| /openbmc/phosphor-user-manager/ |
| H A D | users.cpp | 70 Users::Users(sdbusplus::bus_t& bus, const char* path, in Users() function in phosphor::user::Users 82 Users::~Users() in ~Users() 90 void Users::delete_(void) in delete_() 99 std::string Users::userPrivilege(std::string value) in userPrivilege() 109 void Users::setUserPrivilege(const std::string& value) in setUserPrivilege() 114 void Users::setUserGroups(const std::vector<std::string>& groups) in setUserGroups() 122 std::string Users::userPrivilege(void) const in userPrivilege() 131 std::vector<std::string> Users::userGroups(std::vector<std::string> value) in userGroups() 145 std::vector<std::string> Users::userGroups(void) const in userGroups() 153 bool Users::userEnabled(void) const in userEnabled() [all …]
|
| H A D | users.hpp | 49 class Users : public Interfaces class 52 Users() = delete; 53 ~Users(); 54 Users(const Users&) = delete; 55 Users& operator=(const Users&) = delete; 56 Users(Users&&) = delete; 57 Users& operator=(Users&&) = delete; 68 Users(sdbusplus::bus_t& bus, const char* path,
|
| /openbmc/openbmc/poky/bitbake/lib/hashserv/ |
| H A D | sqlalchemy.py | 76 class Users(Base): class 505 Users.username, 506 Users.permissions, 507 Users.token, 509 Users.username == username, 526 update(Users) 528 Users.username == username, 539 update(Users) 540 .where(Users.username == username) 549 Users.username, [all …]
|
| /openbmc/openbmc/meta-google/recipes-google/default-users/ |
| H A D | default-users.bb | 1 SUMMARY = "Add default Users" 2 DESCRIPTION = "Add Users"
|
| /openbmc/openbmc-test-automation/openpower/ext_interfaces/ |
| H A D | test_vmi.robot | 289 [Setup] Run Keywords Delete BMC Users Using Redfish 290 ... AND Create Users With Different Roles users=${USERS} force=${True} 291 [Template] Config VMI Static IP Address Using Different Users 292 [Teardown] Delete BMC Users Using Redfish 302 [Setup] Create Users With Different Roles users=${USERS} force=${True} 303 [Template] Config VMI Static IP Address Using Different Users 304 [Teardown] Delete BMC Users Using Redfish 313 [Setup] Create Users With Different Roles users=${USERS} force=${True} 314 [Template] Delete VMI Static IP Address Using Different Users 315 [Teardown] Delete BMC Users Using Redfish [all …]
|
| H A D | test_vmicert_management.robot | 51 Get Root Certificate Using Different Privilege Users Role 149 Get Concurrent Root Certificate Requests From Multiple Admin Users 164 Get Concurrent CSR Requests From Multiple Admin Users 179 Get Concurrent Corrupted CSR Requests From Multiple Admin Users 195 Get Concurrent Root Certificate Request From Operator Users 211 Get Concurrent Root Certificate Request From Admin And Non Admin Users 227 Get Concurrent Root Certificate Request From Different Non Admin Users 242 Get Concurrent CSR Request From Operator Users 352 Send Concurrent CSR Request From Admin And Non Admin Users And Verify 368 Send Concurrent CSR Request From Non Admin Users And Verify [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
| H A D | vsftpd.ftpusers | 1 # Users that are not allowed to login via ftp
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 110 [Teardown] Delete Users Via Redfish @{username} 131 [Teardown] Delete Users Via Redfish my_admin_user 153 Delete Users Via GUI ${username}[0] 156 Verify Error While Creating Users With Same Name 159 [Teardown] Delete Users Via Redfish ${username} 175 [Teardown] Delete Users Via Redfish ${username} 213 [Teardown] Delete Users Via Redfish ${username} 255 [Teardown] Delete Users Via Redfish ${username} 366 Delete Users Via Redfish 379 Delete Users Via GUI
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/images/ |
| H A D | obmc-phosphor-image-base.bb | 7 # Users should instead rely on /etc/os-release.
|
| /openbmc/openbmc/poky/meta/files/common-licenses/ |
| H A D | softSurfer | 6 Users of this code must verify correctness for their application.
