Home
last modified time | relevance | path

Searched refs:username (Results 1 – 25 of 259) sorted by relevance

1234567891011

/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dclient.py82 def __init__(self, username=None, password=None): argument
85 self.username = username
92 if self.username:
95 await self.auth(self.username, self.password)
238 async def auth(self, username, token): argument
239 result = await self.invoke({"auth": {"username": username, "token": token}})
240 self.username = username
245 async def refresh_token(self, username=None): argument
247 if username:
248 m["username"] = username
[all …]
H A Dserver.py194 username = request.get("username", self.user.username)
195 if username == self.user.username:
196 request["username"] = self.user.username
201 username = "Anonymous user"
204 username = self.user.username
209 username,
269 def raise_no_user_error(self, username): argument
483 outhash_data["owner"] = self.user.username
629 username = str(request["username"])
633 nonlocal username
[all …]
H A Dsqlalchemy.py79 username = Column(Text, nullable=False) variable in Users
117 def __init__(self, url, username=None, password=None): argument
121 if username is not None:
122 self.url = self.url.set(username=username)
175 username=row.username,
501 async def _get_user(self, username): argument
505 Users.username,
509 Users.username == username,
514 async def lookup_user_token(self, username): argument
515 row = await self._get_user(username)
[all …]
H A Dsqlite.py78 username=row["username"],
452 def _get_user(self, username): argument
459 "username": username,
464 async def lookup_user_token(self, username): argument
465 row = self._get_user(username)
470 async def lookup_user(self, username): argument
471 return map_user(self._get_user(username))
473 async def set_user_token(self, username, token): argument
480 "username": username,
487 async def set_user_perms(self, username, permissions): argument
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
89 $username@$host\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
118 set_var_default interface [get_host_default_interface $host $username\
121 $username@$host 'cat /sys/class/net/$interface/address'" \
128 proc get_host_gateway {host username password {quiet 1}} {
146 $username@$host ip route | grep -i '^default' | awk '{print \$3}'" \
153 proc get_host_default_interface {host username password {quiet 1} } {
[all …]
/openbmc/openbmc/meta-phosphor/classes/
H A Dphosphor-deploy-ssh-keys.bbclass31 username=`echo "$current_key" | awk -F":" '{ print $1}'`
34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then
35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}"
38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then
39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/
42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then
43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'`
49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'`
[all …]
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DUserManagementStore.js115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701
117 UserName: username,
127 username, field in AnonymousClassf362ce950801
136 username: username, property in AnonymousClassf362ce950901
143 { originalUsername, username, password, privilege, status, locked },
146 if (username) data.UserName = username;
156 username: originalUsername, property in AnonymousClassf362ce950c01
166 username: originalUsername, property in AnonymousClassf362ce950d01
171 async deleteUser({ dispatch }, username) { argument
173 .delete(`/redfish/v1/AccountService/Accounts/${username}`)
[all …]
/openbmc/phosphor-user-manager/test/
H A Duser_mgr_test.cpp615 std::string username = "user"; in TEST_F() local
617 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F()
618 EXPECT_CALL(*this, executeUserDelete(testing::StrEq(username))) in TEST_F()
624 deleteUser(username), in TEST_F()
626 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F()
632 const char* username = "user"; in TEST_F() local
634 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F()
635 EXPECT_CALL(*this, executeUserClearFailRecords(testing::StrEq(username))) in TEST_F()
641 deleteUser(username), in TEST_F()
643 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F()
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue16 <b-form-group label-for="username" :label="$t('pageLogin.username')">
18 id="username"
19 v-model="userInfo.username"
20 aria-describedby="login-error-alert username-required"
21 :state="getValidationState(v$.userInfo.username)"
24 data-test-id="login-input-username"
25 @input="v$.userInfo.username.$touch()"
28 <b-form-invalid-feedback id="username-required" role="alert">
29 <template v-if="v$.userInfo.username.required.$invalid">
95 username: null,
[all …]
/openbmc/qemu/crypto/
H A Dtlscredspsk.c35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument
38 const size_t ulen = strlen(username); in lookup_key()
54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key()
62 username, pskfile); in lookup_key()
76 const char *username; in qcrypto_tls_creds_psk_load() local
85 if (creds->username) { in qcrypto_tls_creds_psk_load()
127 if (creds->username) { in qcrypto_tls_creds_psk_load()
128 username = creds->username; in qcrypto_tls_creds_psk_load()
130 username = "qemu"; in qcrypto_tls_creds_psk_load()
132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load()
[all …]
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A DRedfish_Service_Validator.robot41 #username password role enabled
49 [Arguments] ${username} ${password} ${role} ${enabled}
50 [Teardown] Delete User Created ${username}
53 # username The username to be created.
