| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_redfish_privilege_registry.robot | 104 # | Operator | Login, ConfigureComponents, ConfigureSelf. 134 ... UserName=${post_user} Password=${post_password} RoleId=Operator Enabled=${true} 145 Verify Operator User Privileges Via Redfish 146 [Documentation] Verify Operator user privileges via Redfish. 152 ... UserName=${post_user} Password=${post_password} RoleId=Operator Enabled=${true} 173 ... UserName=${post_user} Password=${post_password} RoleId=Operator Enabled=${true} 205 Redfish Create User ${test_user} ${test_password} Operator ${true} 207 Redfish Create User ${operator_user} ${operator_password} Operator ${true} 210 Redfish Verify User ${test_user} ${test_password} Operator 212 Redfish Verify User ${operator_user} ${operator_password} Operator [all …]
|
| H A D | test_user_account.robot | 50 Verify Redfish Operator User Persistence After Reboot 54 ... Redfish Create User operator_user TestPwd123 Operator ${True} 62 Redfish Verify User operator_user TestPwd123 Operator ${True} 74 Redfish Create and Verify Operator User 80 operator_user TestPwd123 Operator ${True} 102 Verify Redfish Operator User Login With Wrong Password 109 operator_user TestPwd123 Operator ${True} 12j8a8uakjhdaosiruf024 131 Verify Login with Deleted Redfish Operator User 137 operator_user TestPwd123 Operator ${True} 158 Verify Operator User Creation Without Enabling It [all …]
|
| H A D | test_ldap_configuration.robot | 162 Verify LDAP User With Operator Privilege Able To Do Host Poweroff 169 ... Operator ${GROUP_NAME} 239 ${GROUP_NAME} Operator [${HTTP_OK}, ${HTTP_NO_CONTENT}] 242 Invalid_LDAP_Group_Name Operator [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 408 ... ${LDAP_TYPE} Operator ${GROUP_NAME} 450 # Verify LDAP user with Operator privilege able to do host poweroff. 451 ${LDAP_TYPE} Operator ${GROUP_NAME} ${HTTP_OK} 468 # Verify LDAP user with Operator privilege able to do host poweron. 469 ${LDAP_TYPE} Operator ${GROUP_NAME} ${HTTP_OK} 487 # Verify LDAP user with Operator privilege is able to configure IP address. [all …]
|
| H A D | test_ipmi_redfish_user.robot | 88 ${payload}= Create Dictionary RoleId=Operator 167 Update User Privilege To Operator Via IPMI And Verify Using Redfish 181 Should Be Equal ${privilege} Operator
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 98 ... "UserT101" "TestPwd123" "Operator" true "UserT100" "TestPwd123" ${HTTP_FORBIDDEN} 101 Verify Redfishtool Operator User Privilege 111 ... "UserT101" "TestPwd123" "Operator" true "UserT100" "TestPwd123" ${HTTP_FORBIDDEN} 176 # roleId The role of user (e.g. "Administrator", "Operator", etc.). 199 # newRole The new role of user (e.g. "Administrator", "Operator", etc.). 235 # role The new role of user (e.g. "Administrator", "Operator", etc.).
|
| H A D | Redfish_Service_Validator.robot | 44 operator_user 0penBmc123 Operator ${True} 58 # (e.g. "Administrator", "Operator", etc.).
