| /openbmc/openbmc/meta-openembedded/meta-oe/classes/ |
| H A D | signing.bbclass | 23 # Recipes access the available keys via a specific role. So, depending on 24 # whether we're building during development or for release, a given role can 26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing 27 # the user to select one of multiple keys for a role when needed. 62 def export(role, k, v): 63 k = k % (role, ) 70 for role in roles: 71 if not set(role).issubset("abcdefghijklmnopqrstuvwxyz0123456789_"): 72 bb.fatal("key role name '%s' must consist of only [a-z0-9_]" % (role,)) 74 pkcs11_uri = d.getVarFlag("SIGNING_PKCS11_URI", role) or d.getVar("SIGNING_PKCS11_URI") [all …]
|
| /openbmc/qemu/docs/sphinx/ |
| H A D | compat.py | 120 role = env.get_domain(domain).roles[rolename] 121 assert isinstance(role, XRefRole) 128 assert not role.lowercase 129 assert not role.fix_parens 138 "refwarn": role.warn_dangling, 140 refnode = role.nodeclass(target, **options) 141 title, target = role.process_link(env, refnode, False, target, target) 144 refnode += role.innernodeclass(target, title, classes=classes) 156 result_nodes, _messages = role.result_nodes(
|
| /openbmc/qemu/scripts/ |
| H A D | get_maintainer.pl | 923 my $role = "unknown"; 932 $role = $pvalue; 937 $role = lc($role); 938 if ($role eq "supported") { 939 $role = "supporter"; 940 } elsif ($role eq "maintained") { 941 $role = "maintainer"; 942 } elsif ($role eq "odd fixes") { 943 $role = "odd fixer"; 944 } elsif ($role eq "orphan") { [all …]
|
| /openbmc/bmcweb/redfish-core/lib/ |
| H A D | roles.hpp | 45 std::string_view role) in getAssignedPrivFromRole() argument 48 if (role == "Administrator") in getAssignedPrivFromRole() 56 else if (role == "Operator") in getAssignedPrivFromRole() 62 else if (role == "ReadOnly") in getAssignedPrivFromRole() 146 std::string role = getRoleFromPrivileges(priv); in requestRoutesRoleCollection() local 147 if (!role.empty()) in requestRoutesRoleCollection() 152 role); in requestRoutesRoleCollection()
|
| /openbmc/u-boot/scripts/ |
| H A D | get_maintainer.pl | 1210 my $role = "unknown"; 1219 $role = $pvalue; 1224 $role = lc($role); 1225 if ($role eq "supported") { 1226 $role = "supporter"; 1227 } elsif ($role eq "maintained") { 1228 $role = "maintainer"; 1229 } elsif ($role eq "odd fixes") { 1230 $role = "odd fixer"; 1231 } elsif ($role eq "orphan") { [all …]
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/ |
| H A D | ModalAddRoleGroup.vue | 3 id="modal-role-group" 13 <b-form id="role-group" @submit.prevent="handleSubmit"> 14 <!-- Edit role group --> 22 <!-- Add new role group --> 26 label-for="role-group-name" 29 id="role-group-name" 34 <b-form-invalid-feedback role="alert"> 57 <b-form-invalid-feedback role="alert"> 69 <b-button form="role-group" type="submit" variant="primary" @click="onOk">
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) 371 const role = form.privilege.$pristine ? 384 originalUsername, username, password, role, enabled, 388 username, password, role, form.accountStatus.$modelValue);
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | Redfish_Service_Validator.robot | 43 #username password role enabled 51 [Arguments] ${username} ${password} ${role} ${enabled} 57 # role The role of the user to be created 63 Redfish Create User ${username} ${password} ${role} ${enabled}
|
| H A D | test_redfishtool_local_user.robot | 115 [Documentation] Verify error while creating a user with invalid role using Redfishtool. 176 # roleId The role of user (e.g. "Administrator", "Operator", etc.). 193 [Documentation] Update user role. 199 # newRole The new role of user (e.g. "Administrator", "Operator", etc.). 230 [Documentation] Verify role of the user. 231 [Arguments] ${user_name} ${role} 235 # role The new role of user (e.g. "Administrator", "Operator", etc.). 239 Should Be Equal "${json_obj["RoleId"]}" ${role}
|
| /openbmc/u-boot/drivers/ddr/marvell/a38x/ |
| H A D | ddr3_training_db.c | 513 u8 role; in pattern_table_get_killer_word() local 516 role = (i == dqs) ? in pattern_table_get_killer_word() 519 byte |= pattern_killer_pattern_table_map[index][role] << i; in pattern_table_get_killer_word() 528 u8 role; in pattern_table_get_killer_word16() local 531 role = (i == dqs) ? in pattern_table_get_killer_word16() 534 byte0 |= pattern_killer_pattern_table_map[index * 2][role] << i; in pattern_table_get_killer_word16() 535 byte1 |= pattern_killer_pattern_table_map[index * 2 + 1][role] << i; in pattern_table_get_killer_word16()
|
| /openbmc/u-boot/drivers/usb/musb-new/ |
| H A D | Kconfig | 11 Enables the MUSB USB dual-role controller in host mode. 19 Enables the MUSB USB dual-role controller in gadget mode. 26 Say y here to enable support for the dual role high
|
| /openbmc/webui-vue/tests/unit/Global/__snapshots__/ |
| H A D | Search.spec.js.snap | 10 role="group" 22 role="group"
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/Certificates/ |
