Home
last modified time | relevance | path

Searched refs:role (Results 1 – 25 of 171) sorted by relevance

1234567

/openbmc/openbmc/meta-openembedded/meta-oe/classes/
H A Dsigning.bbclass23 # Recipes access the available keys via a specific role. So, depending on
24 # whether we're building during development or for release, a given role can
26 # Each key recipe PROVIDES a virtual package corresponding to the role, allowing
27 # the user to select one of multiple keys for a role when needed.
62 def export(role, k, v):
63 k = k % (role, )
70 for role in roles:
71 if not set(role).issubset("abcdefghijklmnopqrstuvwxyz0123456789_"):
72 bb.fatal("key role name '%s' must consist of only [a-z0-9_]" % (role,))
74 pkcs11_uri = d.getVarFlag("SIGNING_PKCS11_URI", role) or d.getVar("SIGNING_PKCS11_URI")
[all …]
/openbmc/qemu/docs/sphinx/
H A Dcompat.py120 role = env.get_domain(domain).roles[rolename]
121 assert isinstance(role, XRefRole)
128 assert not role.lowercase
129 assert not role.fix_parens
138 "refwarn": role.warn_dangling,
140 refnode = role.nodeclass(target, **options)
141 title, target = role.process_link(env, refnode, False, target, target)
144 refnode += role.innernodeclass(target, title, classes=classes)
156 result_nodes, _messages = role.result_nodes(
/openbmc/qemu/scripts/
H A Dget_maintainer.pl923 my $role = "unknown";
932 $role = $pvalue;
937 $role = lc($role);
938 if ($role eq "supported") {
939 $role = "supporter";
940 } elsif ($role eq "maintained") {
941 $role = "maintainer";
942 } elsif ($role eq "odd fixes") {
943 $role = "odd fixer";
944 } elsif ($role eq "orphan") {
[all …]
/openbmc/bmcweb/redfish-core/lib/
H A Droles.hpp45 std::string_view role) in getAssignedPrivFromRole() argument
48 if (role == "Administrator") in getAssignedPrivFromRole()
56 else if (role == "Operator") in getAssignedPrivFromRole()
62 else if (role == "ReadOnly") in getAssignedPrivFromRole()
146 std::string role = getRoleFromPrivileges(priv); in requestRoutesRoleCollection() local
147 if (!role.empty()) in requestRoutesRoleCollection()
152 role); in requestRoutesRoleCollection()
/openbmc/u-boot/scripts/
H A Dget_maintainer.pl1210 my $role = "unknown";
1219 $role = $pvalue;
1224 $role = lc($role);
1225 if ($role eq "supported") {
1226 $role = "supporter";
1227 } elsif ($role eq "maintained") {
1228 $role = "maintainer";
1229 } elsif ($role eq "odd fixes") {
1230 $role = "odd fixer";
1231 } elsif ($role eq "orphan") {
[all …]
/openbmc/webui-vue/src/views/SecurityAndAccess/Ldap/
H A DModalAddRoleGroup.vue3 id="modal-role-group"
13 <b-form id="role-group" @submit.prevent="handleSubmit">
14 <!-- Edit role group -->
22 <!-- Add new role group -->
26 label-for="role-group-name"
29 id="role-group-name"
34 <b-form-invalid-feedback role="alert">
57 <b-form-invalid-feedback role="alert">
69 <b-button form="role-group" type="submit" variant="primary" @click="onOk">
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js122 function createUser(username, password, role, enabled) { argument
124 APIUtils.createUser(username, password, role, enabled)
142 originalUsername, username, password, role, enabled, locked) { argument
146 originalUsername, username, password, role, enabled, locked)
371 const role = form.privilege.$pristine ?
384 originalUsername, username, password, role, enabled,
388 username, password, role, form.accountStatus.$modelValue);
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A DRedfish_Service_Validator.robot43 #username password role enabled
51 [Arguments] ${username} ${password} ${role} ${enabled}
57 # role The role of the user to be created
63 Redfish Create User ${username} ${password} ${role} ${enabled}
H A Dtest_redfishtool_local_user.robot115 [Documentation] Verify error while creating a user with invalid role using Redfishtool.
176 # roleId The role of user (e.g. "Administrator", "Operator", etc.).
193 [Documentation] Update user role.
199 # newRole The new role of user (e.g. "Administrator", "Operator", etc.).
230 [Documentation] Verify role of the user.
231 [Arguments] ${user_name} ${role}
235 # role The new role of user (e.g. "Administrator", "Operator", etc.).
239 Should Be Equal "${json_obj["RoleId"]}" ${role}
/openbmc/u-boot/drivers/ddr/marvell/a38x/
H A Dddr3_training_db.c513 u8 role; in pattern_table_get_killer_word() local
516 role = (i == dqs) ? in pattern_table_get_killer_word()
519 byte |= pattern_killer_pattern_table_map[index][role] << i; in pattern_table_get_killer_word()
528 u8 role; in pattern_table_get_killer_word16() local
531 role = (i == dqs) ? in pattern_table_get_killer_word16()
534 byte0 |= pattern_killer_pattern_table_map[index * 2][role] << i; in pattern_table_get_killer_word16()
535 byte1 |= pattern_killer_pattern_table_map[index * 2 + 1][role] << i; in pattern_table_get_killer_word16()
/openbmc/u-boot/drivers/usb/musb-new/
H A DKconfig11 Enables the MUSB USB dual-role controller in host mode.
19 Enables the MUSB USB dual-role controller in gadget mode.
26 Say y here to enable support for the dual role high
