Home
last modified time | relevance | path

Searched full:users (Results 1 – 25 of 975) sorted by relevance

12345678910>>...39

/openbmc/phosphor-user-manager/
H A Dusers.cpp19 #include "users.hpp"
65 * @param[in] groups - users group list
70 Users::Users(sdbusplus::bus_t& bus, const char* path, in Users() function in phosphor::user::Users
82 Users::~Users() in ~Users()
90 void Users::delete_(void) in delete_()
99 std::string Users::userPrivilege(std::string value) in userPrivilege()
109 void Users::setUserPrivilege(const std::string& value) in setUserPrivilege()
114 void Users::setUserGroups(const std::vector<std::string>& groups) in setUserGroups()
122 std::string Users::userPrivilege(void) const in userPrivilege()
131 std::vector<std::string> Users::userGroups(std::vector<std::string> value) in userGroups()
[all …]
H A Dusers.hpp46 /** @class Users
49 class Users : public Interfaces class
52 Users() = delete;
53 ~Users();
54 Users(const Users&) = delete;
55 Users& operator=(const Users&) = delete;
56 Users(Users&&) = delete;
57 Users& operator=(Users&&) = delete;
63 * @param[in] groups - users group list
64 * @param[in] priv - users privilege
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js77 .then((users) => {
78 $scope.localUsers = users;
79 $scope.tableData = users.map(mapTableData);
83 toastService.error('Failed to load users.');
161 * API call to delete users
162 * @param {*} users : Array of users to delete
164 function deleteUsers(users = []) { argument
167 users.map((user) => APIUtils.deleteUser(user.UserName));
171 if (users.length > 1) {
172 message = 'Users have been removed.'
[all …]
H A Duser-accounts-modal-remove.html1 <div class="uib-modal__content modal__local-users-remove">
11 …<p ng-if="modalCtrl.users.length > 1">Are you sure you want to remove {{modalCtrl.users.length}} u…
12 …<p ng-if="modalCtrl.users.length === 1">Are you sure you want to remove user '{{modalCtrl.users[0]…
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmi.robot15 # users User Name password
19 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly}
289 [Setup] Run Keywords Delete BMC Users Using Redfish
290 ... AND Create Users With Different Roles users=${USERS} force=${True}
291 [Template] Config VMI Static IP Address Using Different Users
292 [Teardown] Delete BMC Users Using Redfish
302 [Setup] Create Users With Different Roles users=${USERS} force=${True}
303 [Template] Config VMI Static IP Address Using Different Users
304 [Teardown] Delete BMC Users Using Redfish
313 [Setup] Create Users With Different Roles users=${USERS} force=${True}
[all …]
H A Dtest_vmicert_management.robot21 # users User Name password
27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly}
51 Get Root Certificate Using Different Privilege Users Role
52 [Documentation] Get root certificate using different users.
149 Get Concurrent Root Certificate Requests From Multiple Admin Users
164 Get Concurrent CSR Requests From Multiple Admin Users
179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users
195 Get Concurrent Root Certificate Request From Operator Users
196 …[Documentation] Get multiple concurrent root certificate from non admin users and verify no error…
211 Get Concurrent Root Certificate Request From Admin And Non Admin Users
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.conf17 # Uncomment this to allow local users to log in.
23 # Default umask for local users is 077. You may wish to change this to 022,
24 # if your users expect that (022 is used by most other ftpd's)
36 # Activate directory messages - messages given to remote users when they
96 # You may specify an explicit list of local users to chroot() to their home
98 # users to NOT chroot().
104 # default to avoid remote users being able to cause excessive I/O on large
113 # setting to NO, then users will be denied login unless they are explicitly
129 # If set to YES, local users will be (by default) placed in a chroot() jail in
131 # implications, especially if the users have upload permission, or shell access.
[all …]
H A Dvsftpd.user_list2 # If userlist_deny=NO, only allow users in this file
3 # If userlist_deny=YES (default), never allow users in this file, and
6 # for users that are denied.
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/
H A Dusermode_1.114.bb3 programs to be run with superuser privileges by ordinary users, and several \
4 graphical tools for users: \
5 * userinfo allows users to change their finger information. \
6 * usermount lets users mount, unmount, and format filesystems. \
7 * userpasswd allows users to change their passwords. \
/openbmc/phosphor-webui/app/access-control/styles/
H A Duser-accounts.scss1 .local-users {
11 .modal__local-users,
12 .modal__local-users-settings {
19 .modal__local-users {
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DTORQUE-1.14users, questions should be emailed to the community of TORQUE users at torqueusers@supercluster.or…
9 …v2.5 software (the "Software") at your site or location, and, for certain users, redistribution of…
25 …pro duct_service=All&category=Free%20Software%20Downloads&order_by=title. Users of TORQUE should c…
/openbmc/phosphor-user-manager/test/
H A Dldap_config_test.cpp135 "ldap://9.194.251.136/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F()
140 manager.createConfig("ldap://9.194.251.137/", "cn=Users", in TEST_F()
141 "cn=Users,dc=test", "MyLdap123", in TEST_F()
157 EXPECT_EQ(manager.getADConfigPtr()->ldapBindDN(), "cn=Users,dc=com"); in TEST_F()
158 EXPECT_EQ(manager.getADConfigPtr()->ldapBaseDN(), "cn=Users,dc=corp"); in TEST_F()