57 # enabled Indicates whether the username being created
61 Redfish Create User ${username} ${password} ${role} ${enabled}
67 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username}
68 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging
80 [Arguments] ${username}
83 # username The username to be deleted.
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username']
39 @{username} admin_user readonly_user disabled_user variable
110 [Teardown] Delete Users Via Redfish @{username}
113 # username privilege_level enabled
114 ${username}[0] Administrator ${True}
115 ${username}[1] ReadOnly ${True}
116 ${username}[2] Administrator ${False}
125 # username privilege_level enabled
149 Create User And Verify ${username}[0] Administrator ${True}
152 Delete Users Via GUI ${username}[0]
[all …]
/openbmc/openbmc/poky/meta/classes/
H A Duseradd_base.bbclass40 local username=`echo "$opts" | awk '{ print $NF }'`
41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`"
44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`"
49 bbnote "${PN}: user $username already exists, not re-creating it"
58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr…
59 bbnote "${PN}: Running groupmems command with group $groupname and user $username"
60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr…
63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||…
68 bbnote "${PN}: group $groupname already contains $username, not re-adding it"
103 local username=`echo "$opts" | awk '{ print $NF }'`
[all …]
/openbmc/qemu/qga/
H A Dcommands-windows-ssh.c47 g_free(info->username); in free_userInfo()
104 static char *get_ssh_folder(const char *username, const bool isAdmin, in get_ssh_folder() argument
124 return g_build_filename(profilesDir, username, ".ssh", NULL); in get_ssh_folder()
148 userInfo->username); in create_acl_user()
176 userInfo->username, setResult); in create_acl_user()
391 userInfo->username); in set_file_permissions()
459 static bool get_user_info(PWindowsUserInfo *userInfo, const char *username, in get_user_info() argument
472 wideUserName = g_utf8_to_utf16(username, -1, NULL, NULL, &gerr); in get_user_info()
489 error_setg(errp, "User %s was not found", username); in get_user_info()
501 uData->username = g_strdup(username); in get_user_info()
[all …]
H A Dcommands-posix-ssh.c39 #define g_unix_get_passwd_entry(username, err) \ argument
40 test_get_passwd_entry(username, err)
44 get_passwd_entry(const char *username, Error **errp) in get_passwd_entry() argument
49 p = g_unix_get_passwd_entry(username, &err); in get_passwd_entry()
52 username, err->message); in get_passwd_entry()
113 qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument
130 p = get_passwd_entry(username, errp); in qmp_guest_ssh_add_authorized_keys()
163 qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument
177 p = get_passwd_entry(username, errp); in qmp_guest_ssh_remove_authorized_keys()
212 qmp_guest_ssh_get_authorized_keys(const char *username, Error **errp) in qmp_guest_ssh_get_authorized_keys() argument
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot21 ${xpath_input_user} //input[@id="username"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
93 # username Name of the user to be created.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
106 # username User name.
114 Input Text ${xpath_input_user} ${username}
132 [Arguments] ${username}
135 # username Name of the user to be created.
