Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 2193) sorted by relevance

12345678910>>...88

/openbmc/openbmc/poky/bitbake/doc/
H A Dreleases.rst70 - :yocto_docs:`3.1 BitBake User Manual </3.1/bitbake-user-manual/bitbake-user-manual.html>`
71 - :yocto_docs:`3.1.1 BitBake User Manual </3.1.1/bitbake-user-manual/bitbake-user-manual.html>`
72 - :yocto_docs:`3.1.2 BitBake User Manual </3.1.2/bitbake-user-manual/bitbake-user-manual.html>`
73 - :yocto_docs:`3.1.3 BitBake User Manual </3.1.3/bitbake-user-manual/bitbake-user-manual.html>`
79 - :yocto_docs:`3.0 BitBake User Manual </3.0/bitbake-user-manual/bitbake-user-manual.html>`
80 - :yocto_docs:`3.0.1 BitBake User Manual </3.0.1/bitbake-user-manual/bitbake-user-manual.html>`
81 - :yocto_docs:`3.0.2 BitBake User Manual </3.0.2/bitbake-user-manual/bitbake-user-manual.html>`
82 - :yocto_docs:`3.0.3 BitBake User Manual </3.0.3/bitbake-user-manual/bitbake-user-manual.html>`
83 - :yocto_docs:`3.0.4 BitBake User Manual </3.0.4/bitbake-user-manual/bitbake-user-manual.html>`
89 - :yocto_docs:`2.7 BitBake User Manual </2.7/bitbake-user-manual/bitbake-user-manual.html>`
[all …]
H A Dindex.rst13 bitbake-user-manual/bitbake-user-manual-intro
14 bitbake-user-manual/bitbake-user-manual-execution
15 bitbake-user-manual/bitbake-user-manual-metadata
16 bitbake-user-manual/bitbake-user-manual-ref-variables-context
17 bitbake-user-manual/bitbake-user-manual-fetching
18 bitbake-user-manual/bitbake-user-manual-ref-variables
19 bitbake-user-manual/bitbake-user-manual-library-functions
20 bitbake-user-manual/bitbake-user-manual-hello
/openbmc/phosphor-mboxd/vpnor/test/
H A Dtoc_flags.cpp26 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main()
27 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
31 assert(!(part.data.user.data[0])); in main()
32 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main()
36 assert(!(part.data.user.data[0])); in main()
37 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main()
42 assert(!(part.data.user.data[0])); in main()
43 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
47 assert(!(part.data.user.data[0])); in main()
48 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main()
[all …]
/openbmc/hiomapd/vpnor/test/
H A Dtoc_flags.cpp28 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main()
29 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
33 assert(!(part.data.user.data[0])); in main()
34 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main()
38 assert(!(part.data.user.data[0])); in main()
39 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main()
44 assert(!(part.data.user.data[0])); in main()
45 assert(!(part.data.user.data[1] & DATA_MASK)); in main()
49 assert(!(part.data.user.data[0])); in main()
50 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main()
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js34 function checkIfRoot(user) { argument
35 return user.UserName === 'root' ? true : false;
43 function mapTableData(user) { argument
44 const accountStatus = user.Locked ? 'Locked' :
45 user.Enabled ? 'Enabled' :
50 enabled: checkIfRoot(user) ? false : true,
53 user.selectable = checkIfRoot(user) ? false : true;
54 user.actions = [editAction, deleteAction];
55 user.uiData = [user.UserName, user.RoleId, accountStatus];
56 return user;
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libconfuse/files/
H A DCVE-2022-40320.patch22 /* ~user or ~user/path */
23 - char *user;
24 + char *user; /* ~user or ~user/path */
31 - user = malloc(file - filename);
33 + user = malloc(len + 1);
34 if (!user)
37 - strncpy(user, filename + 1, file - filename - 1);
38 + strncpy(user, &filename[1], len);
39 + user[len] = 0;
40 passwd = getpwnam(user);
[all …]
/openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/
H A Dauthorized-keys-comp.sh6 while read -r user; do
7 home="$(eval echo "~$user")" || continue
11 if [[ $link != "/run/authorized_keys/$user" ]]; then
12 echo "Ignoring $user $home/.ssh/authorized_keys" >&2
19 "/usr/share/authorized_keys.d/$user"
21 "/run/authorized_keys.d/$user"
49 mv /run/authorized_keys.tmp /run/authorized_keys/"$user"
50 chown "$user" /run/authorized_keys/"$user"
/openbmc/qemu/docs/system/devices/
H A Dvfio-user.rst4 vfio-user
7 QEMU includes a ``vfio-user`` client. The ``vfio-user`` specification allows for
9 ``vhost-user`` in this respect (see :doc:`vhost-user`), but can emulate arbitrary
11 kernel, ``vfio-user``, while similar in implementation, is handled entirely in
15 setting up a ``vfio-user`` UNIX socket between QEMU and SPDK, a VM can send NVMe
18 Presuming a suitable ``vfio-user`` server has opened a socket at
19 ``/tmp/vfio-user.sock``, a device can be configured with for example:
23 -device '{"driver": "vfio-user-pci","socket": {"path": "/tmp/vfio-user.sock", "type": "unix"}}'
25 See `libvfio-user <https://github.com/nutanix/libvfio-user/>`_ for further
H A Dvhost-user.rst3 vhost-user back ends
6 vhost-user back ends are way to service the request of VirtIO devices
10 vhost-user device
16 device that connects via a socket to the vhost-user *daemon*.
