| /openbmc/openbmc/poky/bitbake/doc/ |
| H A D | releases.rst | 11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>` 17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>` 23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>` 33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>` 39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>` 45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>` 51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>` 57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>` 63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>` 69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>` [all …]
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/ |
| H A D | meson.build | 13 sdbusplus_current_path = 'xyz/openbmc_project/User' 16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(), 18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml', 32 'xyz/openbmc_project/User/AccountPolicy', 40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(), 42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml', 56 'xyz/openbmc_project/User/Attributes', 64 'xyz/openbmc_project/User/Common__markdown'.underscorify(), 65 input: ['../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'], 78 'xyz/openbmc_project/User/Common', [all …]
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 31 [Teardown] Redfishtool Delete User "UserT100" 33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 34 Redfishtool Verify User "UserT100" "ReadOnly" 40 [Teardown] Redfishtool Delete User "UserT100" 42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 43 Redfishtool Update User Role "UserT100" "Administrator" 44 Redfishtool Verify User "UserT100" "Administrator" 51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 52 Redfishtool Delete User "UserT100" 53 ${status}= Redfishtool Verify User Name Exists "UserT100" [all …]
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_user.robot | 34 # User defined count. 39 Verify IPMI User Summary 44 ... Delete Created User ${random_userid} 46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count 48 ${random_userid} ${random_username}= Create Random IPMI User 53 Enable IPMI User And Verify ${random_userid} 56 ${current_user_count} ${maximum_ids}= Get Enabled User Count 64 Verify IPMI User List 68 ... Delete Created User ${random_userid} 70 ${random_userid} ${random_username}= Create Random IPMI User [all …]
|
| H A D | test_ipmi_payload.robot | 92 Verify Set User Access Payload For Standard Payload SOL 95 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 96 ... AND Delete Created User ${userid} 99 ${userid} ${username}= Create And Verify IPMI User 104 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 107 Set User Access Payload For Given User ${user_id_in_hex} Disable 112 Verify Set User Access Payload For Operator Privileged User 115 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail 117 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator 126 Verify Set User Access Payload For Invalid User [all …]
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/ |
| H A D | meson.build | 5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap' 8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(), 10 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml', 24 'xyz/openbmc_project/User/Ldap/Config', 32 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(), 34 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml', 48 'xyz/openbmc_project/User/Ldap/Create',
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
| H A D | README.md | 1 # User Management 5 User Manager service exposes D-Bus methods for user management operations. 7 ### User Manager Interface 9 User manager interface `xyz.openbmc_project.User.Manager` provides following 12 #### xyz.openbmc_project.User.Manager interface 28 #### xyz.openbmc_project.User.AccountPolicy interface 42 User manager daemon, will create user objects for every user existing in the 44 object can be handled through 'org.freedesktop.DBus.ObjectManager'. User object 47 #### xyz.openbmc_project.User.Attributes interface 53 - UserEnabled - User enabled state.
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_user_account.robot | 36 ... Redfish Create User admin_user TestPwd123 Administrator ${True} 37 ... AND Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 46 Redfish Verify User admin_user TestPwd123 Administrator ${True} 47 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True} 50 Verify Redfish Operator User Persistence After Reboot 54 ... Redfish Create User operator_user TestPwd123 Operator ${True} 62 Redfish Verify User operator_user TestPwd123 Operator ${True} 65 Redfish Create and Verify Admin User 68 [Template] Redfish Create And Verify User 74 Redfish Create and Verify Operator User [all …]
|
| H A D | test_ipmi_redfish_user.robot | 25 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$ 29 Create Admin Redfish User And Verify Login Via IPMI 48 Update User Password Via Redfish And Verify Using IPMI 73 Update User Privilege Via Redfish And Verify Using IPMI 108 Delete User Via Redfish And Verify Using IPMI 130 Create IPMI User And Verify Login Via Redfish 134 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 146 Update User Password Via IPMI And Verify Using Redfish 151 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 167 Update User Privilege To Operator Via IPMI And Verify Using Redfish [all …]
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 1 # User Management - OpenBMC - Design document 18 4. User creation has to be generic in nature wherever possible. 25 6. User name, Password, Group and Privilege roles are maintained by the common 28 words, with the exception of User Name, Password, Group and Privileged Role, 59 groups (i.e. User will have same privilege for REDFISH / Webserver / IPMI / SSH 60 / HostConsole). User can belong to any one of the following privilege roles at 73 ## Common User Manager - D-Bus API (phosphor-user-manager) 75 User Manager service exposes D-Bus methods for user-management operations. It 76 exposes `xyz.openbmc_project.User.Manager` as a service and handles objects 78 <https://github.com/openbmc/phosphor-dbus-interfaces/tree/master/yaml/xyz/openbmc_project/User> [all …]