137 ${result}= Run Keyword And Return Status Page Should Contain ${username}
[all …]
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/
H A Drestapi.py144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument
151 username=up.username
160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password)
167 …parsed = _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, ret…
197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password)
214 username=up.username, password=up.password)
226 username=up.username, password=up.password)
242 username=up.username, password=up.password)
263 username=up.username, password=up.password)
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue65 :label="$t('pageUserManagement.modal.username')"
66 label-for="username"
68 <b-form-text id="username-help-block">
78 id="username"
79 v-model="form.username"
81 aria-describedby="username-help-block"
82 data-test-id="userManagement-input-username"
83 :state="getValidationState(v$.form.username)"
85 @input="v$.form.username.$touch()"
88 <template v-if="v$.form.username.required.$invalid">
[all …]
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.js24 $scope.tryLogin = function(host, username, password, event) { argument
28 $scope.login(host, username, password);
31 $scope.login = function(host, username, password) { argument
34 if (!username || username == '' || !password || password == '' ||
39 userModel.login(username, password, function(status, description) {
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot81 #username password role_id enabled
90 #username password role_id enabled
99 #username password role_id enabled
108 #username password role_id enabled wrong_password
117 #username password role_id enabled wrong_password
126 #username password role_id enabled wrong_password
135 #username password role_id enabled
144 #username password role_id enabled
153 #username password role_id enabled
162 #username password role_id enabled
[all …]
/openbmc/bmcweb/include/
H A Dlogin_routes.hpp38 std::string_view username; in handleLogin() local
66 username = *userStr; in handleLogin()
94 username = *userStr; in handleLogin()
112 username = *userStr; in handleLogin()
147 username = formpart.content; in handleLogin()
162 username = req.getHeaderValue("username"); in handleLogin()
166 if (!username.empty() && !password.empty()) in handleLogin()
168 int pamrc = pamAuthenticateUser(username, password, std::nullopt); in handleLogin()
178 .generateUserSession(username, req.ipAddress, std::nullopt, in handleLogin()
202 "User '" + session->username + "' logged out"; in handleLogout()
H A Dsessions.hpp47 std::string username; member
106 userSession->username = *thisValue; in fromJson()
129 if (userSession->uniqueId.empty() || userSession->username.empty() || in fromJson()
272 std::string_view username, const boost::asio::ip::address& clientIp, in generateUserSession() argument
292 std::string(username), in generateUserSession()
387 void removeSessionsByUsername(std::string_view username) in removeSessionsByUsername() argument
389 std::erase_if(authTokens, [username](const auto& value) { in removeSessionsByUsername()
394 return value.second->username == username; in removeSessionsByUsername()
399 std::string_view username, const std::shared_ptr<UserSession>& session) in removeSessionsByUsernameExceptSession() argument
401 std::erase_if(authTokens, [username, session](const auto& value) { in removeSessionsByUsernameExceptSession()
[all …]
H A Ddbus_privileges.hpp59 BMCWEB_LOG_DEBUG("userName = {} userRole = {}", session.username, userRole); in populateUserInfo()
104 req.session->username)); in isUserPrivileged()
137 const std::string& username, in requestUserInfo() argument
156 "xyz.openbmc_project.User.Manager", "GetUserInfo", username); in requestUserInfo()
170 req->session->username, asyncResp, in validatePrivilege()
181 const std::string& username, in getUserInfo() argument
186 username, asyncResp, in getUserInfo()
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js122 function createUser(username, password, role, enabled) { argument
124 APIUtils.createUser(username, password, role, enabled)
127 toastService.success(`User '${username}' has been created.`);
131 toastService.error(`Failed to create new user '${username}'.`);
142 originalUsername, username, password, role, enabled, locked) { argument
146 originalUsername, username, password, role, enabled, locked)
343 this.user.username = newUser ? '' : user.UserName;
367 const username =
368 form.username.$pristine ? null : form.username.$modelValue;
384 originalUsername, username, password, role, enabled,
[all …]
/openbmc/bmcweb/redfish-core/lib/
H A Dredfish_sessions.hpp44 res.jsonValue["UserName"] = session.username; in fillSessionObject()
123 if (req.session != nullptr && !session->username.empty() && in handleSessionDelete()
124 session->username != req.session->username) in handleSessionDelete()
210 const crow::Request& req, const std::string& username, in processAfterSessionCreation() argument
233 session->username)); in processAfterSessionCreation()
236 crow::getUserInfo(asyncResp, username, session, [asyncResp, session]() { in processAfterSessionCreation()
249 std::string username; in handleSessionCollectionPost() local
258 "UserName", username // in handleSessionCollectionPost()
263 if (password.empty() || username.empty() || in handleSessionCollectionPost()
266 if (username.empty()) in handleSessionCollectionPost()
[all …]

1234567891011