| /openbmc/openbmc/poky/bitbake/doc/ |
| H A D | releases.rst | 70 - :yocto_docs:`3.1 BitBake User Manual </3.1/bitbake-user-manual/bitbake-user-manual.html>` 71 - :yocto_docs:`3.1.1 BitBake User Manual </3.1.1/bitbake-user-manual/bitbake-user-manual.html>` 72 - :yocto_docs:`3.1.2 BitBake User Manual </3.1.2/bitbake-user-manual/bitbake-user-manual.html>` 73 - :yocto_docs:`3.1.3 BitBake User Manual </3.1.3/bitbake-user-manual/bitbake-user-manual.html>` 79 - :yocto_docs:`3.0 BitBake User Manual </3.0/bitbake-user-manual/bitbake-user-manual.html>` 80 - :yocto_docs:`3.0.1 BitBake User Manual </3.0.1/bitbake-user-manual/bitbake-user-manual.html>` 81 - :yocto_docs:`3.0.2 BitBake User Manual </3.0.2/bitbake-user-manual/bitbake-user-manual.html>` 82 - :yocto_docs:`3.0.3 BitBake User Manual </3.0.3/bitbake-user-manual/bitbake-user-manual.html>` 83 - :yocto_docs:`3.0.4 BitBake User Manual </3.0.4/bitbake-user-manual/bitbake-user-manual.html>` 89 - :yocto_docs:`2.7 BitBake User Manual </2.7/bitbake-user-manual/bitbake-user-manual.html>` [all …]
|
| H A D | index.rst | 13 bitbake-user-manual/bitbake-user-manual-intro 14 bitbake-user-manual/bitbake-user-manual-execution 15 bitbake-user-manual/bitbake-user-manual-metadata 16 bitbake-user-manual/bitbake-user-manual-ref-variables-context 17 bitbake-user-manual/bitbake-user-manual-fetching 18 bitbake-user-manual/bitbake-user-manual-ref-variables 19 bitbake-user-manual/bitbake-user-manual-library-functions 20 bitbake-user-manual/bitbake-user-manual-hello
|
| /openbmc/phosphor-mboxd/vpnor/test/ |
| H A D | toc_flags.cpp | 26 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 27 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 31 assert(!(part.data.user.data[0])); in main() 32 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 36 assert(!(part.data.user.data[0])); in main() 37 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 42 assert(!(part.data.user.data[0])); in main() 43 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 47 assert(!(part.data.user.data[0])); in main() 48 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
| /openbmc/hiomapd/vpnor/test/ |
| H A D | toc_flags.cpp | 28 assert((part.data.user.data[0]) == PARTITION_ECC_PROTECTED); in main() 29 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 33 assert(!(part.data.user.data[0])); in main() 34 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_PRESERVED); in main() 38 assert(!(part.data.user.data[0])); in main() 39 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_READONLY); in main() 44 assert(!(part.data.user.data[0])); in main() 45 assert(!(part.data.user.data[1] & DATA_MASK)); in main() 49 assert(!(part.data.user.data[0])); in main() 50 assert((part.data.user.data[1] & DATA_MASK) == PARTITION_REPROVISION); in main() [all …]
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 34 function checkIfRoot(user) { argument 35 return user.UserName === 'root' ? true : false; 43 function mapTableData(user) { argument 44 const accountStatus = user.Locked ? 'Locked' : 45 user.Enabled ? 'Enabled' : 50 enabled: checkIfRoot(user) ? false : true, 53 user.selectable = checkIfRoot(user) ? false : true; 54 user.actions = [editAction, deleteAction]; 55 user.uiData = [user.UserName, user.RoleId, accountStatus]; 56 return user; [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libconfuse/files/ |
| H A D | CVE-2022-40320.patch | 22 /* ~user or ~user/path */ 23 - char *user; 24 + char *user; /* ~user or ~user/path */ 31 - user = malloc(file - filename); 33 + user = malloc(len + 1); 34 if (!user) 37 - strncpy(user, filename + 1, file - filename - 1); 38 + strncpy(user, &filename[1], len); 39 + user[len] = 0; 40 passwd = getpwnam(user); [all …]
|
| /openbmc/openbmc/meta-google/recipes-google/ssh/authorized-keys-comp/ |
| H A D | authorized-keys-comp.sh | 6 while read -r user; do 7 home="$(eval echo "~$user")" || continue 11 if [[ $link != "/run/authorized_keys/$user" ]]; then 12 echo "Ignoring $user $home/.ssh/authorized_keys" >&2 19 "/usr/share/authorized_keys.d/$user" 21 "/run/authorized_keys.d/$user" 49 mv /run/authorized_keys.tmp /run/authorized_keys/"$user" 50 chown "$user" /run/authorized_keys/"$user"
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 30 [Documentation] Create user using redfish and verify via IPMI. 42 # Delay added for created new user password to get set. 49 [Documentation] Update user password via Redfish and verify using IPMI. 52 # Create user using Redfish. 62 # Update user password using Redfish. 74 [Documentation] Update user privilege via Redfish and verify using IPMI. 77 # Create user using Redfish with admin privilege. 87 # Update user privilege to operator using Redfish. 91 # Verify new user privilege level via IPMI. [all …]
|
