| /openbmc/openbmc-test-automation/lib/ |
| H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 89 $username@$host\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 118 set_var_default interface [get_host_default_interface $host $username\ 121 $username@$host 'cat /sys/class/net/$interface/address'" \ 128 proc get_host_gateway {host username password {quiet 1}} { 146 $username@$host ip route | grep -i '^default' | awk '{print \$3}'" \ 153 proc get_host_default_interface {host username password {quiet 1} } { [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/hashserv/ |
| H A D | client.py | 83 def __init__(self, username=None, password=None): argument 86 self.username = username 93 if self.username: 96 await self.auth(self.username, self.password) 241 async def auth(self, username, token): argument 242 result = await self.invoke({"auth": {"username": username, "token": token}}) 243 self.username = username 248 async def refresh_token(self, username=None): argument 250 if username: 251 m["username"] = username [all …]
|
| H A D | sqlalchemy.py | 79 username = Column(Text, nullable=False) variable in Users 117 def __init__(self, url, username=None, password=None): argument 121 if username is not None: 122 self.url = self.url.set(username=username) 175 username=row.username, 501 async def _get_user(self, username): argument 505 Users.username, 509 Users.username == username, 514 async def lookup_user_token(self, username): argument 515 row = await self._get_user(username) [all …]
|
| H A D | server.py | 195 username = request.get("username", self.user.username) 196 if username == self.user.username: 197 request["username"] = self.user.username 202 username = "Anonymous user" 205 username = self.user.username 210 username, 271 def raise_no_user_error(self, username): argument 485 outhash_data["owner"] = self.user.username 658 username = str(request["username"]) 662 nonlocal username [all …]
|
| H A D | sqlite.py | 95 username=row["username"], 469 def _get_user(self, username): argument 476 "username": username, 481 async def lookup_user_token(self, username): argument 482 row = self._get_user(username) 487 async def lookup_user(self, username): argument 488 return map_user(self._get_user(username)) 490 async def set_user_token(self, username, token): argument 497 "username": username, 504 async def set_user_perms(self, username, permissions): argument [all …]
|
| /openbmc/openbmc/meta-phosphor/classes/ |
| H A D | phosphor-deploy-ssh-keys.bbclass | 31 username=`echo "$current_key" | awk -F":" '{ print $1}'` 34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then 35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'` 49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'` [all …]
|
| /openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
| H A D | UserManagementStore.js | 115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701 117 UserName: username, 127 username, field in AnonymousClassf362ce950801 136 username: username, property in AnonymousClassf362ce950901 143 { originalUsername, username, password, privilege, status, locked }, 146 if (username) data.UserName = username; 156 username: originalUsername, property in AnonymousClassf362ce950c01 166 username: originalUsername, property in AnonymousClassf362ce950d01 171 async deleteUser({ dispatch }, username) { argument 173 .delete(`/redfish/v1/AccountService/Accounts/${username}`) [all …]
|
| /openbmc/webui-vue/src/views/Login/ |
| H A D | Login.vue | 16 <b-form-group label-for="username" :label="$t('pageLogin.username')"> 18 id="username" 19 v-model="userInfo.username" 20 aria-describedby="login-error-alert username-required" 21 :state="getValidationState(v$.userInfo.username)" 23 autocomplete="username" 25 data-test-id="login-input-username" 26 @input="v$.userInfo.username.$touch()" 29 <b-form-invalid-feedback id="username-required" role="alert"> 30 <template v-if="v$.userInfo.username.required.$invalid"> [all …]
|
| /openbmc/qemu/crypto/ |
| H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() 130 username = "qemu"; in qcrypto_tls_creds_psk_load() 132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load() [all …]
|
| /openbmc/phosphor-user-manager/test/ |
| H A D | user_mgr_test.cpp | 643 std::string username = "user"; in TEST_F() local 645 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F() 646 EXPECT_CALL(*this, executeUserDelete(testing::StrEq(username))) in TEST_F() 652 deleteUser(username), in TEST_F() 654 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F() 660 const char* username = "user"; in TEST_F() local 662 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F() 663 EXPECT_CALL(*this, executeUserClearFailRecords(testing::StrEq(username))) in TEST_F() 669 deleteUser(username), in TEST_F() 671 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F() [all …]
|
| /openbmc/phosphor-webui/app/login/controllers/ |
| H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
| /openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
| H A D | Redfish_Service_Validator.robot | 43 #username password role enabled 51 [Arguments] ${username} ${password} ${role} ${enabled} 52 [Teardown] Delete User Created ${username} 55 # username The username to be created. 59 # enabled Indicates whether the username being created 63 Redfish Create User ${username} ${password} ${role} ${enabled} 69 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username} 70 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging 82 [Arguments] ${username} 85 # username The username to be deleted. [all …]
|
| /openbmc/openbmc/poky/meta/classes/ |
| H A D | useradd_base.bbclass | 40 local username=`echo "$opts" | awk '{ print $NF }'` 41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 49 bbnote "${PN}: user $username already exists, not re-creating it" 58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr… 59 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 68 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 103 local username=`echo "$opts" | awk '{ print $NF }'` [all …]
|
| /openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