| H A D | ModalGenerateCsr.vue | 38 <b-form-invalid-feedback role="alert"> 62 <b-form-invalid-feedback role="alert"> 81 <b-form-invalid-feedback role="alert"> 98 <b-form-invalid-feedback role="alert"> 117 <b-form-invalid-feedback role="alert"> 134 <b-form-invalid-feedback role="alert"> 153 <b-form-invalid-feedback role="alert"> 257 <b-form-invalid-feedback role="alert"> 284 <b-form-invalid-feedback role="alert"> 308 <b-form-invalid-feedback role="alert">
|
| /openbmc/qemu/ |
| H A D | block.c | 1364 static void bdrv_inherited_options(BdrvChildRole role, bool parent_is_format, in bdrv_inherited_options() argument 1385 (role & BDRV_CHILD_DATA) && in bdrv_inherited_options() 1386 !(role & (BDRV_CHILD_METADATA | BDRV_CHILD_FILTERED))) in bdrv_inherited_options() 1396 if ((parent_is_format && !(role & BDRV_CHILD_COW)) || in bdrv_inherited_options() 1397 (role & BDRV_CHILD_METADATA)) in bdrv_inherited_options() 1410 if (role & BDRV_CHILD_COW) { in bdrv_inherited_options() 1431 if (role & BDRV_CHILD_METADATA) { in bdrv_inherited_options() 1434 if (role & BDRV_CHILD_COW) { in bdrv_inherited_options() 1447 if (bs->drv->is_filter || (child->role & BDRV_CHILD_FILTERED)) { in bdrv_child_cb_attach() 1457 assert(!(child->role & BDRV_CHILD_COW)); in bdrv_child_cb_attach() [all …]
|
| /openbmc/docs/designs/ |
| H A D | redfish-authorization.md | 33 authenticated Redfish role are sufficient to complete the operation in the 104 To map Redfish role to their assigned Redfish privileges, BMCWeb implements the 143 proper Redfish role and is authorized to access certain resources without 175 - It rejects deletion of OEM Redfish privileges if any OEM Redfish role is 210 representing that a user is a specific Redfish role. BMCWeb then uses a 211 hardcoded table to map Redfish role to Redfish privileges. 214 well with OEM Redfish Roles where a Redfish role maps to a dynamic set of OEM 230 role. OEM redfish roles will get prefix "openbmc-orfr-". "orfr" refers to OEM 231 Redfish role. For example, the base Redfish role "Administrator" will result in 242 **Username to Redfish Role Mapping** Mapping a username to Redfish role becomes [all …]
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-bdrv-graph-mod.c | 35 BdrvChildRole role, in no_perm_default_perms() argument 51 BdrvChildRole role, in exclusive_write_perms() argument 281 BdrvChildRole role, in write_to_selected_perms() argument
|
| /openbmc/webui-vue/src/views/Settings/Network/ |
| H A D | ModalIpv4.vue | 22 <b-form-invalid-feedback role="alert"> 44 <b-form-invalid-feedback role="alert"> 68 <b-form-invalid-feedback role="alert">
|
| /openbmc/phosphor-webui/app/common/directives/ |
| H A D | ldap-user-roles.js | 72 $scope.editGroupFn = (group, role, index) => { 76 $scope.newGroup.LocalRole = role;
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | bmc_redfish_utils.robot | 337 # role_id The role ID of the user to be created. 368 # user_name User name to get it's role. 385 FOR ${role} IN @{users} 386 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force} 397 FOR ${role} IN @{users} 398 Redfish.Delete /redfish/v1/AccountService/Accounts/${users['${role}'][0]}
|
| /openbmc/qemu/scripts/qapi/ |
| H A D | schema.py | 848 role = 'member' variable in QAPISchemaMember 883 role = self.role 894 assert role == 'member' 895 role = 'parameter' 900 role = 'base ' + role 907 return "%s '%s' of %s '%s'" % (role, self.name, meta, defined_in) 908 return "%s '%s'" % (role, self.name) 912 role = 'value' variable in QAPISchemaEnumMember 934 role = 'feature' variable in QAPISchemaFeature 980 role = 'branch' variable in QAPISchemaVariant [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/librole/ |
| H A D | librole-tiny-perl_2.002004.bb | 2 DESCRIPTION = "\"Role::Tiny\" is a minimalist role composition tool."
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 24 or if the user created doesn't have an 'ipmi' group role. 452 into LDAP groups. D-Bus API is provided for the user to assign privilege role to 458 by the webserver interface. The privilege role is a property of the user D-Bus 459 object for the local users. For the LDAP user accounts, the privilege role will 460 be based on the LDAP group. The LDAP group to privilege role mapping needs to be 466 fetch the privilege role from the D-Bus object and update the session 469 4. Fetch the privilege role corresponding to the group name, update the session 470 information with the privilege role. 471 5. If there is no mapping for group name to privilege role, default to `user` 472 privilege role for the session. [all …]
|
| /openbmc/phosphor-webui/app/access-control/styles/ |
| H A D | user-accounts.scss | 32 .role-table {
|
| /openbmc/u-boot/doc/ |
| H A D | README.ARM-memory-map | 8 >_armboot_end - which role do these play now? Can we get rid of them?
|
| /openbmc/webui-vue/src/components/Global/ |
| H A D | TableDateFilter.vue | 18 <b-form-invalid-feedback role="alert"> 46 <b-form-invalid-feedback role="alert">
|