| H A D | test_user_account.robot | 2 Documentation Test suite for verifying Redfish admin, readonly operation user accounts. 33 [Documentation] Verify Redfish admin user persistence after reboot. 51 [Documentation] Verify Redfish operator user persistence after reboot. 66 [Documentation] Create a Redfish user with administrator role and verify. 75 [Documentation] Create a Redfish user with operator role and verify. 84 [Documentation] Create a Redfish user with readonly role and verify. 93 [Documentation] Verify Redfish create admin user with valid password and make sure 94 ... admin user failed to login with wrong password. 103 [Documentation] Verify Redfish create operator user with valid password and make sure 104 ... operator user failed to login with wrong password. [all …]
|
| /openbmc/docs/architecture/ |
| H A D | user-management.md | 6 user-management components. The implementation detail is beyond the scope of 11 1. Use common user-management (e.g. phosphor-user-manager) rather than 12 application-based user-management. Especially, avoid IPMI based 13 user-management. 15 Observe this rule even while creating, modifying or authenticating the user. 16 3. Have applications use the PAM module to authenticate the user instead of 24 or if the user created doesn't have an 'ipmi' group role. 26 user-management (e.g. phosphor-user-manager), whereas individual user-related 31 restriction etc. for the corresponding user). Design is made to cover this 37 corresponding user. This is used to determine at a high level whether the user [all …]
|
| /openbmc/openbmc-test-automation/ipmi/ |
| H A D | test_ipmi_user.robot | 2 Documentation Test suite for OpenBMC IPMI user management. 17 ${invalid_username} user% 40 [Documentation] Verify IPMI maximum supported IPMI user ID and 41 ... enabled user from user summary. 50 Run IPMI Standard Command user enable ${random_userid} 52 # Enable IPMI user and verify 60 # Verify maximum user count IPMI local user can have. 65 [Documentation] Verify user list via IPMI. 74 ... user set password ${random_userid} ${valid_password} 75 Run IPMI Standard Command user enable ${random_userid} [all …]
|
| /openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
| H A D | README.md | 5 User Manager service exposes D-Bus methods for user management operations. 16 - CreateUser - To create new user to the system. 17 - CreateUser2 - To create new user with set of mandatory and optional 19 - RenameUser - To rename existing user to new name in the system. 28 - UserRenamed - Signal sent out when user is renamed in the system. 34 - MaxLoginAttemptBeforeLockout - Permissible attempt before locking out the user 40 when updating password for the user. 44 User manager daemon, will create user objects for every user existing in the 45 system under object path `/xyz/openbmc_project/user/<user name>`. Each user 53 - UserPrivilege - Privilege of the user. [all …]
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 19 ${xpath_add_user} //button[contains(text(),'Add user')] 30 ${xpath_delete_button} //button[text()='Delete user'] 31 ${xpath_add_user_heading} //h5[contains(text(),'Add user')] 37 ${xpath_user_creation_error_message} //*[contains(text(),'Error creating user')] 46 [Documentation] Verify navigation to user management page. 53 [Documentation] Verify existence of all sections in user management page. 60 [Documentation] Verify existence of all sections in user managemnet page. 67 [Documentation] Verify existence of all buttons in user management page. 77 [Documentation] Verify existence of all buttons and fields in add user page. 108 [Documentation] Create a new user with a privilege and verify that user is created. [all …]
|
| /openbmc/openbmc-test-automation/openpower/localuser/ |
| H A D | test_ipmi_redfish_user.robot | 2 Documentation Test IPMI and Redfish combinations for user management. 24 [Documentation] Create user using IPMI without privilege and verify user privilege 28 # Create IPMI user with random id and username. 32 ... user set name ${random_userid} ${random_username} 34 # Verify new user privilege level via Redfish. 41 [Documentation] Create user via redfish and verify via IPMI. 53 # Add delay for a new admin user password to set. 58 # Update user password using Redfish. 66 [Documentation] Delete user via redfish and verify using IPMI. 69 # Create user using Redfish. [all …]
|
| /openbmc/qemu/tests/docker/dockerfiles/ |
| H A D | debian-all-test-cross.docker | 93 ENV DEF_TARGET_LIST aarch64-linux-user,arm-linux-user,hppa-linux-user,i386-linux-user,m68k-linux-user,mips-linux-user,mips64-linux-user,mips64el-linux-user,mipsel-linux-user,ppc-linux-user,ppc6 [all...] |
| /openbmc/openbmc/poky/bitbake/lib/hashserv/ |