21 .. list-table:: vhost-user devices
28 * - vhost-user-blk
30 - See contrib/vhost-user-blk
31 * - vhost-user-fs
34 * - vhost-user-gpio
37 * - vhost-user-gpu
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_ipmi_redfish_user.robot2 Documentation Test IPMI and Redfish combinations for user management.
30 [Documentation] Create user using redfish and verify via IPMI.
42 # Delay added for created new user password to get set.
49 [Documentation] Update user password via Redfish and verify using IPMI.
52 # Create user using Redfish.
62 # Update user password using Redfish.
74 [Documentation] Update user privilege via Redfish and verify using IPMI.
77 # Create user using Redfish with admin privilege.
87 # Update user privilege to operator using Redfish.
91 # Verify new user privilege level via IPMI.
[all …]
/openbmc/docs/architecture/
H A Duser-management.md6 user-management components. The implementation detail is beyond the scope of
11 1. Use common user-management (e.g. phosphor-user-manager) rather than
12 application-based user-management. Especially, avoid IPMI based
13 user-management.
15 Observe this rule even while creating, modifying or authenticating the user.
16 3. Have applications use the PAM module to authenticate the user instead of
24 or if the user created doesn't have an 'ipmi' group role.
26 user-management (e.g. phosphor-user-manager), whereas individual user-related
31 restriction etc. for the corresponding user). Design is made to cover this
37 corresponding user. This is used to determine at a high level whether the user
[all …]
/openbmc/openbmc-test-automation/ipmi/
H A Dtest_ipmi_user.robot2 Documentation Test suite for OpenBMC IPMI user management.
17 ${invalid_username} user%
40 [Documentation] Verify IPMI maximum supported IPMI user ID and
41 ... enabled user from user summary.
50 Run IPMI Standard Command user enable ${random_userid}
52 # Enable IPMI user and verify
60 # Verify maximum user count IPMI local user can have.
65 [Documentation] Verify user list via IPMI.
74 ... user set password ${random_userid} ${valid_password}
75 Run IPMI Standard Command user enable ${random_userid}
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/
H A DREADME.md5 User Manager service exposes D-Bus methods for user management operations.
16 - CreateUser - To create new user to the system.
17 - RenameUser - To rename existing user to new name in the system.
26 - UserRenamed - Signal sent out when user is renamed in the system.
32 - MaxLoginAttemptBeforeLockout - Permissible attempt before locking out the user
38 when updating password for the user.
42 User manager daemon, will create user objects for every user existing in the
43 system under object path `/xyz/openbmc_project/user/<user name>`. Each user
51 - UserPrivilege - Privilege of the user.
52 - UserGroups - Groups to which the user belongs.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot19 ${xpath_add_user} //button[contains(text(),'Add user')]
30 ${xpath_delete_button} //button[text()='Delete user']
31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')]
37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')]
46 [Documentation] Verify navigation to user management page.
53 [Documentation] Verify existence of all sections in user management page.
60 [Documentation] Verify existence of all sections in user managemnet page.
67 [Documentation] Verify existence of all buttons in user management page.
77 [Documentation] Verify existence of all buttons and fields in add user page.
108 [Documentation] Create a new user with a privilege and verify that user is created.
[all …]
/openbmc/openbmc-test-automation/openpower/localuser/
H A Dtest_ipmi_redfish_user.robot2 Documentation Test IPMI and Redfish combinations for user management.
24 [Documentation] Create user using IPMI without privilege and verify user privilege
28 # Create IPMI user with random id and username.
32 ... user set name ${random_userid} ${random_username}
34 # Verify new user privilege level via Redfish.
41 [Documentation] Create user via redfish and verify via IPMI.
53 # Add delay for a new admin user password to set.
58 # Update user password using Redfish.
66 [Documentation] Delete user via redfish and verify using IPMI.
69 # Create user using Redfish.