|
| H A D | Lucida-Bitmap-Fonts | 9 materials on this tape. Users and possessors of this source code 21 tape. Users are granted a royalty-free, nonexclusive license to use
|
| H A D | Rdisc | 1 … all tape media and as a part of the software program in whole or part. Users may copy or modify…
|
| H A D | TORQUE-1.1 | 4 …emailed to the community of TORQUE users at torqueusers@supercluster.org. Users can also subscribe… 25 …pro duct_service=All&category=Free%20Software%20Downloads&order_by=title. Users of TORQUE should c…
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 28 Verify Redfishtool Create Users 37 Verify Redfishtool Modify Users 47 Verify Redfishtool Delete Users 57 Verify Redfishtool Login With Deleted Redfish Users 67 Verify Redfishtool Error Upon Creating Same Users With Different Privileges
|
| /openbmc/libpldm/ |
| H A D | CHANGELOG.md | 144 - `crc32()`: Users must switch to `pldm_edac_crc32()` 145 - `crc8()`: Users must switch to `pldm_edac_crc8()` 197 Users of `crc32()` should move to `pldm_edac_crc32()` 201 Users of `crc8()` should move to `pldm_edac_crc8()` 389 Users should switch to `decode_oem_meta_file_io_write_req()`. Modify this 400 allocation (and hence the copy) has failed. Users should migrate to 569 Users should move to `decode_get_pdr_repository_info_resp_safe()` which 575 Users should move to `decode_get_pdr_resp_safe()` which reduces the invocation 689 Users should migrate to the newer "transport" APIs instead. 862 pldm_bios_table_append_pad_checksum() is deprecated by this change. Users of [all …]
|
| /openbmc/openbmc/poky/meta/recipes-bsp/barebox/ |
| H A D | barebox.bb | 4 Users should feel right at home with a shell with UNIX-like virtual file system access to hardware,…
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_redfish_privilege_registry.robot | 10 Suite Setup Create And Verify Various Privilege Users 11 Suite Teardown Delete Created Redfish Users Except Default Admin 202 Create And Verify Various Privilege Users 234 Delete Created Redfish Users Except Default Admin
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/images/ |
| H A D | firmware-deploy-image.bb | 13 # Users of this recipe are expected to provide the list of firmware images
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 50 | 1 | ssh | Users in this group are only allowed to login through SSH. | 51 | 2 | ipmi | Users in this group are only allowed to use IPMI Interface. | 52 | 3 | redfish | Users in this group are only allowed to use REDFISH Interface. | 53 | 4 | web | Users in this group are only allowed to use webserver Interface. | 54 | 5 | hostconsole | Users in this group are only allowed to interact with host console. | 68 …1 | admin | Users are allowed to configure all OpenBMC (including user-management, netwo… 69 | 2 | operator | Users are allowed to view and control basic operations. This includes … 70 | 3 | user | Users only have read access and can't change any behavior of the syste… 71 | 4 | no-access | Users having empty or no privilege will be reported as no-access, from…
|
| /openbmc/openbmc/poky/meta/classes-recipe/ |
| H A D | ptest-python-pytest.bbclass | 19 # Users can override this behavior by simply including a
|
| /openbmc/openbmc/meta-phosphor/recipes-phosphor/skeleton/ |
| H A D | obmc-libobmc-intf_git.bb | 27 # Users of libopenbmc_intf use custom makefiles that do not
|
| /openbmc/openbmc/meta-openembedded/meta-multimedia/licenses/ |
| H A D | Sun | 2 for unrestricted use. Users may copy or modify this source code without
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/optee-os/ |
| H A D | 0001-compile.mk-use-CFLAGS-from-environment.patch | 6 Users can set CFLAGS just like AFLAGS, CC,
|
| /openbmc/u-boot/board/xilinx/ |
| H A D | Kconfig | 18 them describes only one specific configuration. Users of a
|
| /openbmc/u-boot/doc/device-tree-bindings/cpu/ |
| H A D | nios2.txt | 6 Users can use sopc2dts tool for generating device tree sources (dts) from a
|