| H A D | tests.py | 92 def auth_client(self, user): argument 93 return self.start_client(self.auth_server_address, user["username"], user["token"]) 107 def assertUserPerms(self, user, permissions): argument 108 with self.auth_client(user) as client: 111 "username": user["username"], 115 def assertUserCanAuth(self, user): argument 117 client.auth(user["username"], user["token"]) 119 def assertUserCannotAuth(self, user): argument 121 client.auth(user["username"], user["token"]) 155 user = self.create_user(f"user-{self.client_index}", permissions) [all …]
|
| /openbmc/openbmc-tools/tof-voters/libvoters/subcmd/ |
| H A D | analyze-reviews.py | 91 user = comments_per_user[reviewer] 92 user["name"] = comment["reviewer"]["name"] 113 user["email"] = comment["reviewer"]["email"] 114 user["comments"] += 1 120 print(" ", user, review["comments"]) 121 user = changes_per_user[username] 122 user["name"] = review["name"] 123 user["email"] = review["email"] 124 user["changes"].append(id_number)
|
| H A D | report.py | 36 for user in sorted(contributions.keys()): 37 user_commits = len(commits.get(user, {}).get("changes", [])) 38 user_reviews = len(reviews.get(user, {}).get("changes", [])) 41 print(user, points, user_commits, user_reviews) 45 results[user] = { 46 "name": contributions[user]["name"], 47 "email": contributions[user]["email"],
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | test_redfishtool_local_user.robot | 4 Documentation Suite to test local user management. 29 [Documentation] Create user via Redfishtool and verify. 38 [Documentation] Modify user via Redfishtool and verify. 48 [Documentation] Delete user via Redfishtool and verify. 58 [Documentation] Verify login with deleted user via Redfishtool. 78 [Documentation] Verify privilege of admin user. 85 # Verify if a user can be added by admin 90 [Documentation] Verify Redfishtool ReadOnly user privilege works. 102 [Documentation] Verify that an operator user is able to perform operator privilege 103 ... task(e.g. create user, delete user). [all …]
|
| /openbmc/bmcweb/include/ |
| H A D | credential_pipe.hpp | 43 explicit_bzero(user.data(), user.capacity()); in ~CredentialsPipe() 56 user = std::move(username); in asyncWrite() 61 {{user.data(), user.size() + 1}, {pass.data(), pass.size() + 1}}}; in asyncWrite() 70 std::string user; member in CredentialsPipe
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/xdg-user-dirs/ |
| H A D | xdg-user-dirs_0.18.bb | 1 DESCRIPTION = "xdg-user-dirs is a tool to help manage user directories like the desktop folder and … 5 SRC_URI = "http://user-dirs.freedesktop.org/releases/${BPN}-${PV}.tar.gz" 13 ${sysconfdir}/xdg/user-dirs.conf \ 14 ${sysconfdir}/xdg/user-dirs.defaults \
|
| /openbmc/openbmc/poky/ |
| H A D | .gitignore | 27 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.html 28 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.pdf 29 /bitbake/doc/bitbake-user-manual/bitbake-user-manual.tgz
|
| /openbmc/phosphor-user-manager/test/ |
| H A D | execute_cmd_test.cpp | 7 std::vector<std::string> output = phosphor::user::executeCmd("/bin/true"); in TEST() 13 std::vector<std::string> output = phosphor::user::executeCmd( in TEST() 22 phosphor::user::executeCmd("/bin/echo", "-e", "hello\\nworld"); in TEST() 31 phosphor::user::executeCmd("/path/to/nonexistent_command"), in TEST() 38 phosphor::user::executeCmd("/bin/false"), in TEST()
|
| /openbmc/openbmc/meta-nuvoton/recipes-bsp/images/npcm7xx-igps/ |
| H A D | 0001-Adjust-paths-for-use-with-Bitbake.patch | 28 …ileContent'>output_binaries/BootBlockAndHeader.bin</content> <!-- content the user should fill --> 29 + <content format='FileContent'>Poleg_bootblock.bin.full</content> <!-- content the user should f… 40 …t='FileContent'>output_binaries/UbootAndHeader.bin</content> <!-- content the user should fill --> 41 + <content format='FileContent'>u-boot.bin.full</content> <!-- content the user should fill --> 53 - <content format='FileSize'>inputs/Poleg_bootblock.bin</content> <!-- content the user should fil… 54 + <content format='FileSize'>Poleg_bootblock.bin</content> <!-- content the user should fill --> 65 - <content format='FileContent'>inputs/Poleg_bootblock.bin</content> <!-- content the user should… 66 + <content format='FileContent'>Poleg_bootblock.bin</content> <!-- content the user should fill -… 78 - <content format='FileSize'>inputs/Poleg_bootblock.bin</content> <!-- content the user should fil… 79 + <content format='FileSize'>Poleg_bootblock.bin</content> <!-- content the user should fill --> [all …]
|
| /openbmc/qemu/subprojects/libvhost-user/ |
| H A D | meson.build | 1 project('libvhost-user', 'c', 14 vhost_user = static_library('vhost-user', 15 files('libvhost-user.c'), 22 vhost_user_glib = static_library('vhost-user-glib', 23 files('libvhost-user-glib.c'),
|