/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_local_user.robot | 33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 34 Redfishtool Verify User "UserT100" "ReadOnly" 42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 61 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 72 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 86 Redfishtool Create User "UserT101" "TestPwd123" "ReadOnly" true "UserT100" "TestPwd123" 89 Verify Redfishtool ReadOnly User Privilege 90 [Documentation] Verify Redfishtool ReadOnly user privilege works. 94 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true [all …]
|
H A D | Redfish_Service_Validator.robot | 43 readonly_user 0penBmc123 ReadOnly ${True}
|
/openbmc/bmcweb/redfish-core/include/generated/enums/ |
H A D | attribute_registry.hpp | 38 ReadOnly, enumerator 59 ReadOnly, enumerator 104 {MapFromProperty::ReadOnly, "ReadOnly"}, 125 {MapToProperty::ReadOnly, "ReadOnly"},
|
/openbmc/phosphor-pid-control/notimpl/ |
H A D | readonly.hpp | 10 class ReadOnly : public WriteInterface class 13 ReadOnly() : WriteInterface(0, 0) {} in ReadOnly() function in pid_control::ReadOnly
|
H A D | readonly.cpp | 24 void ReadOnly::write([[maybe_unused]] double value) in write()
|
/openbmc/pldm/libpldmresponder/test/ |
H A D | libpldmresponder_bios_attribute_test.cpp | 48 "attribute_name" : "ReadOnly", in TEST() 59 "attribute_nam":"ReadOnly" in TEST()
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ldap_configuration.robot | 217 ReadOnly 227 ReadOnly 240 ${GROUP_NAME} ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 243 Invalid_LDAP_Group_Name ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 447 # Verify LDAP user with ReadOnly privilege not able to do host poweroff. 448 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} 465 # Verify LDAP user with ReadOnly privilege not able to do host poweron. 466 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} 484 # Verify LDAP user with ReadOnly privilege is forbidden to configure IP address. 485 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} [all …]
|
H A D | test_redfish_privilege_registry.robot | 103 # | ReadOnly | Login, ConfigureSelf. 164 Verify ReadOnly User Privileges Via Redfish 165 [Documentation] Verify ReadOnly user privileges via Redfish. 206 Redfish Create User ${readonly_user} ${readonly_password} ReadOnly ${true} 211 Redfish Verify User ${readonly_user} ${readonly_password} ReadOnly
|
H A D | test_user_account.robot | 65 ... Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 73 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True} 100 readonly_user TestPwd123 ReadOnly ${True} 127 readonly_user TestPwd123 ReadOnly ${True} 12 154 readonly_user TestPwd123 ReadOnly ${True} 181 readonly_user TestPwd123 ReadOnly ${False} 206 ... UserName=test_user Password=TestPwd123 RoleId=ReadOnly Enabled=${True} 219 Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 342 Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 352 Redfish Verify User readonly_user NewTestPwd123 ReadOnly ${True} [all …]
|
/openbmc/estoraged/src/erase/ |
H A D | sanitize.cpp | 126 stdplus::fd::OpenAccess::ReadOnly); in doIoctl() 136 stdplus::fd::OpenAccess::ReadOnly); in doIoctlMulti()
|
/openbmc/estoraged/src/test/erase/ |
H A D | pattern_test.cpp | 45 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST() 70 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST() 94 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST()
|
/openbmc/u-boot/arch/x86/include/asm/arch-quark/acpi/ |
H A D | lpc.asl | 32 Memory32Fixed(ReadOnly, 0xff000000, 0x01000000) 82 Memory32Fixed(ReadOnly, HPET_BASE_ADDRESS, HPET_BASE_SIZE)
|
/openbmc/google-misc/subprojects/dhcp-done/ |
H A D | file-io.cpp | 27 stdplus::fd::OpenAccess::ReadOnly); in fileRead()
|
/openbmc/estoraged/include/ |
H A D | zero.hpp | 54 stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in verifyZero()
|
H A D | pattern.hpp | 50 stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in verifyPattern()
|
/openbmc/u-boot/arch/x86/include/asm/arch-baytrail/acpi/ |
H A D | lpc.asl | 54 Memory32Fixed(ReadOnly, 0xff000000, 0x01000000) 104 Memory32Fixed(ReadOnly, HPET_BASE_ADDRESS, HPET_BASE_SIZE)
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bios_attr_utils.robot | 42 # BIOS attribute with _current are ReadOnly can not be updated. 44 Log To Console BIOS attribute with _current are ReadOnly can not be updated !!
|
/openbmc/linux/arch/mips/include/asm/fw/arc/ |
H A D | hinv.h | 88 ReadOnly = 2, enumerator
|
/openbmc/google-ipmi-sys/ |
H A D | bios_setting.cpp | 46 stdplus::fd::OpenFlags(stdplus::fd::OpenAccess::ReadOnly)); in readBiosSettingFromFile()
|
/openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
H A D | test_vmicert_management.robot | 24 @{ReadOnly} readonly_user TestPwd123 variable 27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 44 # Send CSR request from ReadOnly user. 63 # Request root certificate from ReadOnly user. 84 # Send CSR request from ReadOnly user. 102 # Send CSR request from ReadOnly user. 123 # Request root certificate from ReadOnly user. 142 # Request root certificate from ReadOnly user.
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_ldap_sub_menu.robot | 169 ${GROUP_NAME} ReadOnly ${HTTP_OK} 286 # (e.g. "Administrator", "Operator" or "ReadOnly"). 358 # group_privilege The group privilege ("Administrator", "Operator" or "ReadOnly").
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 39 Valid Value privilege ['ReadOnly'] 143 ${payload}= Create Dictionary RoleId=ReadOnly
|
/openbmc/estoraged/src/ |
H A D | util.cpp | 34 fd = stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in findSizeOfBlockDevice()
|
/openbmc/phosphor-webui/ |
H A D | README.md | 16 date phosphor-webui will move to ReadOnly
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/psqlodbc/files/ |
H A D | psqlodbc-fix-for-ptest-support.patch | 64 ReadOnly = No
|