Home
last modified time | relevance | path

Searched refs:Users (Results 1 – 25 of 134) sorted by relevance

123456

/openbmc/phosphor-user-manager/
H A Dusers.cpp70 Users::Users(sdbusplus::bus_t& bus, const char* path, in Users() function in phosphor::user::Users
82 Users::~Users() in ~Users()
90 void Users::delete_(void) in delete_()
99 std::string Users::userPrivilege(std::string value) in userPrivilege()
109 void Users::setUserPrivilege(const std::string& value) in setUserPrivilege()
114 void Users::setUserGroups(const std::vector<std::string>& groups) in setUserGroups()
122 std::string Users::userPrivilege(void) const in userPrivilege()
131 std::vector<std::string> Users::userGroups(std::vector<std::string> value) in userGroups()
145 std::vector<std::string> Users::userGroups(void) const in userGroups()
153 bool Users::userEnabled(void) const in userEnabled()
[all …]
H A Dusers.hpp49 class Users : public Interfaces class
52 Users() = delete;
53 ~Users();
54 Users(const Users&) = delete;
55 Users& operator=(const Users&) = delete;
56 Users(Users&&) = delete;
57 Users& operator=(Users&&) = delete;
68 Users(sdbusplus::bus_t& bus, const char* path,
/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dsqlalchemy.py76 class Users(Base): class
505 Users.username,
506 Users.permissions,
507 Users.token,
509 Users.username == username,
526 update(Users)
528 Users.username == username,
539 update(Users)
540 .where(Users.username == username)
549 Users.username,
[all …]
/openbmc/openbmc/meta-google/recipes-google/default-users/
H A Ddefault-users.bb1 SUMMARY = "Add default Users"
2 DESCRIPTION = "Add Users"
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmi.robot289 [Setup] Run Keywords Delete BMC Users Using Redfish
290 ... AND Create Users With Different Roles users=${USERS} force=${True}
291 [Template] Config VMI Static IP Address Using Different Users
292 [Teardown] Delete BMC Users Using Redfish
302 [Setup] Create Users With Different Roles users=${USERS} force=${True}
303 [Template] Config VMI Static IP Address Using Different Users
304 [Teardown] Delete BMC Users Using Redfish
313 [Setup] Create Users With Different Roles users=${USERS} force=${True}
314 [Template] Delete VMI Static IP Address Using Different Users
315 [Teardown] Delete BMC Users Using Redfish
[all …]
H A Dtest_vmicert_management.robot51 Get Root Certificate Using Different Privilege Users Role
149 Get Concurrent Root Certificate Requests From Multiple Admin Users
164 Get Concurrent CSR Requests From Multiple Admin Users
179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users
195 Get Concurrent Root Certificate Request From Operator Users
211 Get Concurrent Root Certificate Request From Admin And Non Admin Users
227 Get Concurrent Root Certificate Request From Different Non Admin Users
242 Get Concurrent CSR Request From Operator Users
352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify
368 Send Concurrent CSR Request From Non Admin Users And Verify
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.ftpusers1 # Users that are not allowed to login via ftp
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot110 [Teardown] Delete Users Via Redfish @{username}
131 [Teardown] Delete Users Via Redfish my_admin_user
153 Delete Users Via GUI ${username}[0]
156 Verify Error While Creating Users With Same Name
159 [Teardown] Delete Users Via Redfish ${username}
175 [Teardown] Delete Users Via Redfish ${username}
213 [Teardown] Delete Users Via Redfish ${username}
255 [Teardown] Delete Users Via Redfish ${username}
366 Delete Users Via Redfish
379 Delete Users Via GUI
/openbmc/openbmc/meta-phosphor/recipes-phosphor/images/
H A Dobmc-phosphor-image-base.bb7 # Users should instead rely on /etc/os-release.
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DsoftSurfer6 Users of this code must verify correctness for their application.
H A DLucida-Bitmap-Fonts9 materials on this tape. Users and possessors of this source code
21 tape. Users are granted a royalty-free, nonexclusive license to use
H A DRdisc1 … all tape media and as a part of the software program in whole or part. Users may copy or modify…
H A DTORQUE-1.14 …emailed to the community of TORQUE users at torqueusers@supercluster.org. Users can also subscribe…
25 …pro duct_service=All&category=Free%20Software%20Downloads&order_by=title. Users of TORQUE should c…
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot28 Verify Redfishtool Create Users
37 Verify Redfishtool Modify Users
47 Verify Redfishtool Delete Users
57 Verify Redfishtool Login With Deleted Redfish Users
67 Verify Redfishtool Error Upon Creating Same Users With Different Privileges
/openbmc/libpldm/
H A DCHANGELOG.md144 - `crc32()`: Users must switch to `pldm_edac_crc32()`
145 - `crc8()`: Users must switch to `pldm_edac_crc8()`
197 Users of `crc32()` should move to `pldm_edac_crc32()`
201 Users of `crc8()` should move to `pldm_edac_crc8()`
389 Users should switch to `decode_oem_meta_file_io_write_req()`. Modify this
400 allocation (and hence the copy) has failed. Users should migrate to
569 Users should move to `decode_get_pdr_repository_info_resp_safe()` which
575 Users should move to `decode_get_pdr_resp_safe()` which reduces the invocation
689 Users should migrate to the newer "transport" APIs instead.
862 pldm_bios_table_append_pad_checksum() is deprecated by this change. Users of
[all …]
/openbmc/openbmc/poky/meta/recipes-bsp/barebox/
H A Dbarebox.bb4 Users should feel right at home with a shell with UNIX-like virtual file system access to hardware,…
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_redfish_privilege_registry.robot10 Suite Setup Create And Verify Various Privilege Users
11 Suite Teardown Delete Created Redfish Users Except Default Admin
202 Create And Verify Various Privilege Users
234 Delete Created Redfish Users Except Default Admin
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/images/
H A Dfirmware-deploy-image.bb13 # Users of this recipe are expected to provide the list of firmware images
/openbmc/docs/architecture/
H A Duser-management.md50 | 1 | ssh | Users in this group are only allowed to login through SSH. |
51 | 2 | ipmi | Users in this group are only allowed to use IPMI Interface. |
52 | 3 | redfish | Users in this group are only allowed to use REDFISH Interface. |
53 | 4 | web | Users in this group are only allowed to use webserver Interface. |
54 | 5 | hostconsole | Users in this group are only allowed to interact with host console. |
68 …1 | admin | Users are allowed to configure all OpenBMC (including user-management, netwo…
69 | 2 | operator | Users are allowed to view and control basic operations. This includes …
70 | 3 | user | Users only have read access and can't change any behavior of the syste…
71 | 4 | no-access | Users having empty or no privilege will be reported as no-access, from…
/openbmc/openbmc/poky/meta/classes-recipe/
H A Dptest-python-pytest.bbclass19 # Users can override this behavior by simply including a
/openbmc/openbmc/meta-phosphor/recipes-phosphor/skeleton/
H A Dobmc-libobmc-intf_git.bb27 # Users of libopenbmc_intf use custom makefiles that do not
/openbmc/openbmc/meta-openembedded/meta-multimedia/licenses/
H A DSun2 for unrestricted use. Users may copy or modify this source code without
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/optee-os/
H A D0001-compile.mk-use-CFLAGS-from-environment.patch6 Users can set CFLAGS just like AFLAGS, CC,
/openbmc/u-boot/board/xilinx/
H A DKconfig18 them describes only one specific configuration. Users of a
/openbmc/u-boot/doc/device-tree-bindings/cpu/
H A Dnios2.txt6 Users can use sopc2dts tool for generating device tree sources (dts) from a

123456