/openbmc/webui-vue/tests/unit/Global/__snapshots__/
H A DSearch.spec.js.snap10 role="group"
22 role="group"
/openbmc/webui-vue/src/views/SecurityAndAccess/Certificates/
H A DModalGenerateCsr.vue38 <b-form-invalid-feedback role="alert">
62 <b-form-invalid-feedback role="alert">
81 <b-form-invalid-feedback role="alert">
98 <b-form-invalid-feedback role="alert">
117 <b-form-invalid-feedback role="alert">
134 <b-form-invalid-feedback role="alert">
153 <b-form-invalid-feedback role="alert">
257 <b-form-invalid-feedback role="alert">
284 <b-form-invalid-feedback role="alert">
308 <b-form-invalid-feedback role="alert">
/openbmc/qemu/
H A Dblock.c1364 static void bdrv_inherited_options(BdrvChildRole role, bool parent_is_format, in bdrv_inherited_options() argument
1385 (role & BDRV_CHILD_DATA) && in bdrv_inherited_options()
1386 !(role & (BDRV_CHILD_METADATA | BDRV_CHILD_FILTERED))) in bdrv_inherited_options()
1396 if ((parent_is_format && !(role & BDRV_CHILD_COW)) || in bdrv_inherited_options()
1397 (role & BDRV_CHILD_METADATA)) in bdrv_inherited_options()
1410 if (role & BDRV_CHILD_COW) { in bdrv_inherited_options()
1431 if (role & BDRV_CHILD_METADATA) { in bdrv_inherited_options()
1434 if (role & BDRV_CHILD_COW) { in bdrv_inherited_options()
1447 if (bs->drv->is_filter || (child->role & BDRV_CHILD_FILTERED)) { in bdrv_child_cb_attach()
1457 assert(!(child->role & BDRV_CHILD_COW)); in bdrv_child_cb_attach()
[all …]
/openbmc/docs/designs/
H A Dredfish-authorization.md33 authenticated Redfish role are sufficient to complete the operation in the
104 To map Redfish role to their assigned Redfish privileges, BMCWeb implements the
143 proper Redfish role and is authorized to access certain resources without
175 - It rejects deletion of OEM Redfish privileges if any OEM Redfish role is
210 representing that a user is a specific Redfish role. BMCWeb then uses a
211 hardcoded table to map Redfish role to Redfish privileges.
214 well with OEM Redfish Roles where a Redfish role maps to a dynamic set of OEM
230 role. OEM redfish roles will get prefix "openbmc-orfr-". "orfr" refers to OEM
231 Redfish role. For example, the base Redfish role "Administrator" will result in
242 **Username to Redfish Role Mapping** Mapping a username to Redfish role becomes
[all …]
/openbmc/qemu/tests/unit/
H A Dtest-bdrv-graph-mod.c35 BdrvChildRole role, in no_perm_default_perms() argument
51 BdrvChildRole role, in exclusive_write_perms() argument
281 BdrvChildRole role, in write_to_selected_perms() argument
/openbmc/webui-vue/src/views/Settings/Network/
H A DModalIpv4.vue22 <b-form-invalid-feedback role="alert">
44 <b-form-invalid-feedback role="alert">
68 <b-form-invalid-feedback role="alert">
/openbmc/phosphor-webui/app/common/directives/
H A Dldap-user-roles.js72 $scope.editGroupFn = (group, role, index) => {
76 $scope.newGroup.LocalRole = role;
/openbmc/openbmc-test-automation/lib/
H A Dbmc_redfish_utils.robot337 # role_id The role ID of the user to be created.
368 # user_name User name to get it's role.
385 FOR ${role} IN @{users}
386 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force}
397 FOR ${role} IN @{users}
398 Redfish.Delete /redfish/v1/AccountService/Accounts/${users['${role}'][0]}
/openbmc/qemu/scripts/qapi/
H A Dschema.py848 role = 'member' variable in QAPISchemaMember
883 role = self.role
894 assert role == 'member'
895 role = 'parameter'
900 role = 'base ' + role
907 return "%s '%s' of %s '%s'" % (role, self.name, meta, defined_in)
908 return "%s '%s'" % (role, self.name)
912 role = 'value' variable in QAPISchemaEnumMember
934 role = 'feature' variable in QAPISchemaFeature
980 role = 'branch' variable in QAPISchemaVariant
[all …]
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/librole/
H A Dlibrole-tiny-perl_2.002004.bb2 DESCRIPTION = "\"Role::Tiny\" is a minimalist role composition tool."
/openbmc/docs/architecture/
H A Duser-management.md24 or if the user created doesn't have an 'ipmi' group role.
452 into LDAP groups. D-Bus API is provided for the user to assign privilege role to
458 by the webserver interface. The privilege role is a property of the user D-Bus
459 object for the local users. For the LDAP user accounts, the privilege role will
460 be based on the LDAP group. The LDAP group to privilege role mapping needs to be
466 fetch the privilege role from the D-Bus object and update the session
469 4. Fetch the privilege role corresponding to the group name, update the session
470 information with the privilege role.
471 5. If there is no mapping for group name to privilege role, default to `user`
472 privilege role for the session.
[all …]
/openbmc/phosphor-webui/app/access-control/styles/
H A Duser-accounts.scss32 .role-table {
/openbmc/u-boot/doc/
H A DREADME.ARM-memory-map8 >_armboot_end - which role do these play now? Can we get rid of them?
/openbmc/webui-vue/src/components/Global/
H A DTableDateFilter.vue18 <b-form-invalid-feedback role="alert">
46 <b-form-invalid-feedback role="alert">

1234567