| /openbmc/openbmc/poky/bitbake/doc/ |
| H A D | releases.rst | 70 - :yocto_docs:`3.1 BitBake User Manual </3.1/bitbake-user-manual/bitbake-user-manual.html>` 71 - :yocto_docs:`3.1.1 BitBake User Manual </3.1.1/bitbake-user-manual/bitbake-user-manual.html>` 72 - :yocto_docs:`3.1.2 BitBake User Manual </3.1.2/bitbake-user-manual/bitbake-user-manual.html>` 73 - :yocto_docs:`3.1.3 BitBake User Manual </3.1.3/bitbake-user-manual/bitbake-user-manual.html>` 79 - :yocto_docs:`3.0 BitBake User Manual </3.0/bitbake-user-manual/bitbake-user-manual.html>` 80 - :yocto_docs:`3.0.1 BitBake User Manual </3.0.1/bitbake-user-manual/bitbake-user-manual.html>` 81 - :yocto_docs:`3.0.2 BitBake User Manual </3.0.2/bitbake-user-manual/bitbake-user-manual.html>` 82 - :yocto_docs:`3.0.3 BitBake User Manual </3.0.3/bitbake-user-manual/bitbake-user-manual.html>` 83 - :yocto_docs:`3.0.4 BitBake User Manual </3.0.4/bitbake-user-manual/bitbake-user-manual.html>` 89 - :yocto_docs:`2.7 BitBake User Manual </2.7/bitbake-user-manual/bitbake-user-manual.html>` [all …]
|
| H A D | index.rst | 13 bitbake-user-manual/bitbake-user-manual-intro 14 bitbake-user-manual/bitbake-user-manual-execution 15 bitbake-user-manual/bitbake-user-manual-metadata 16 bitbake-user-manual/bitbake-user-manual-ref-variables-context 17 bitbake-user-manual/bitbake-user-manual-fetching 18 bitbake-user-manual/bitbake-user-manual-ref-variables 19 bitbake-user-manual/bitbake-user-manual-library-functions 20 bitbake-user-manual/bitbake-user-manual-hello
|
| /openbmc/phosphor-mboxd/vpnor/test/ |
| H A D | toc_flags.cpp | 26 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 27 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 31 assert(!(part.data.user.data[0])); in main() 32 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 36 assert(!(part.data.user.data[0])); in main() 37 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 42 assert(!(part.data.user.data[0])); in main() 43 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 47 assert(!(part.data.user.data[0])); in main() 48 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
| /openbmc/hiomapd/vpnor/test/ |
| H A D | toc_flags.cpp | 28 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 29 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 33 assert(!(part.data.user.data[0])); in main() 34 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 38 assert(!(part.data.user.data[0])); in main() 39 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 44 assert(!(part.data.user.data[0])); in main() 45 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 49 assert(!(part.data.user.data[0])); in main() 50 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 34 function checkIfRoot(user) { argument 35 return user.UserName === 'root' ? true : false; 43 function mapTableData(user) { argument 44 const accountStatus = user.Locked ? 'Locked' : 45 user.Enabled ? 'Enabled' : 50 enabled: checkIfRoot(user) ? false : true, 53 user.selectable = checkIfRoot(user) ? false : true; 54 user.actions = [editAction, deleteAction]; 55 user.uiData = [user.UserName, user.RoleId, accountStatus]; 56 return user; [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libconfuse/files/ |
| H A D | CVE-2022-40320.patch | 22 /* ~user or ~user/path */ 23 - char *user; 24 + char *user; /* ~user or ~user/path */ 31 - user = malloc(file - filename); 33 + user = malloc(len + 1); 34 if (!user) 37 - strncpy(user, filename + 1, file - filename - 1); 38 + strncpy(user, &filename[1], len); 39 + user[len] = 0; 40 passwd = getpwnam(user); [all …]
|
| /openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/ |
| H A D | authorized-keys-comp.sh | 6 while read -r user; do 7 home="$(eval echo "~$user")" || continue 11 if [[ $link != "/run/authorized_keys/$user" ]]; then 12 echo "Ignoring $user $home/.ssh/authorized_keys" >&2 19 "/usr/share/authorized_keys.d/$user" 21 "/run/authorized_keys.d/$user" 49 mv /run/authorized_keys.tmp /run/authorized_keys/"$user" 50 chown "$user" /run/authorized_keys/"$user"
|
| /openbmc/qemu/docs/system/devices/ |
| H A D | vfio-user.rst | 4 vfio-user 7 QEMU includes a ``vfio-user`` client. The ``vfio-user`` specification allows for 9 ``vhost-user`` in this respect (see :doc:`vhost-user`), but can emulate arbitrary 11 kernel, ``vfio-user``, while similar in implementation, is handled entirely in 15 setting up a ``vfio-user`` UNIX socket between QEMU and SPDK, a VM can send NVMe 18 Presuming a suitable ``vfio-user`` server has opened a socket at 19 ``/tmp/vfio-user.sock``, a device can be configured with for example: 23 -device '{"driver": "vfio-user-pci","socket": {"path": "/tmp/vfio-user.sock", "type": "unix"}}' 25 See `libvfio-user <https://github.com/nutanix/libvfio-user/>`_ for further
