| /openbmc/bmcweb/redfish-core/include/generated/enums/ |
| H A D | attribute_registry.hpp | 38 ReadOnly, enumerator 59 ReadOnly, enumerator 104 {MapFromProperty::ReadOnly, "ReadOnly"}, 125 {MapToProperty::ReadOnly, "ReadOnly"},
|
| /openbmc/phosphor-pid-control/notimpl/ |
| H A D | readonly.hpp | 10 class ReadOnly : public WriteInterface class 13 ReadOnly() : WriteInterface(0, 0) {} in ReadOnly() function in pid_control::ReadOnly
|
| H A D | readonly.cpp | 11 void ReadOnly::write([[maybe_unused]] double value) in write()
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 34 Redfishtool Verify User "UserT100" "ReadOnly" 42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 61 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 72 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 86 Redfishtool Create User "UserT101" "TestPwd123" "ReadOnly" true "UserT100" "TestPwd123" 89 Verify Redfishtool ReadOnly User Privilege 90 [Documentation] Verify Redfishtool ReadOnly user privilege works. 94 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true [all …]
|
| H A D | Redfish_Service_Validator.robot | 45 readonly_user 0penBmc123 ReadOnly ${True}
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_user_account.robot | 32 Verify Redfish Admin And ReadOnly Users Persistence After Reboot 37 ... AND Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 47 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True} 89 readonly_user TestPwd123 ReadOnly ${True} 119 readonly_user TestPwd123 ReadOnly ${True} 12 146 readonly_user TestPwd123 ReadOnly ${True} 173 readonly_user TestPwd123 ReadOnly ${False} 198 ... UserName=test_user Password=TestPwd123 RoleId=ReadOnly Enabled=${True} 211 Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 341 Redfish Create User readonly_user TestPwd123 ReadOnly ${True} [all …]
|
| H A D | test_ldap_configuration.robot | 217 ReadOnly 227 ReadOnly 240 ${GROUP_NAME} ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 243 Invalid_LDAP_Group_Name ReadOnly [${HTTP_UNAUTHORIZED}, ${HTTP_FORBIDDEN}] 447 # Verify LDAP user with ReadOnly privilege not able to do host poweroff. 448 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} 465 # Verify LDAP user with ReadOnly privilege not able to do host poweron. 466 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} 484 # Verify LDAP user with ReadOnly privilege is forbidden to configure IP address. 485 ${LDAP_TYPE} ReadOnly ${GROUP_NAME} ${HTTP_FORBIDDEN} [all …]
|
| H A D | test_redfish_privilege_registry.robot | 105 # | ReadOnly | Login, ConfigureSelf. 166 Verify ReadOnly User Privileges Via Redfish 167 [Documentation] Verify ReadOnly user privileges via Redfish. 208 Redfish Create User ${readonly_user} ${readonly_password} ReadOnly ${true} 213 Redfish Verify User ${readonly_user} ${readonly_password} ReadOnly
|
| /openbmc/pldm/libpldmresponder/test/ |
| H A D | libpldmresponder_bios_attribute_test.cpp | 48 "attribute_name" : "ReadOnly", in TEST() 59 "attribute_nam":"ReadOnly" in TEST()
|
| /openbmc/estoraged/src/erase/ |
| H A D | sanitize.cpp | 126 stdplus::fd::OpenAccess::ReadOnly); in doIoctl() 136 stdplus::fd::OpenAccess::ReadOnly); in doIoctlMulti()
|
| /openbmc/google-misc/subprojects/dhcp-done/ |
| H A D | file-io.cpp | 27 stdplus::fd::OpenAccess::ReadOnly); in fileRead()
|
| /openbmc/u-boot/arch/x86/include/asm/arch-quark/acpi/ |
| H A D | lpc.asl | 32 Memory32Fixed(ReadOnly, 0xff000000, 0x01000000) 82 Memory32Fixed(ReadOnly, HPET_BASE_ADDRESS, HPET_BASE_SIZE)
|
| /openbmc/estoraged/include/ |
| H A D | zero.hpp | 54 stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in verifyZero()
|
| H A D | pattern.hpp | 50 stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in verifyPattern()
|
| /openbmc/estoraged/src/test/erase/ |
| H A D | pattern_test.cpp | 45 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST() 70 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST() 94 stdplus::fd::open(testFileName, stdplus::fd::OpenAccess::ReadOnly); in TEST()
|
| /openbmc/u-boot/arch/x86/include/asm/arch-baytrail/acpi/ |
| H A D | lpc.asl | 54 Memory32Fixed(ReadOnly, 0xff000000, 0x01000000) 104 Memory32Fixed(ReadOnly, HPET_BASE_ADDRESS, HPET_BASE_SIZE)
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | bios_attr_utils.robot | 42 # BIOS attribute with _current are ReadOnly can not be updated. 44 Log To Console BIOS attribute with _current are ReadOnly can not be updated !!
|
| /openbmc/google-ipmi-sys/ |
| H A D | bios_setting.cpp | 46 stdplus::fd::OpenFlags(stdplus::fd::OpenAccess::ReadOnly)); in readBiosSettingFromFile()
|
| /openbmc/openbmc-test-automation/redfish/managers/ |
| H A D | test_bmc_protocol_settings.robot | 20 @{ReadOnly} readonly_user ${OPENBMC_PASSWORD} variable 21 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 273 Verify Port 22 SSH Access Restricted For Admin And ReadOnly Users
|
| /openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
| H A D | test_vmicert_management.robot | 24 @{ReadOnly} readonly_user TestPwd123 variable 27 &{USERS} Administrator=${ADMIN} ReadOnly=${ReadOnly} 44 # Send CSR request from ReadOnly user. 63 # Request root certificate from ReadOnly user. 84 # Send CSR request from ReadOnly user. 102 # Send CSR request from ReadOnly user. 123 # Request root certificate from ReadOnly user. 142 # Request root certificate from ReadOnly user.
|
| /openbmc/estoraged/src/ |
| H A D | util.cpp | 34 fd = stdplus::fd::open(devPath, stdplus::fd::OpenAccess::ReadOnly); in findSizeOfBlockDevice()
|
| /openbmc/phosphor-webui/ |
| H A D | README.md | 16 date phosphor-webui will move to ReadOnly
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_ldap_sub_menu.robot | 171 ${GROUP_NAME} ReadOnly ${HTTP_OK} 292 # (e.g. "Administrator", "Operator" or "ReadOnly"). 365 # group_privilege The group privilege ("Administrator", "Operator" or "ReadOnly").
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 37 Valid Value privilege ['ReadOnly'] 141 ${payload}= Create Dictionary RoleId=ReadOnly
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/psqlodbc/files/ |
| H A D | psqlodbc-fix-for-ptest-support.patch | 64 ReadOnly = No
|