/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | client.py | 24 self.username = username 31 if self.username: 150 self.username = username 157 if username: 161 self.username 175 if username: 192 if username == self.username: 232 self.username = username 275 username=None, argument 281 self.username = username [all …]
|
H A D | server.py | 194 username = request.get("username", self.user.username) 195 if username == self.user.username: 204 username = self.user.username 209 username, 633 nonlocal username 668 username, 708 "username": username, 721 "username": user.username, 746 username, 754 "username": username, [all …]
|
H A D | sqlalchemy.py | 79 username = Column(Text, nullable=False) variable in Users 121 if username is not None: 122 self.url = self.url.set(username=username) 175 username=row.username, 505 Users.username, 509 Users.username == username, 528 Users.username == username, 540 .where(Users.username == username) 549 Users.username, 560 username=username, [all …]
|
H A D | sqlite.py | 78 username=row["username"], 452 def _get_user(self, username): argument 459 "username": username, 464 async def lookup_user_token(self, username): argument 465 row = self._get_user(username) 470 async def lookup_user(self, username): argument 480 "username": username, 494 "username": username, 514 "username": username, 524 async def delete_user(self, username): argument [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 71 proc get_host_name_servers {host username password {quiet 1}} { 89 $username@$host\ 118 set_var_default interface [get_host_default_interface $host $username\ 121 $username@$host 'cat /sys/class/net/$interface/address'" \ 128 proc get_host_gateway {host username password {quiet 1}} { 146 $username@$host ip route | grep -i '^default' | awk '{print \$3}'" \ 153 proc get_host_default_interface {host username password {quiet 1} } { 171 $username@$host ip route | grep -i '^default' | awk '{print \$5}'" \ 178 proc get_host_netmask {host username password {interface {}} {quiet 1}} { [all …]
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 31 username=`echo "$current_key" | awk -F":" '{ print $1}'` 34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then 35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'` 51 chown -R ${uid}:${guid} ${IMAGE_ROOTFS}/home/${username}/.ssh 52 chmod 600 ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 16 <b-form-group label-for="username" :label="$t('pageLogin.username')"> 18 id="username" 19 v-model="userInfo.username" 20 aria-describedby="login-error-alert username-required" 21 :state="getValidationState($v.userInfo.username)" 24 data-test-id="login-input-username" 25 @input="$v.userInfo.username.$touch()" 29 <template v-if="!$v.userInfo.username.required"> 80 username: null, 103 username: { [all …]
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | UserManagementStore.js | 115 UserName: username, 125 username, field in AnonymousClassf362ce950801 134 username: username, property in AnonymousClassf362ce950901 144 if (username) data.UserName = username; 154 username: originalUsername, property in AnonymousClassf362ce950c01 164 username: originalUsername, property in AnonymousClassf362ce950d01 169 async deleteUser({ dispatch }, username) { argument 175 username, field in AnonymousClassf362ce950f01 181 username, field in AnonymousClassf362ce951001 187 const promises = users.map(({ username }) => { field in UserManagementStore.actions.deleteUsers.AnonymousClassf362ce951201 [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 611 std::string username = "user"; in TEST_F() local 620 deleteUser(username), in TEST_F() 628 const char* username = "user"; in TEST_F() local 637 deleteUser(username), in TEST_F() 676 std::string username = "user001"; in TEST_F() local 699 std::string username = "user001"; in TEST_F() local 734 std::string username = "user001"; in TEST_F() local 750 std::string username = "user001"; in TEST_F() local 884 std::string username = "user001"; in TEST_F() local 892 userInfo = getUserInfo(username); in TEST_F() [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | Redfish_Service_Validator.robot | 41 #username password role enabled 49 [Arguments] ${username} ${password} ${role} ${enabled} 50 [Teardown] Delete User Created ${username} 53 # username The username to be created. 57 # enabled Indicates whether the username being created 61 Redfish Create User ${username} ${password} ${role} ${enabled} 67 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username} 68 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging 80 [Arguments] ${username} 83 # username The username to be deleted. [all …]
|
/openbmc/qemu/crypto/ |
H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() 130 username = "qemu"; in qcrypto_tls_creds_psk_load() 132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load() 255 creds->username = g_strdup(value); in qcrypto_tls_creds_psk_prop_set_username() [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 110 [Teardown] Delete Users Via Redfish @{username} 113 # username privilege_level enabled 114 ${username}[0] Administrator ${True} 115 ${username}[1] ReadOnly ${True} 116 ${username}[2] Administrator ${False} 125 # username privilege_level enabled 152 Delete Users Via GUI ${username}[0] 158 [Teardown] Delete Users Via Redfish ${username} 160 # Get random username and user privilege level. 176 # Get random username and user privilege level. [all …]