|
| H A D | vhost-user.rst | 3 vhost-user back ends 6 vhost-user back ends are way to service the request of VirtIO devices 10 vhost-user device 16 device that connects via a socket to the vhost-user *daemon*. 21 .. list-table:: vhost-user devices 28 * - vhost-user-blk 30 - See contrib/vhost-user-blk 31 * - vhost-user-fs 34 * - vhost-user-gpio 37 * - vhost-user-gpu [all …]
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 30 [Documentation] Create user using redfish and verify via IPMI. 42 # Delay added for created new user password to get set. 49 [Documentation] Update user password via Redfish and verify using IPMI. 52 # Create user using Redfish. 62 # Update user password using Redfish. 74 [Documentation] Update user privilege via Redfish and verify using IPMI. 77 # Create user using Redfish with admin privilege. 87 # Update user privilege to operator using Redfish. 91 # Verify new user privilege level via IPMI. [all …]
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 6 user-management components. The implementation detail is beyond the scope of 11 1. Use common user-management (e.g. phosphor-user-manager) rather than 12 application-based user-management. Especially, avoid IPMI based 13 user-management. 15 Observe this rule even while creating, modifying or authenticating the user. 16 3. Have applications use the PAM module to authenticate the user instead of 24 or if the user created doesn't have an 'ipmi' group role. 26 user-management (e.g. phosphor-user-manager), whereas individual user-related 31 restriction etc. for the corresponding user). Design is made to cover this 37 corresponding user. This is used to determine at a high level whether the user [all …]
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_user.robot | 2 Documentation Test suite for OpenBMC IPMI user management. 17 ${invalid_username} user% 40 [Documentation] Verify IPMI maximum supported IPMI user ID and 41 ... enabled user from user summary. 50 Run IPMI Standard Command user enable ${random_userid} 52 # Enable IPMI user and verify 60 # Verify maximum user count IPMI local user can have. 65 [Documentation] Verify user list via IPMI. 74 ... user set password ${random_userid} ${valid_password} 75 Run IPMI Standard Command user enable ${random_userid} [all …]
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
| H A D | README.md | 5 User Manager service exposes D-Bus methods for user management operations. 16 - CreateUser - To create new user to the system. 17 - RenameUser - To rename existing user to new name in the system. 26 - UserRenamed - Signal sent out when user is renamed in the system. 32 - MaxLoginAttemptBeforeLockout - Permissible attempt before locking out the user 38 when updating password for the user. 42 User manager daemon, will create user objects for every user existing in the 43 system under object path `/xyz/openbmc_project/user/<user name>`. Each user 51 - UserPrivilege - Privilege of the user. 52 - UserGroups - Groups to which the user belongs. [all …]
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 19 ${xpath_add_user} //button[contains(text(),'Add user')] 30 ${xpath_delete_button} //button[text()='Delete user'] 31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')] 37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')] 46 [Documentation] Verify navigation to user management page. 53 [Documentation] Verify existence of all sections in user management page. 60 [Documentation] Verify existence of all sections in user managemnet page. 67 [Documentation] Verify existence of all buttons in user management page. 77 [Documentation] Verify existence of all buttons and fields in add user page. 108 [Documentation] Create a new user with a privilege and verify that user is created. [all …]
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 24 [Documentation] Create user using IPMI without privilege and verify user privilege 28 # Create IPMI user with random id and username. 32 ... user set name ${random_userid} ${random_username} 34 # Verify new user privilege level via Redfish. 41 [Documentation] Create user via redfish and verify via IPMI. 53 # Add delay for a new admin user password to set. 58 # Update user password using Redfish. 66 [Documentation] Delete user via redfish and verify using IPMI. 69 # Create user using Redfish. [all …]
|
| /openbmc/qemu/tests/docker/dockerfiles/ |
