.set(username=username) 175 username=row.username, 501 async def _get_user(self, username): argument 505 Users.username, 509 Users.username == username, 514 async def lookup_user_token(self, username): argument [all …]
|
| /openbmc/openbmc/meta-phosphor/classes/ |
| H A D | phosphor-deploy-ssh-keys.bbclass | 31 username=`echo "$current_key" | awk -F":" '{ print $1}'` 34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then 35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'` 49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'` [all …]
|
| /openbmc/phosphor-user-manager/ |
| H A D | user_mgr.cpp | 201 bool UserMgr::isUserExist(const std::string& userName) in isUserExist() argument 203 if (userName.empty()) in isUserExist() 209 if (usersList.find(userName) == usersList.end()) in isUserExist() 216 void UserMgr::throwForUserDoesNotExist(const std::string& userName) in throwForUserDoesNotExist() argument 218 if (!isUserExist(userName)) in throwForUserDoesNotExist() 220 lg2::error("User '{USERNAME}' does not exist", "USERNAME", userName); in throwForUserDoesNotExist() 239 void UserMgr::throwForUserExists(const std::string& userName) in throwForUserExists() argument 241 if (isUserExist(userName)) in throwForUserExists() 249 throwForUserNameConstraints(const std::string & userName,const std::vector<std::string> & groupNames) throwForUserNameConstraints() argument 360 createUser(std::string userName,std::vector<std::string> groupNames,std::string priv,bool enabled) createUser() argument 409 deleteUser(std::string userName) deleteUser() argument 495 renameUser(std::string userName,std::string newUserName) renameUser() argument 531 updateGroupsAndPriv(const std::string & userName,std::vector<std::string> groupNames,const std::string & priv) updateGroupsAndPriv() argument 763 userEnable(const std::string & userName,bool enabled) userEnable() argument 855 userLockedForFailedAttempt(const std::string & userName) userLockedForFailedAttempt() argument 878 userLockedForFailedAttempt(const std::string & userName,const bool & value) userLockedForFailedAttempt() argument 902 userPasswordExpired(const std::string & userName) userPasswordExpired() argument 982 std::string userName(pwp->pw_name); getUserAndSshGrpList() local 1010 isUserEnabled(const std::string & userName) isUserEnabled() argument 1151 isGroupMember(const std::string & userName,gid_t primaryGid,const std::string & groupName) const isGroupMember() argument 1225 getUserInfo(std::string userName) getUserInfo() argument 1537 executeUserAdd(const char * userName,const char * groups,bool sshRequested,bool enabled) executeUserAdd() argument 1547 executeUserDelete(const char * userName) executeUserDelete() argument 1552 executeUserClearFailRecords(const char * userName) executeUserClearFailRecords() argument 1557 executeUserRename(const char * userName,const char * newUserName) executeUserRename() argument 1565 executeUserModify(const char * userName,const char * newGroups,bool sshRequested) executeUserModify() argument 1572 executeUserModifyUserEnable(const char * userName,bool enabled) executeUserModifyUserEnable() argument 1580 getFailedAttempt(const char * userName) getFailedAttempt() argument 1614 secretKeyRequired(std::string userName) secretKeyRequired() argument [all...] |
| H A D | user_mgr.hpp | 224 * @param[in] userName - Name of the user which has to be created 229 void createUser(std::string userName, std::vector<std::string> groupNames, 235 * @param[in] userName - current name of the user 238 void renameUser(std::string userName, std::string newUserName) override; 243 * @param[in] userName - Name of the user which has to be deleted 245 void deleteUser(std::string userName); 250 * @param[in] userName - user name, for which update is requested 254 void updateGroupsAndPriv(const std::string& userName, 261 * @param[in] userName - user name, for which update is requested 264 void userEnable(const std::string& userName, bool enabled); [all …]
|
| /openbmc/phosphor-host-ipmid/user_channel/ |
| H A D | user_layer.cpp | 36 SecureString ipmiUserGetPassword(const std::string& userName) in ipmiUserGetPassword() argument 38 return passwdMgr.getPasswdByUserName(userName); in ipmiUserGetPassword() 41 Cc ipmiClearUserEntryPassword(const std::string& userName) in ipmiClearUserEntryPassword() argument 43 if (passwdMgr.updateUserEntry(userName, "") != 0) in ipmiClearUserEntryPassword() 50 Cc ipmiRenameUserEntryPassword(const std::string& userName, in ipmiRenameUserEntryPassword() argument 53 if (passwdMgr.updateUserEntry(userName, newUserName) != 0) in ipmiRenameUserEntryPassword() 70 uint8_t ipmiUserGetUserId(const std::string& userName) in ipmiUserGetUserId() argument 72 return getUserAccessObject().getUserId(userName); in ipmiUserGetUserId() 75 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName) in ipmiUserSetUserName() argument 77 size_t len = strnlen(userName, ipmiMaxUserName); in ipmiUserSetUserName() [all …]