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | useradd_base.bbclass | 40 local username=`echo "$opts" | awk '{ print $NF }'` 41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 49 bbnote "${PN}: user $username already exists, not re-creating it" 103 local username=`echo "$opts" | awk '{ print $NF }'` 104 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 107 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 112 bbnote "${PN}: user $username doesn't exist, not removing it" 142 local username=`echo "$opts" | awk '{ print $NF }'` 150 bbwarn "${PN}: user $username doesn't exist, unable to modify it" [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 21 ${xpath_input_user} //input[@id="username"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 93 # username Name of the user to be created. 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 106 # username User name. 114 Input Text ${xpath_input_user} ${username} 132 [Arguments] ${username} 135 # username Name of the user to be created. 145 [Arguments] ${username} ${password} ${expected_result}=${True} 148 # username Username. [all …]
|
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 151 username=up.username 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 …parsed = _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, ret… 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 67 label-for="username" 79 id="username" 80 v-model="form.username" 257 username: '', 283 this.originalUsername = value.username; 284 this.form.username = value.username; 295 username: { 327 userData.username = this.form.username; 337 if (this.$v.form.username.$dirty) { 338 userData.username = this.form.username; [all …]
|
/openbmc/bmcweb/include/ |
H A D | sessions.hpp | 33 std::string username; member 91 userSession->username = *thisValue; in fromJson() 114 if (userSession->uniqueId.empty() || userSession->username.empty() || in fromJson() 181 std::string_view username, const boost::asio::ip::address& clientIp, in generateUserSession() argument 235 std::string(username), in generateUserSession() 308 void removeSessionsByUsername(std::string_view username) in removeSessionsByUsername() argument 310 std::erase_if(authTokens, [username](const auto& value) { in removeSessionsByUsername() 315 return value.second->username == username; in removeSessionsByUsername() 320 std::string_view username, const std::shared_ptr<UserSession>& session) in removeSessionsByUsernameExceptSession() argument 322 std::erase_if(authTokens, [username, session](const auto& value) { in removeSessionsByUsernameExceptSession() [all …]
|
H A D | login_routes.hpp | 25 std::string_view username; in handleLogin() local 53 username = *userStr; in handleLogin() 81 username = *userStr; in handleLogin() 99 username = *userStr; in handleLogin() 134 username = formpart.content; in handleLogin() 149 username = req.getHeaderValue("username"); in handleLogin() 153 if (!username.empty() && !password.empty()) in handleLogin() 155 int pamrc = pamAuthenticateUser(username, password); in handleLogin() 165 username, req.ipAddress, std::nullopt, in handleLogin() 193 asyncResp->res.jsonValue["data"] = "User '" + session->username + in handleLogout()
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 225 # Update admin_user username using Redfish. 552 # username The username to be created. 593 # username The username to be created. 613 [Arguments] ${username} ${password} 616 # username Login username. 633 # username The username to be created. 666 # username The username to be created. 693 # username The username to be created. 709 ... Redfish.Login ${username} ${password} 719 # username The username to be created. [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 127 toastService.success(`User '${username}' has been created.`); 131 toastService.error(`Failed to create new user '${username}'.`); 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) 343 this.user.username = newUser ? '' : user.UserName; 367 const username = 368 form.username.$pristine ? null : form.username.$modelValue; 384 originalUsername, username, password, role, enabled, [all …]
|
/openbmc/webui-vue/src/store/modules/ |
H A D | GlobalStore.js | 41 username: localStorage.getItem('storedUsername'), property in GlobalStore.state 53 username: (state) => state.username, 67 setUsername: (state, username) => (state.username = username),
|
/openbmc/webui-vue/src/store/modules/Authentication/ |
H A D | AuthenticanStore.js | 42 login({ commit }, { username, password }) { field in AuthenticationStore.actions.AnonymousClassdd0a6d100201 46 username: username, property in AnonymousClassdd0a6d100301 65 getUserInfo({ commit }, username) { argument 67 .get(`/redfish/v1/AccountService/Accounts/${username}`)
|
/openbmc/webui-vue/src/views/Operations/VirtualMedia/ |
H A D | ModalConfigureConnection.vue | 32 :label="$t('pageVirtualMedia.modal.username')" 33 label-for="username" 36 id="username" 37 v-model="form.username" 39 data-test-id="configureConnection-input-username" 92 username: null, 134 this.form.username = null;
|
/openbmc/qemu/qga/ |
H A D | commands-posix-ssh.c | 38 #define g_unix_get_passwd_entry_qemu(username, err) \ argument 39 test_get_passwd_entry(username, err) 43 get_passwd_entry(const char *username, Error **errp) in get_passwd_entry() argument 48 p = g_unix_get_passwd_entry_qemu(username, &err); in get_passwd_entry() 51 username, err->message); in get_passwd_entry() 158 qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument 175 p = get_passwd_entry(username, errp); in qmp_guest_ssh_add_authorized_keys() 208 qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument 222 p = get_passwd_entry(username, errp); in qmp_guest_ssh_remove_authorized_keys() 257 qmp_guest_ssh_get_authorized_keys(const char *username, Error **errp) in qmp_guest_ssh_get_authorized_keys() argument [all …]
|