/openbmc/phosphor-user-manager/ |
H A D | users.cpp | 19 #include "users.hpp" 65 * @param[in] groups - users group list 70 Users::Users(sdbusplus::bus_t& bus, const char* path, in Users() function in phosphor::user::Users 82 Users::~Users() in ~Users() 90 void Users::delete_(void) in delete_() 99 std::string Users::userPrivilege(std::string value) in userPrivilege() 109 void Users::setUserPrivilege(const std::string& value) in setUserPrivilege() 114 void Users::setUserGroups(const std::vector<std::string>& groups) in setUserGroups() 122 std::string Users::userPrivilege(void) const in userPrivilege() 131 std::vector<std::string> Users::userGroups(std::vector<std::string> value) in userGroups() [all …]
|
H A D | users.hpp | 46 /** @class Users 49 class Users : public Interfaces class 52 Users() = delete; 53 ~Users(); 54 Users(const Users&) = delete; 55 Users& operator=(const Users&) = delete; 56 Users(Users&&) = delete; 57 Users& operator=(Users&&) = delete; 63 * @param[in] groups - users group list 64 * @param[in] priv - users privilege [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 77 .then((users) => { 78 $scope.localUsers = users; 79 $scope.tableData = users.map(mapTableData); 83 toastService.error('Failed to load users.'); 161 * API call to delete users 162 * @param {*} users : Array of users to delete 164 function deleteUsers(users = []) { argument 167 users.map((user) => APIUtils.deleteUser(user.UserName)); 171 if (users.length > 1) { 172 message = 'Users have been removed.' [all …]
|
H A D | user-accounts-modal-remove.html | 1 <div class="uib-modal__content modal__local-users-remove"> 11 …<p ng-if="modalCtrl.users.length > 1">Are you sure you want to remove {{modalCtrl.users.length}} u… 12 …<p ng-if="modalCtrl.users.length === 1">Are you sure you want to remove user '{{modalCtrl.users[0]…
|
/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmi.robot | 15 # users User Name password 19 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 289 [Setup] Run Keywords Delete BMC Users Using Redfish 290 ... AND Create Users With Different Roles users=${USERS} force=${True} 291 [Template] Config VMI Static IP Address Using Different Users 292 [Teardown] Delete BMC Users Using Redfish 302 [Setup] Create Users With Different Roles users=${USERS} force=${True} 303 [Template] Config VMI Static IP Address Using Different Users 304 [Teardown] Delete BMC Users Using Redfish 313 [Setup] Create Users With Different Roles users=${USERS} force=${True} [all …]
|
H A D | test_vmicert_management.robot | 21 # users User Name password 27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 51 Get Root Certificate Using Different Privilege Users Role 52 [Documentation] Get root certificate using different users. 149 Get Concurrent Root Certificate Requests From Multiple Admin Users 164 Get Concurrent CSR Requests From Multiple Admin Users 179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users 195 Get Concurrent Root Certificate Request From Operator Users 196 …[Documentation] Get multiple concurrent root certificate from non admin users and verify no error… 211 Get Concurrent Root Certificate Request From Admin And Non Admin Users [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
H A D | vsftpd.conf | 17 # Uncomment this to allow local users to log in. 23 # Default umask for local users is 077. You may wish to change this to 022, 24 # if your users expect that (022 is used by most other ftpd's) 36 # Activate directory messages - messages given to remote users when they 96 # You may specify an explicit list of local users to chroot() to their home 98 # users to NOT chroot(). 104 # default to avoid remote users being able to cause excessive I/O on large 113 # setting to NO, then users will be denied login unless they are explicitly 129 # If set to YES, local users will be (by default) placed in a chroot() jail in 131 # implications, especially if the users have upload permission, or shell access. [all …]
|
H A D | vsftpd.user_list | 2 # If userlist_deny=NO, only allow users in this file 3 # If userlist_deny=YES (default), never allow users in this file, and 6 # for users that are denied.
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/ |
H A D | usermode_1.114.bb | 3 programs to be run with superuser privileges by ordinary users, and several \ 4 graphical tools for users: \ 5 * userinfo allows users to change their finger information. \ 6 * usermount lets users mount, unmount, and format filesystems. \ 7 * userpasswd allows users to change their passwords. \
|
/openbmc/phosphor-webui/app/access-control/styles/ |
H A D | user-accounts.scss | 1 .local-users { 11 .modal__local-users, 12 .modal__local-users-settings { 19 .modal__local-users {
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | TORQUE-1.1 | 4 …users, questions should be emailed to the community of TORQUE users at torqueusers@supercluster.or… 9 …v2.5 software (the "Software") at your site or location, and, for certain users, redistribution of… 25 …pro duct_service=All&category=Free%20Software%20Downloads&order_by=title. Users of TORQUE should c…
|
/openbmc/phosphor-user-manager/test/ |
H A D | ldap_config_test.cpp | 135 "ldap://9.194.251.136/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F() 140 manager.createConfig("ldap://9.194.251.137/", "cn=Users", in TEST_F() 141 "cn=Users,dc=test", "MyLdap123", in TEST_F() 157 EXPECT_EQ(manager.getADConfigPtr()->ldapBindDN(), "cn=Users,dc=com"); in TEST_F() 158 EXPECT_EQ(manager.getADConfigPtr()->ldapBaseDN(), "cn=Users,dc=corp"); in TEST_F() 254 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F() 269 EXPECT_EQ(managerPtr->getADConfigPtr()->ldapBindDN(), "cn=Users,dc=com"); in TEST_F() 270 EXPECT_EQ(managerPtr->getADConfigPtr()->ldapBaseDN(), "cn=Users,dc=corp"); in TEST_F() 304 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F() 353 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F() [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
H A D | sudo.inc | 1 SUMMARY = "Provide limited super user privileges to specific users" 2 …do (superuser do) allows a system administrator to give certain users (or groups of users) the abi… 42 # the directory is accessible by all users. Otherwise the mkinstalldirs 45 # we want (i.e, users would not be able to access /var/lib).