|
| H A D | user_mgmt.cpp | 93 int getUserNameFromPath(const std::string& path, std::string& userName) in getUserNameFromPath() argument 96 userName.assign(objPath.filename()); in getUserNameFromPath() 101 const std::string& userName, const std::string& priv, in userUpdateHelper() argument 107 if (usrAccess.addUserEntry(userName, priv, enabled) == false) in userUpdateHelper() 119 safeUsernameString(userData->user[usrIndex].userName); in userUpdateHelper() 120 if (userName == curName) in userUpdateHelper() 129 "USER_NAME", userName, "USER_EVENT", userEvent); in userUpdateHelper() 164 userData->user[usrIndex].userName, in userUpdateHelper() 165 sizeof(userData->user[usrIndex].userName), newUserName); in userUpdateHelper() 166 ipmiRenameUserEntryPassword(userName, newUserName); in userUpdateHelper() [all …]
|
| H A D | user_layer.hpp | 89 * @param[in] userName - user name 93 SecureString ipmiUserGetPassword(const std::string& userName); 96 * username 98 * @param[in] userName - user name to be removed 102 Cc ipmiClearUserEntryPassword(const std::string& userName); 107 * @param[in] userName - user name which has to be renamed 112 Cc ipmiRenameUserEntryPassword(const std::string& userName, 133 * @param[in] userName - user name 137 uint8_t ipmiUserGetUserId(const std::string& userName); 142 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName) [all …]
|
| H A D | passwd_mgr.hpp | 45 * @param[in] userName - user name 50 SecureString getPasswdByUserName(const std::string& userName); 52 /** @brief Update / clear username and password entry for the specified 55 * @param[in] userName - user name that has to be renamed / deleted 56 * @param[in] newUserName - new user name. If empty, userName will be 61 int updateUserEntry(const std::string& userName, 65 using UserName = std::string; typedef in ipmi::PasswdMgr 67 std::unordered_map<UserName, Password> passwdMapList; 96 * @param[in] userName - user name that has to be renamed / deleted 97 * @param[in] newUserName - new user name. If empty, userName will be [all …]
|
| /openbmc/phosphor-webui/app/login/controllers/ |
| H A D | login-controller.html | 11 <b>Invalid username or password.</b> 15 …in__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event… 21 <label for="username">Username</label> 22 …d="username" name="username" has-error="invalidCredentials && login__form.$pristine" required ng-m… 23 …<div ng-messages="login__form.username.$error" class="form-error" ng-class="{'visible' : login__fo… 28 …orm.$pristine" required ng-model="password" ng-keydown="tryLogin(host, username, password, $event… 33 …width" type="button" value="Log in" role="button" ng-click="login(host, username, password); submi…
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username'] 39 @{username} admin_user readonly_user disabled_user variable 110 [Teardown] Delete Users Via Redfish @{username} 113 # username privilege_level enabled 114 ${username}[0] Administrator ${True} 115 ${username}[1] ReadOnly ${True} 116 ${username}[2] Administrator ${False} 125 # username privilege_level enabled 150 Create User And Verify ${username}[0] Administrator ${True} 153 Delete Users Via GUI ${username}[0] [all …]
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | Redfish_Service_Validator.robot | 43 #username password role enabled 51 [Arguments] ${username} ${password} ${role} ${enabled} 52 [Teardown] Delete User Created ${username} 55 # username The username to be created. 59 # enabled Indicates whether the username being created 63 Redfish Create User ${username} ${password} ${role} ${enabled} 69 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username} 70 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging 82 [Arguments] ${username} 85 # username The username to be deleted. [all …]
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 109 #username password role_id enabled wrong_password 119 #username password role_id enabled wrong_password 129 #username password role_id enabled wrong_password 138 #username password role_id enabled 147 #username password role_id enabled 156 #username password role_id enabled 165 #username passwor [all...] |
| /openbmc/webui-vue/src/views/Login/ |