[all …]
/openbmc/qemu/tests/docker/dockerfiles/
H A Ddebian-all-test-cross.docker7 # to build and run linux-user tests on GitLab
72user,arm-linux-user,hppa-linux-user,i386-linux-user,m68k-linux-user,mips-linux-user,mips64-linux-u…
73 # As a final step configure the user (if env is defined)
/openbmc/qemu/docs/interop/
H A Dvhost-user.json14 # vhost user backend discovery & capabilities
21 # List the various vhost user backend types.
65 # List of vhost user "block" features.
80 # Capabilities reported by vhost user "block" backends
96 # List of vhost user "input" features.
111 # Capabilities reported by vhost user "input" backends
127 # List of vhost user "gpu" features.
142 # Capabilities reported by vhost user "gpu" backends.
158 # Capabilities reported by vhost user backends.
160 # @type: The vhost user backend type.
[all …]
/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dtests.py92 def auth_client(self, user): argument
93 return self.start_client(self.auth_server_address, user["username"], user["token"])
107 def assertUserPerms(self, user, permissions): argument
108 with self.auth_client(user) as client:
111 "username": user["username"],
115 def assertUserCanAuth(self, user): argument
117 client.auth(user["username"], user["token"])
119 def assertUserCannotAuth(self, user): argument
121 client.auth(user["username"], user["token"])
155 user = self.create_user(f"user-{self.client_index}", permissions)
[all …]
/openbmc/openbmc-tools/tof-voters/libvoters/subcmd/
H A Danalyze-reviews.py86 user = comments_per_user[reviewer]
87 user["name"] = comment["reviewer"]["name"]
108 user["email"] = comment["reviewer"]["email"]
109 user["comments"] += 1
115 print(" ", user, review["comments"])
116 user = changes_per_user[username]
117 user["name"] = review["name"]
118 user["email"] = review["email"]
119 user["changes"].append(id_number)
H A Dreport.py36 for user in sorted(contributions.keys()):
37 user_commits = len(commits.get(user, {}).get("changes", []))
38 user_reviews = len(reviews.get(user, {}).get("changes", []))
41 print(user, points, user_commits, user_reviews)
45 results[user] = {
46 "name": contributions[user]["name"],
47 "email": contributions[user]["email"],
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A Dtest_redfishtool_local_user.robot4 Documentation Suite to test local user management.
29 [Documentation] Create user via Redfishtool and verify.
38 [Documentation] Modify user via Redfishtool and verify.
48 [Documentation] Delete user via Redfishtool and verify.
58 [Documentation] Verify login with deleted user via Redfishtool.
78 [Documentation] Verify privilege of admin user.
85 # Verify if a user can be added by admin
90 [Documentation] Verify Redfishtool ReadOnly user privilege works.
102 [Documentation] Verify that an operator user is able to perform operator privilege
103 ... task(e.g. create user, delete user).
[all …]
/openbmc/qemu/hw/virtio/
H A Dmeson.build21 specific_virtio_ss.add(files('vhost-user.c'))
22 system_virtio_ss.add(files('vhost-user-base.c'))
25 system_virtio_ss.add(files('vhost-user-device.c'))
26 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_GPIO', if_true: files('vhost-user-gpio.c'))
27 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_I2C', if_true: files('vhost-user-i2c.c'))
28 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_RNG', if_true: files('vhost-user-rng.c'))
29 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_SND', if_true: files('vhost-user-snd.c'))
30 system_virtio_ss.add(when: 'CONFIG_VHOST_USER_INPUT', if_true: files('vhost-user-input.c'))
33 system_virtio_ss.add(when: 'CONFIG_VIRTIO_PCI', if_true: files('vhost-user-device-pci.c'))
35 if_true: files('vhost-user-gpio-pci.c'))
[all …]
/openbmc/bmcweb/include/
H A Dcredential_pipe.hpp43 explicit_bzero(user.data(), user.capacity()); in ~CredentialsPipe()
56 user = std::move(username); in asyncWrite()
61 {{user.data(), user.size() + 1}, {pass.data(), pass.size() + 1}}}; in asyncWrite()
70 std::string user; member in CredentialsPipe
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xdg-user-dirs/
H A Dxdg-user-dirs_0.18.bb1 DESCRIPTION = "xdg-user-dirs is a tool to help manage user directories like the desktop folder and …
5 SRC_URI = "http://user-dirs.freedesktop.org/releases/${BPN}-${PV}.tar.gz"
13 ${sysconfdir}/xdg/user-dirs.conf \
14 ${sysconfdir}/xdg/user-dirs.defaults \
/openbmc/openbmc/poky/
H A D.gitignore27 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.html
28 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.pdf
29 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.tgz

12345678910>>...88