254 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F()
269 EXPECT_EQ(managerPtr->getADConfigPtr()->ldapBindDN(), "cn=Users,dc=com"); in TEST_F()
270 EXPECT_EQ(managerPtr->getADConfigPtr()->ldapBaseDN(), "cn=Users,dc=corp"); in TEST_F()
304 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F()
353 "ldap://9.194.251.138/", "cn=Users,dc=com", "cn=Users,dc=corp", in TEST_F()
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/sudo/
H A Dsudo.inc1 SUMMARY = "Provide limited super user privileges to specific users"
2 …do (superuser do) allows a system administrator to give certain users (or groups of users) the abi…
42 # the directory is accessible by all users. Otherwise the mkinstalldirs
45 # we want (i.e, users would not be able to access /var/lib).
/openbmc/sdbusplus/example/
H A Dlist-users.cpp8 * users in the system and displays their username.
23 auto users = reply.unpack<return_type>(); in main() local
25 for (auto& user : users) in main()
/openbmc/openbmc/poky/bitbake/bin/
H A Dbitbake-hashserv44 @read" to only give anonymous users read access, or "--anon-perms @none" to
45 give un-authenticated users no access at all.
48 this would allow anonymous users to manage all users accounts, which is a bad
65 users, deleting users, resetting login tokens, and assigning
116 help='Permissions to give anonymous users (default $HASHSERVER_ANON_PERMS, "%(default)s")',
/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dsqlalchemy.py76 class Users(Base): class
77 __tablename__ = "users"
505 Users.username,
506 Users.permissions,
507 Users.token,
509 Users.username == username,
526 update(Users)
528 Users.username == username,
539 update(Users)
540 .where(Users.username == username)
[all …]
/openbmc/qemu/docs/system/
H A Dtarget-rx.rst22 https://osdn.net/users/ysato/pf/qemu/dl/u-boot.bin.gz
28 https://osdn.net/users/ysato/pf/qemu/dl/zImage
31 https://osdn.net/users/ysato/pf/qemu/dl/rx-virt.dtb
/openbmc/openbmc-test-automation/redfish/update_service/
H A Dtest_redfish_bmc_code_update.robot39 &{USERS} Administrator=${ADMIN}
135 [Setup] Create Users With Different Roles users=${USERS} force=${True}
136 [Teardown] Run Keywords Redfish.Login AND Delete BMC Users Via Redfish users=${USERS}
155 [Setup] Create Users With Different Roles users=${USERS} force=${True}
156 [Teardown] Run Keywords Redfish.Login AND Delete BMC Users Via Redfish users=${USERS}
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot110 [Teardown] Delete Users Via Redfish @{username}
120 [Documentation] Create users with different access privilege
131 [Teardown] Delete Users Via Redfish my_admin_user
152 Delete Users Via GUI ${username}[0]
155 Verify Error While Creating Users With Same Name
158 [Teardown] Delete Users Via Redfish ${username}
174 [Teardown] Delete Users Via Redfish ${username}
212 [Teardown] Delete Users Via Redfish ${username}
254 [Teardown] Delete Users Via Redfish ${username}
365 Delete Users Via Redfish
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/samba/samba/
H A Dsmb.conf132 # This allows Unix users to be created on the domain controller via the SAMR
161 # Setup usershare options to enable non-root users to share folders
167 # Allow users who've been granted usershare privileges to create
194 valid users = %S
205 # users profiles (see the "logon path" option above)
207 # The path below should be writable by all users so that their
210 ; comment = Users profiles
236 # admin users are members of.
238 # to the drivers directory for these users to have write rights in it
/openbmc/qemu/scripts/performance/
H A DtopN_perf.py75 unprivileged users (without CAP_SYS_ADMIN).
77 -1: Allow use of (almost) all events by all users
79 0: Disallow ftrace function tracepoint by users without CAP_SYS_ADMIN
80 Disallow raw tracepoint access by users without CAP_SYS_ADMIN
81 1: Disallow CPU event access by users without CAP_SYS_ADMIN
82 2: Disallow kernel profiling by users without CAP_SYS_ADMIN
/openbmc/qemu/backends/
H A Dtrace-events11 iommufd_backend_connect(int fd, bool owned, uint32_t users) "fd=%d owned=%d users=%d"
12 iommufd_backend_disconnect(int fd, uint32_t users) "fd=%d users=%d"
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dcustom-template-configuration-directory.rst7 use by other users, you might want to provide a custom build configuration
27 To use those saved templates as a starting point for a build, users should point
48 users usage information about the build they're setting up
51 available to the users, and provide useful summaries and detailed usage notes.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/
H A D0010-oprofile-Determine-the-root-home-directory-dynamical.patch28 …ename>/root</filename> to avoid storing sample data files in locations accessible by regular users.
30 …ename>~root</filename> to avoid storing sample data files in locations accessible by regular users.
41 …filename">/root</code> to avoid storing sample data files in locations accessible by regular users.
43 …filename">~root</code> to avoid storing sample data files in locations accessible by regular users.
/openbmc/openbmc-test-automation/lib/
H A Dbmc_redfish_utils.robot333 Create Users With Different Roles
334 [Documentation] Create users with different roles.
335 [Arguments] ${users} ${force}=${False}
338 # users Dictionary of roles and user credentials to be created.
342 FOR ${role} IN @{users}
343 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force}
347 Delete BMC Users Via Redfish
348 [Documentation] Delete BMC users via redfish.
349 [Arguments] ${users}
352 # users Dictionary of roles and user credentials to be deleted.
[all …]

12345678910>>...39