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Common/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Common' 6 'xyz/openbmc_project/User/Common__cpp'.underscorify(), 7 input: ['../../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'], 20 'xyz/openbmc_project/User/Common',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/AccountPolicy/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/AccountPolicy' 6 'xyz/openbmc_project/User/AccountPolicy__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml', 28 'xyz/openbmc_project/User/AccountPolicy',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/MultiFactorAuthConfiguration/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/MultiFactorAuthConfiguration' 6 'xyz/openbmc_project/User/MultiFactorAuthConfiguration__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/MultiFactorAuthConfiguration.interface.yaml', 28 'xyz/openbmc_project/User/MultiFactorAuthConfiguration',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPAuthenticator/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPAuthenticator' 6 'xyz/openbmc_project/User/TOTPAuthenticator__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/TOTPAuthenticator.interface.yaml', 28 'xyz/openbmc_project/User/TOTPAuthenticator',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Manager/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Manager' 6 'xyz/openbmc_project/User/Manager__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/Manager.interface.yaml', 28 'xyz/openbmc_project/User/Manager',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapperEntry/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapperEntry' 6 'xyz/openbmc_project/User/PrivilegeMapperEntry__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapperEntry.interface.yaml', 28 'xyz/openbmc_project/User/PrivilegeMapperEntry',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapper/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapper' 6 'xyz/openbmc_project/User/PrivilegeMapper__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapper.interface.yaml', 28 'xyz/openbmc_project/User/PrivilegeMapper',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPState/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPState' 6 'xyz/openbmc_project/User/TOTPState__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/TOTPState.interface.yaml', 28 'xyz/openbmc_project/User/TOTPState',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Attributes/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Attributes' 6 'xyz/openbmc_project/User/Attributes__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml', 28 'xyz/openbmc_project/User/Attributes',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/Create/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap/Create' 6 'xyz/openbmc_project/User/Ldap/Create__cpp'.underscorify(), 8 '../../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml', 28 'xyz/openbmc_project/User/Ldap/Create',
|
| /openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/Config/ |
| H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap/Config' 6 'xyz/openbmc_project/User/Ldap/Config__cpp'.underscorify(), 8 '../../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml', 28 'xyz/openbmc_project/User/Ldap/Config',
|
| /openbmc/openbmc-test-automation/security/ |
| H A D | test_bmc_expire_password.robot | 51 Expire And Change Root User Password And Access Via SSH 55 ... Restore Default Password For Root User AND FFDC On Test Case Fail 72 ... Restore Default Password For Root User AND FFDC On Test Case Fail 83 Expire And Change Root User Password Via Redfish And Verify 88 ... Restore Default Password For Root User 92 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 102 Verify Error While Creating User With Expired Password 106 ... Restore Default Password For Root User AND FFDC On Test Case Fail 110 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 123 ... AND Restore Default Password For Root User AND FFDC On Test Case Fail [all …]
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access". 16 ${xpath_user_management_heading} //h1[text()="User management"] 45 Verify Navigation To User Management Page 52 Verify Existence Of All Sections In User Management Page 59 Verify Existence Of All Input Boxes In User Management Page 66 Verify Existence Of All Buttons In User Management Page 76 Verify Existence Of All Button And Fields In Add User 107 Verify User Access Privilege 111 [Template] Create User And Verify 119 Verify Operator User Privilege [all …]
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 23 Create IPMI User Without Any Privilege And Verify Via Redfish 40 Create Admin User Via Redfish And Verify Login Via IPMI 56 Enable IPMI Access To User Using Redfish ${random_username} 65 Delete User Via Redfish And Verify Using IPMI 79 Enable IPMI Access To User Using Redfish ${random_username} 93 Update User Password Via Redfish And Verify Using IPMI 107 Enable IPMI Access To User Using Redfish ${random_username} 120 Update User Privilege Via Redfish And Verify Using IPMI 134 Enable IPMI Access To User Using Redfish ${random_username} 163 Create IPMI Random User With Password And Privilege [all …]
|
| /openbmc/openbmc-test-automation/lib/pdu/ |
| H A D | schneider.robot | 26 Telnet.Read Until User Name : 48 # Location : Unknown User : Super User 59 # Super User : Enabled RADIUS : Disabled 60 # Administrator : Disabled Device User : Disabled 61 # Read-Only User : Disabled Network-Only User : Disabled
|