| H A D | test_user_management_sub_menu.robot | 24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username'] 39 @{username} admin_user readonly_user disabled_user variable 110 [Teardown] Delete Users Via Redfish @{username} 113 # username privilege_level enabled 114 ${username}[0] Administrator ${True} 115 ${username}[1] ReadOnly ${True} 116 ${username}[2] Administrator ${False} 125 # username privilege_level enabled 150 Create User And Verify ${username}[0] Administrator ${True} 153 Delete Users Via GUI ${username}[0] [all …]
|
| /openbmc/qemu/qga/ |
| H A D | commands-windows-ssh.c | 47 g_free(info->username); in free_userInfo() 104 static char *get_ssh_folder(const char *username, const bool isAdmin, in get_ssh_folder() argument 124 return g_build_filename(profilesDir, username, ".ssh", NULL); in get_ssh_folder() 148 userInfo->username); in create_acl_user() 176 userInfo->username, setResult); in create_acl_user() 391 userInfo->username); in set_file_permissions() 459 static bool get_user_info(PWindowsUserInfo *userInfo, const char *username, in get_user_info() argument 472 wideUserName = g_utf8_to_utf16(username, -1, NULL, NULL, &gerr); in get_user_info() 489 error_setg(errp, "User %s was not found", username); in get_user_info() 501 uData->username = g_strdup(username); in get_user_info() [all …]
|
| /openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
| H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 151 username=up.username 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 …parsed = _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, ret… 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
| /openbmc/bmcweb/features/webui_login/ |
| H A D | login_routes.hpp | 38 std::string_view username; in handleLogin() local 66 username = *userStr; in handleLogin() 94 username = *userStr; in handleLogin() 118 username = *userStr; in handleLogin() 154 username = formpart.content; in handleLogin() 169 username = req.getHeaderValue("username"); in handleLogin() 173 if (!username.empty() && !password.empty()) in handleLogin() 175 int pamrc = pamAuthenticateUser(username, password, std::nullopt); in handleLogin() 185 .generateUserSession(username, req.ipAddress, std::nullopt, in handleLogin() 209 "User '" + session->username + "' logged out"; in handleLogout()
|
| /openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
| H A D | ModalUser.vue | 67 :label="i18n.t('pageUserManagement.modal.username')" 68 label-for="username" 70 <b-form-text id="username-help-block"> 80 id="username" 81 v-model="form.username" 83 aria-describedby="username-help-block" 84 data-test-id="userManagement-input-username" 85 :state="getValidationState(v$.form.username)" 87 @input="v$.form.username.$touch()" 90 <template v-if="v$.form.username.required.$invalid"> [all …]
|
| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 127 toastService.success(`User '${username}' has been created.`); 131 toastService.error(`Failed to create new user '${username}'.`); 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) 343 this.user.username = newUser ? '' : user.UserName; 367 const username = 368 form.username.$pristine ? null : form.username.$modelValue; 384 originalUsername, username, password, role, enabled, [all …]
|
| /openbmc/bmcweb/include/ |
| H A D | sessions.hpp | 47 std::string username; member 106 userSession->username = *thisValue; in fromJson() 129 if (userSession->uniqueId.empty() || userSession->username.empty() || in fromJson() 265 std::string_view username, const boost::asio::ip::address& clientIp, in generateUserSession() argument 285 std::string(username), in generateUserSession() 380 void removeSessionsByUsername(std::string_view username) in removeSessionsByUsername() argument 382 std::erase_if(authTokens, [username](const auto& value) { in removeSessionsByUsername() 387 return value.second->username == username; in removeSessionsByUsername() 392 std::string_view username, const std::shared_ptr<UserSession>& session) in removeSessionsByUsernameExceptSession() argument 394 std::erase_if(authTokens, [username, session](const auto& value) { in removeSessionsByUsernameExceptSession() [all …]
|
| /openbmc/openbmc-test-automation/redfish/account_service/ |
| H A D | test_user_account.robot | 70 #username password role_id enabled 79 #username password role_id enabled 88 #username password role_id enabled 98 #username password role_id enabled wrong_password 108 #username password role_id enabled wrong_password 118 #username password role_id enabled wrong_password 127 #username password role_id enabled 136 #username password role_id enabled 145 #username password role_id enabled 154 #username password role_id enabled [all …]
|
| /openbmc/webui-vue/src/views/Operations/VirtualMedia/ |
| H A D | ModalConfigureConnection.vue | 33 :label="$t('pageVirtualMedia.modal.username')" 34 label-for="username" 37 id="username" 38 v-model="form.username" 40 autocomplete="username" 41 data-test-id="configureConnection-input-username" 104 username: null, 156 this.form.username = null;
|
| /openbmc/webui-vue/src/store/modules/ |
| H A D | GlobalStore.js | 47 username: localStorage.getItem('storedUsername'), property in GlobalStore.state 59 username: (state) => state.username, 73 setUsername: (state, username) => (state.username = username),
|
| /openbmc/bmcweb/redfish-core/lib/ |
| H A D | redfish_sessions.hpp | 44 res.jsonValue["UserName"] = session.username; in fillSessionObject() 123 if (req.session != nullptr && !session->username.empty() && in handleSessionDelete() 124 session->username != req.session->username) in handleSessionDelete() 199 const crow::Request& req, const std::string& username, in processAfterSessionCreation() argument 220 "/redfish/v1/AccountService/Accounts/{}", session->username); in processAfterSessionCreation() 225 crow::getUserInfo(asyncResp, username, session, [asyncResp, session]() { in processAfterSessionCreation() 238 std::string username; in handleSessionCollectionPost() local 247 "UserName", username // in handleSessionCollectionPost() 252 if (password.empty() || username.empty() || in handleSessionCollectionPost() 255 if (username.empty()) in handleSessionCollectionPost() [all …]
|
| /openbmc/webui-vue/src/views/ProfileSettings/ |
| H A D | ProfileSettings.vue | 11 <dt>{{ $t('pageProfileSettings.username') }}</dt> 13 {{ username }} 21 <!-- Hidden username field for browser autocomplete accessibility --> 24 name="username" 25 :value="username" 26 autocomplete="username" 199 username() { 200 return this.$store.getters['global/username']; 234 originalUsername: this.username, 275 const username = this.username; [all …]
|