|
| /openbmc/intel-ipmi-oem/src/ |
| H A D | smbiosmdrv2handler.cpp | 1276 ipmi::Privilege::Operator, mdr2AgentStatus); in register_netfn_smbiosmdrv2_functions() 1281 ipmi::Privilege::Operator, mdr2GetDir); in register_netfn_smbiosmdrv2_functions() 1286 ipmi::Privilege::Operator, mdr2SendDir); in register_netfn_smbiosmdrv2_functions() 1291 ipmi::Privilege::Operator, mdr2GetDataInfo); in register_netfn_smbiosmdrv2_functions() 1296 ipmi::Privilege::Operator, mdr2DataInfoOffer); in register_netfn_smbiosmdrv2_functions() 1301 ipmi::Privilege::Operator, mdr2SendDataInfo); in register_netfn_smbiosmdrv2_functions() 1306 ipmi::Privilege::Operator, mdr2GetDataBlock); in register_netfn_smbiosmdrv2_functions() 1311 ipmi::Privilege::Operator, mdr2SendDataBlock); in register_netfn_smbiosmdrv2_functions() 1316 ipmi::Privilege::Operator, mdr2LockData); in register_netfn_smbiosmdrv2_functions() 1321 ipmi::Privilege::Operator, mdr2UnlockData); in register_netfn_smbiosmdrv2_functions() [all …]
|
| H A D | sensorcommands.cpp | 193 ipmi::Privilege::Operator, ipmiSenPlatformEvent); in registerSensorFunctions()
|
| H A D | storagecommands.cpp | 1249 ipmi::Privilege::Operator, ipmiStorageWriteFruData); in registerStorageFunctions() 1264 ipmi::Privilege::Operator, ipmiStorageAddSELEntry); in registerStorageFunctions() 1268 ipmi::storage::cmdClearSel, ipmi::Privilege::Operator, in registerStorageFunctions() 1279 ipmi::Privilege::Operator, ipmiStorageSetSELTime); in registerStorageFunctions()
|
| /openbmc/phosphor-host-ipmid/ |
| H A D | storagehandler.cpp | 890 ipmi::Privilege::Operator, deleteSELEntry); in registerNetFnStorageFunctions() 895 ipmi::Privilege::Operator, ipmiStorageAddSEL); in registerNetFnStorageFunctions() 899 ipmi::storage::cmdClearSel, ipmi::Privilege::Operator, in registerNetFnStorageFunctions() 910 ipmi::Privilege::Operator, ipmiStorageReadFruData); in registerNetFnStorageFunctions() 946 ipmi::Privilege::Operator, ipmiStorageSetSelTime); in registerNetFnStorageFunctions()
|
| H A D | dcmihandler.cpp | 1512 ipmi::Privilege::Operator, setPowerLimit); in registerNetFnDcmiFunctions() 1517 ipmi::Privilege::Operator, applyPowerLimit); in registerNetFnDcmiFunctions() 1526 ipmi::dcmi::cmdSetAssetTag, ipmi::Privilege::Operator, in registerNetFnDcmiFunctions() 1555 ipmi::Privilege::Operator, getSensorInfo); in registerNetFnDcmiFunctions()
|
| H A D | chassishandler.cpp | 2442 ipmi::Privilege::Operator, in registerNetFnChassisFunctions() 2458 ipmi::Privilege::Operator, ipmiChassisControl); in registerNetFnChassisFunctions() 2463 ipmi::Privilege::Operator, ipmiChassisIdentify); in registerNetFnChassisFunctions() 2468 ipmi::Privilege::Operator, in registerNetFnChassisFunctions() 2479 ipmi::Privilege::Operator, in registerNetFnChassisFunctions()
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_payload.robot | 112 Verify Set User Access Payload For Operator Privileged User 117 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator 123 …. Run External IPMI Raw Command ${payload_raw_cmd} U=${userid} P=${new_user_passwd} L=Operator 297 # (e.g. 4-Administrator, 3-Operator, 2-Readonly). 299 # (e.g. "Administrator", "Operator", "ReadOnly"). 327 # (e.g. 0x04-Administrator, 0x03-Operator, 0x02-Readonly). 345 # options Additional ipmitool command options (e.g "-L=Operator","-C=3").
|
| H A D | test_ipmi_user.robot | 259 #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status 263 Test IPMI Operator Privilege Level 271 #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status 282 #Privilege level User Cmd Status Operator Cmd Status Admin Cmd Status 393 Verify Operator And User Privilege For Different Channels 417 Verify IPMI Command ${random_username} ${valid_password} Operator ${CHANNEL_NUMBER} 542 # operator_cmd_status Expected status of IPMI command run with the "Operator" 563 Verify IPMI Command ${random_username} ${valid_password} Operator 576 # privilege The session privilege for IPMI command (e.g. "User", "Operator", etc.).