| H A D | debian-all-test-cross.docker | 7 # to build and run linux-user tests on GitLab 72 …user,arm-linux-user,hppa-linux-user,i386-linux-user,m68k-linux-user,mips-linux-user,mips64-linux-u… 73 # As a final step configure the user (if env is defined)
|
| /openbmc/qemu/docs/interop/ |
| H A D | vhost-user.json | 14 # vhost user backend discovery & capabilities 21 # List the various vhost user backend types. 65 # List of vhost user "block" features. 80 # Capabilities reported by vhost user "block" backends 96 # List of vhost user "input" features. 111 # Capabilities reported by vhost user "input" backends 127 # List of vhost user "gpu" features. 142 # Capabilities reported by vhost user "gpu" backends. 158 # Capabilities reported by vhost user backends. 160 # @type: The vhost user backend type. [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/hashserv/ |
| H A D | tests.py | 92 def auth_client(self, user): argument 93 return self.start_client(self.auth_server_address, user["username"], user["token"]) 107 def assertUserPerms(self, user, permissions): argument 108 with self.auth_client(user) as client: 111 "username": user["username"], 115 def assertUserCanAuth(self, user): argument 117 client.auth(user["username"], user["token"]) 119 def assertUserCannotAuth(self, user): argument 121 client.auth(user["username"], user["token"]) 155 user = self.create_user(f"user-{self.client_index}", permissions) [all …]
|
| /openbmc/openbmc-tools/tof-voters/libvoters/subcmd/ |
| H A D | analyze-reviews.py | 86 user = comments_per_user[reviewer] 87 user["name"] = comment["reviewer"]["name"] 108 user["email"] = comment["reviewer"]["email"] 109 user["comments"] += 1 115 print(" ", user, review["comments"]) 116 user = changes_per_user[username] 117 user["name"] = review["name"] 118 user["email"] = review["email"] 119 user["changes"].append(id_number)
|
| H A D | report.py | 36 for user in sorted(contributions.keys()): 37 user_commits = len(commits.get(user, {}).get("changes", [])) 38 user_reviews = len(reviews.get(user, {}).get("changes", [])) 41 print(user, points, user_commits, user_reviews) 45 results[user] = { 46 "name": contributions[user]["name"], 47 "email": contributions[user]["email"],
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 4 Documentation Suite to test local user management. 29 [Documentation] Create user via Redfishtool and verify. 38 [Documentation] Modify user via Redfishtool and verify. 48 [Documentation] Delete user via Redfishtool and verify. 58 [Documentation] Verify login with deleted user via Redfishtool. 78 [Documentation] Verify privilege of admin user. 85 # Verify if a user can be added by admin 90 [Documentation] Verify Redfishtool ReadOnly user privilege works. 102 [Documentation] Verify that an operator user is able to perform operator privilege 103 ... task(e.g. create user, delete user). [all …]
|
| /openbmc/qemu/hw/virtio/ |
| H A D | meson.build | 21 specific_virtio_ss.add(files('vhost-user.c')) 22 system_virtio_ss.add(files('vhost-user-base.c')) 25 system_virtio_ss.add(files('vhost-user-device.c')) 26 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_GPIO', if_true: files('vhost-user-gpio.c')) 27 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_I2C', if_true: files('vhost-user-i2c.c')) 28 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_RNG', if_true: files('vhost-user-rng.c')) 29 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_SND', if_true: files('vhost-user-snd.c')) 30 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_INPUT', if_true: files('vhost-user-input.c')) 33 system_virtio_ss.add(when: 'CONFIG_VIRTIO_PCI', if_true: files('vhost-user-device-pci.c')) 35 if_true: files('vhost-user-gpio-pci.c')) [all …]
|
| /openbmc/bmcweb/include/ |
| H A D | credential_pipe.hpp | 43 explicit_bzero(user.data(), user.capacity()); in ~CredentialsPipe() 56 user = std::move(username); in asyncWrite() 61 {{user.data(), user.size() + 1}, {pass.data(), pass.size() + 1}}}; in asyncWrite() 70 std::string user; member in CredentialsPipe
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xdg-user-dirs/ |
| H A D | xdg-user-dirs_0.18.bb | 1 DESCRIPTION = "xdg-user-dirs is a tool to help manage user directories like the desktop folder and … 5 SRC_URI = "http://user-dirs.freedesktop.org/releases/${BPN}-${PV}.tar.gz" 13 ${sysconfdir}/xdg/user-dirs.conf \ 14 ${sysconfdir}/xdg/user-dirs.defaults \
|
| /openbmc/openbmc/poky/ |
| H A D | .gitignore | 27 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.html 28 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.pdf 29 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.tgz
|