|
/openbmc/sdbusplus/example/ |
H A D | list-users.cpp | 8 * users in the system and displays their username. 23 auto users = reply.unpack<return_type>(); in main() local 25 for (auto& user : users) in main()
|
/openbmc/openbmc/poky/bitbake/bin/ |
H A D | bitbake-hashserv | 44 @read" to only give anonymous users read access, or "--anon-perms @none" to 45 give un-authenticated users no access at all. 48 this would allow anonymous users to manage all users accounts, which is a bad 65 users, deleting users, resetting login tokens, and assigning 116 help='Permissions to give anonymous users (default $HASHSERVER_ANON_PERMS, "%(default)s")',
|
/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | sqlalchemy.py | 76 class Users(Base): class 77 __tablename__ = "users" 505 Users.username, 506 Users.permissions, 507 Users.token, 509 Users.username == username, 526 update(Users) 528 Users.username == username, 539 update(Users) 540 .where(Users.username == username) [all …]
|
/openbmc/qemu/docs/system/ |
H A D | target-rx.rst | 22 https://osdn.net/users/ysato/pf/qemu/dl/u-boot.bin.gz 28 https://osdn.net/users/ysato/pf/qemu/dl/zImage 31 https://osdn.net/users/ysato/pf/qemu/dl/rx-virt.dtb
|
/openbmc/openbmc-test-automation/redfish/update_service/ |
H A D | test_redfish_bmc_code_update.robot | 39 &{USERS} Administrator=${ADMIN} 135 [Setup] Create Users With Different Roles users=${USERS} force=${True} 136 [Teardown] Run Keywords Redfish.Login AND Delete BMC Users Via Redfish users=${USERS} 155 [Setup] Create Users With Different Roles users=${USERS} force=${True} 156 [Teardown] Run Keywords Redfish.Login AND Delete BMC Users Via Redfish users=${USERS}
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 110 [Teardown] Delete Users Via Redfish @{username} 120 [Documentation] Create users with different access privilege 131 [Teardown] Delete Users Via Redfish my_admin_user 152 Delete Users Via GUI ${username}[0] 155 Verify Error While Creating Users With Same Name 158 [Teardown] Delete Users Via Redfish ${username} 174 [Teardown] Delete Users Via Redfish ${username} 212 [Teardown] Delete Users Via Redfish ${username} 254 [Teardown] Delete Users Via Redfish ${username} 365 Delete Users Via Redfish [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/samba/samba/ |
H A D | smb.conf | 132 # This allows Unix users to be created on the domain controller via the SAMR 161 # Setup usershare options to enable non-root users to share folders 167 # Allow users who've been granted usershare privileges to create 194 valid users = %S 205 # users profiles (see the "logon path" option above) 207 # The path below should be writable by all users so that their 210 ; comment = Users profiles 236 # admin users are members of. 238 # to the drivers directory for these users to have write rights in it
|
/openbmc/qemu/scripts/performance/ |
H A D | topN_perf.py | 75 unprivileged users (without CAP_SYS_ADMIN). 77 -1: Allow use of (almost) all events by all users 79 0: Disallow ftrace function tracepoint by users without CAP_SYS_ADMIN 80 Disallow raw tracepoint access by users without CAP_SYS_ADMIN 81 1: Disallow CPU event access by users without CAP_SYS_ADMIN 82 2: Disallow kernel profiling by users without CAP_SYS_ADMIN
|
/openbmc/qemu/backends/ |
H A D | trace-events | 11 iommufd_backend_connect(int fd, bool owned, uint32_t users) "fd=%d owned=%d users=%d" 12 iommufd_backend_disconnect(int fd, uint32_t users) "fd=%d users=%d"
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | custom-template-configuration-directory.rst | 7 use by other users, you might want to provide a custom build configuration 27 To use those saved templates as a starting point for a build, users should point 48 users usage information about the build they're setting up 51 available to the users, and provide useful summaries and detailed usage notes.
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/ |
H A D | 0010-oprofile-Determine-the-root-home-directory-dynamical.patch | 28 …ename>/root</filename> to avoid storing sample data files in locations accessible by regular users. 30 …ename>~root</filename> to avoid storing sample data files in locations accessible by regular users. 41 …filename">/root</code> to avoid storing sample data files in locations accessible by regular users. 43 …filename">~root</code> to avoid storing sample data files in locations accessible by regular users.
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_redfish_utils.robot | 333 Create Users With Different Roles 334 [Documentation] Create users with different roles. 335 [Arguments] ${users} ${force}=${False} 338 # users Dictionary of roles and user credentials to be created. 342 FOR ${role} IN @{users} 343 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force} 347 Delete BMC Users Via Redfish 348 [Documentation] Delete BMC users via redfish. 349 [Arguments] ${users} 352 # users Dictionary of roles and user credentials to be deleted. [all …]
|