| H A D | Login.vue | 16 <b-form-group label-for="username" :label="$t('pageLogin.username')"> 18 id="username" 19 v-model="userInfo.username" 20 aria-describedby="login-error-alert username-required" 21 :state="getValidationState(v$.userInfo.username)" 24 data-test-id="login-input-username" 25 @input="v$.userInfo.username.$touch()" 28 <b-form-invalid-feedback id="username-required" role="alert"> 29 <template v-if="v$.userInfo.username.required.$invalid"> 95 username: null, [all …]
|
| /openbmc/openbmc-test-automation/gui/test/access_control/ |
| H A D | test_obmc_gui_local_users.robot | |
| /openbmc/openbmc/poky/meta/classes/ |
| H A D | useradd_base.bbclass | 40 local username=`echo "$opts" | awk '{ print $NF }'` 41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 49 bbnote "${PN}: user $username already exists, not re-creating it" 58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr… 59 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 68 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 103 local username=`echo "$opts" | awk '{ print $NF }'` [all …]
|
| /openbmc/qemu/crypto/ |
| H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key() 61 error_setg(errp, "Username %s not found in PSK file %s", in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 86 error_setg(errp, "username should not be set when endpoint=server"); in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() [all …]
|
| /openbmc/phosphor-user-manager/test/ |
| H A D | user_mgr_test.cpp | 42 void createLocalUser(const std::string& userName, in createLocalUser() argument 47 tempObjPath /= userName; in createLocalUser() 60 userName, std::make_unique<phosphor::user::Users>( in createLocalUser() 108 std::string userName = "user"; in TEST_F() local 111 EXPECT_CALL(mockManager, getPrimaryGroup(userName)) in TEST_F() 113 EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), in TEST_F() 120 std::string userName = "testUser"; in TEST_F() local 124 createLocalUser(userName, groups, privilege, true); in TEST_F() 125 EXPECT_CALL(mockManager, userLockedForFailedAttempt(userName)).Times(1); in TEST_F() 126 userInfo = mockManager.getUserInfo(userName); in TEST_F() [all …]
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 22 {label: 'Username'}, {label: 'Privilege'}, {label: 'Account status'} 31 * Returns true if username is 'root' 35 return user.UserName === 'root' ? true : false; 55 user.uiData = [user.UserName, user.RoleId, accountStatus]; 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 127 toastService.success(`User '${username}' has been created.`); 131 toastService.error(`Failed to create new user '${username}'.`); 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) [all …]
|
| /openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
| H A D | UserManagementStore.js | 115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701 117 UserName: username, property in UserManagementStore.actions.createUser.data 127 username, field in AnonymousClassf362ce950801 136 username: username, property in AnonymousClassf362ce950901 143 { originalUsername, username, password, privilege, status, locked }, 146 if (username) data.UserName = username; 156 username: originalUsername, property in AnonymousClassf362ce950c01 166 username: originalUsername, property in AnonymousClassf362ce950d01 171 async deleteUser({ dispatch }, username) { argument 173 .delete(`/redfish/v1/AccountService/Accounts/${username}`) [all …]
|
| /openbmc/bmcweb/features/webui_login/ |
| H A D | login_routes.hpp | 38 std::string_view username; in handleLogin() local 55 // check for username/password in the root object in handleLogin() 57 nlohmann::json::iterator userIt = loginCredentials.find("username"); in handleLogin() 66 username = *userStr; in handleLogin() 73 // same keys (username and password), attempt to use that in handleLogin() 77 // Some apis produce an array of value ["username", in handleLogin() 94 username = *userStr; in handleLogin() 107 obj->find("username"); in handleLogin() 118 username = *userStr; in handleLogin() 152 if (it->value() == "form-data; name=\"username\"") in handleLogin() [all …]
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
| H A D | ModalUser.vue | 65 :label="$t('pageUserManagement.modal.username')" 66 label-for="username" 68 <b-form-text id="username-help-block"> 78 id="username" 79 v-model="form.username" 81 aria-describedby="username-help-block" 82 data-test-id="userManagement-input-username" 83 :state="getValidationState(v$.form.username)" 85 @input="v$.form.username.$touch()" 88 <template v-if="v$.form.username.required.$invalid"> [all …]
|