|
| /openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
| H A D | test_vmicert_management.robot | 26 # Removing Operator, need to add it back once support is given. 195 Get Concurrent Root Certificate Request From Operator Users 242 Get Concurrent CSR Request From Operator Users 383 Get Root Certificate And Send Corrupted CSR From Admin CSR Request From Operator Concurrently 400 Get Root Certificate From Operator And Send Corrupted CSR Request And CSR Request From Admin Concur… 417 Get Root Certificate From Operator And Admin Send CSR Request From Admin Concurrently 433 Send CSR Request From Admin And Operator And Corrupted CSR From Admin Concurrently And Verify 449 Send Corrupted CSR Requests From Admin And Operator And CSR Request From Admin Concurrently And Ver… 465 Send Corrupted CSR Requests From Admin And Operator User Concurrently And Verify 541 Get Root Certificate And Send CSR Requests From Admin And Operator Concurrently And Verify [all …]
|
| H A D | test_vmi.robot | 299 Verify To Configure VMI Static IP Address With Operator User Role 322 Verify To Delete VMI Static IP Address With Operator User Role 345 Verify To Update VMI Static IP Address With Operator User Role 368 Verify To Read VMI Network Configuration With Operator User Role 391 Enable DHCP On VMI Network Via Operator User Role And Verify 392 [Documentation] Enable DHCP On VMI Network Via Operator User Role And Verify. 414 Disable DHCP On VMI Network Via Operator User Role And Verify 415 [Documentation] Disable DHCP On VMI Network Via Operator User Role And Verify.
|
| /openbmc/openbmc/poky/meta/files/common-licenses/ |
| H A D | Minpack | 21 University of Chicago, as Operator of Argonne National
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | bmc_ldap_utils.robot | 98 # group_privilege The group privilege ("Administrator", "Operator", "User" or "Callback").
|
| H A D | bmc_redfish_utils.robot | 338 # (e.g. "Administrator", "Operator", etc.). 382 …# Ex: {'Administrator': '[admin_user, TestPwd123]', 'Operator': '[operator_user, TestPwd…
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_ldap_sub_menu.robot | 170 ${GROUP_NAME} Operator ${HTTP_OK} 292 # (e.g. "Administrator", "Operator" or "ReadOnly"). 365 # group_privilege The group privilege ("Administrator", "Operator" or "ReadOnly").
|
| H A D | test_user_management_sub_menu.robot | 119 Verify Operator User Privilege 126 operator_user Operator ${True}
|
| /openbmc/openbmc-test-automation/redfish/service_root/ |
| H A D | test_sessions_management.robot | 41 Create Session And Verify Response Code Using Operator Credentials 298 Set Suite Variable &{USERS} Administrator=${ADMIN} Operator=${OPERATOR}
|
| /openbmc/fb-ipmi-oem/src/ |
| H A D | selcommands.cpp | 1761 ipmi::Privilege::Operator, ipmiStorageAddSELEntry); in registerSELFunctions() 1765 ipmi::storage::cmdClearSel, ipmi::Privilege::Operator, in registerSELFunctions() 1776 ipmi::Privilege::Operator, ipmiStorageSetSELTime); in registerSELFunctions()
|
| /openbmc/phosphor-host-ipmid/dbus-sdr/ |
| H A D | storagecommands.cpp | 1273 ipmi::Privilege::Operator, ipmiStorageWriteFruData); in registerStorageFunctions() 1288 ipmi::Privilege::Operator, ipmiStorageAddSELEntry); in registerStorageFunctions() 1292 ipmi::storage::cmdClearSel, ipmi::Privilege::Operator, in registerStorageFunctions()
|
| /openbmc/openbmc/poky/bitbake/contrib/vim/syntax/ |
| H A D | bitbake.vim | 129 hi def link bbOverrideOperator Operator
|