/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | client.py | 82 def __init__(self, username=None, password=None): argument 85 self.username = username 92 if self.username: 95 await self.auth(self.username, self.password) 238 async def auth(self, username, token): argument 239 result = await self.invoke({"auth": {"username": username, "token": token}}) 240 self.username = username 245 async def refresh_token(self, username=None): argument 247 if username: 248 m["username"] = username [all …]
|
H A D | server.py | 194 username = request.get("username", self.user.username) 195 if username == self.user.username: 196 request["username"] = self.user.username 201 username = "Anonymous user" 204 username = self.user.username 209 username, 269 def raise_no_user_error(self, username): argument 483 outhash_data["owner"] = self.user.username 629 username = str(request["username"]) 633 nonlocal username [all …]
|
H A D | sqlalchemy.py | 79 username = Column(Text, nullable=False) variable in Users 117 def __init__(self, url, username=None, password=None): argument 121 if username is not None: 122 self.url = self.url.set(username=username) 175 username=row.username, 501 async def _get_user(self, username): argument 505 Users.username, 509 Users.username == username, 514 async def lookup_user_token(self, username): argument 515 row = await self._get_user(username) [all …]
|
H A D | sqlite.py | 78 username=row["username"], 452 def _get_user(self, username): argument 459 "username": username, 464 async def lookup_user_token(self, username): argument 465 row = self._get_user(username) 470 async def lookup_user(self, username): argument 471 return map_user(self._get_user(username)) 473 async def set_user_token(self, username, token): argument 480 "username": username, 487 async def set_user_perms(self, username, permissions): argument [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 89 $username@$host\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 118 set_var_default interface [get_host_default_interface $host $username\ 121 $username@$host 'cat /sys/class/net/$interface/address'" \ 128 proc get_host_gateway {host username password {quiet 1}} { 146 $username@$host ip route | grep -i '^default' | awk '{print \$3}'" \ 153 proc get_host_default_interface {host username password {quiet 1} } { [all …]
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 31 username=`echo "$current_key" | awk -F":" '{ print $1}'` 34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then 35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'` 49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'` [all …]
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | UserManagementStore.js | 115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701 117 UserName: username, 127 username, field in AnonymousClassf362ce950801 136 username: username, property in AnonymousClassf362ce950901 143 { originalUsername, username, password, privilege, status, locked }, 146 if (username) data.UserName = username; 156 username: originalUsername, property in AnonymousClassf362ce950c01 166 username: originalUsername, property in AnonymousClassf362ce950d01 171 async deleteUser({ dispatch }, username) { argument 173 .delete(`/redfish/v1/AccountService/Accounts/${username}`) [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 615 std::string username = "user"; in TEST_F() local 617 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F() 618 EXPECT_CALL(*this, executeUserDelete(testing::StrEq(username))) in TEST_F() 624 deleteUser(username), in TEST_F() 626 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F() 632 const char* username = "user"; in TEST_F() local 634 UserMgr::createUser(username, {"redfish", "ssh"}, "priv-user", true)); in TEST_F() 635 EXPECT_CALL(*this, executeUserClearFailRecords(testing::StrEq(username))) in TEST_F() 641 deleteUser(username), in TEST_F() 643 EXPECT_NO_THROW(UserMgr::deleteUser(username)); in TEST_F() [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 16 <b-form-group label-for="username" :label="$t('pageLogin.username')"> 18 id="username" 19 v-model="userInfo.username" 20 aria-describedby="login-error-alert username-required" 21 :state="getValidationState(v$.userInfo.username)" 24 data-test-id="login-input-username" 25 @input="v$.userInfo.username.$touch()" 28 <b-form-invalid-feedback id="username-required" role="alert"> 29 <template v-if="v$.userInfo.username.required.$invalid"> 95 username: null, [all …]
|
/openbmc/qemu/crypto/ |
H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() 130 username = "qemu"; in qcrypto_tls_creds_psk_load() 132 if (lookup_key(pskfile, username, &key, errp) != 0) { in qcrypto_tls_creds_psk_load() [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | Redfish_Service_Validator.robot | 41 #username password role enabled 49 [Arguments] ${username} ${password} ${role} ${enabled} 50 [Teardown] Delete User Created ${username} 53 # username The username to be created. 57 # enabled Indicates whether the username being created 61 Redfish Create User ${username} ${password} ${role} ${enabled} 67 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username} 68 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging 80 [Arguments] ${username} 83 # username The username to be deleted. [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username'] 39 @{username} admin_user readonly_user disabled_user variable 110 [Teardown] Delete Users Via Redfish @{username} 113 # username privilege_level enabled 114 ${username}[0] Administrator ${True} 115 ${username}[1] ReadOnly ${True} 116 ${username}[2] Administrator ${False} 125 # username privilege_level enabled 149 Create User And Verify ${username}[0] Administrator ${True} 152 Delete Users Via GUI ${username}[0] [all …]
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | useradd_base.bbclass | 40 local username=`echo "$opts" | awk '{ print $NF }'` 41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 49 bbnote "${PN}: user $username already exists, not re-creating it" 58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr… 59 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 68 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 103 local username=`echo "$opts" | awk '{ print $NF }'` [all …]
|
/openbmc/qemu/qga/ |
H A D | commands-windows-ssh.c | 47 g_free(info->username); in free_userInfo() 104 static char *get_ssh_folder(const char *username, const bool isAdmin, in get_ssh_folder() argument 124 return g_build_filename(profilesDir, username, ".ssh", NULL); in get_ssh_folder() 148 userInfo->username); in create_acl_user() 176 userInfo->username, setResult); in create_acl_user() 391 userInfo->username); in set_file_permissions() 459 static bool get_user_info(PWindowsUserInfo *userInfo, const char *username, in get_user_info() argument 472 wideUserName = g_utf8_to_utf16(username, -1, NULL, NULL, &gerr); in get_user_info() 489 error_setg(errp, "User %s was not found", username); in get_user_info() 501 uData->username = g_strdup(username); in get_user_info() [all …]
|
H A D | commands-posix-ssh.c | 39 #define g_unix_get_passwd_entry(username, err) \ argument 40 test_get_passwd_entry(username, err) 44 get_passwd_entry(const char *username, Error **errp) in get_passwd_entry() argument 49 p = g_unix_get_passwd_entry(username, &err); in get_passwd_entry() 52 username, err->message); in get_passwd_entry() 113 qmp_guest_ssh_add_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_add_authorized_keys() argument 130 p = get_passwd_entry(username, errp); in qmp_guest_ssh_add_authorized_keys() 163 qmp_guest_ssh_remove_authorized_keys(const char *username, strList *keys, in qmp_guest_ssh_remove_authorized_keys() argument 177 p = get_passwd_entry(username, errp); in qmp_guest_ssh_remove_authorized_keys() 212 qmp_guest_ssh_get_authorized_keys(const char *username, Error **errp) in qmp_guest_ssh_get_authorized_keys() argument [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 21 ${xpath_input_user} //input[@id="username"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 93 # username Name of the user to be created. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 106 # username User name. 114 Input Text ${xpath_input_user} ${username} 132 [Arguments] ${username} 135 # username Name of the user to be created. 137 ${result}= Run Keyword And Return Status Page Should Contain ${username} [all …]
|
/openbmc/openbmc/poky/bitbake/lib/layerindexlib/ |
H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 151 username=up.username 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 …parsed = _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, ret… 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 65 :label="$t('pageUserManagement.modal.username')" 66 label-for="username" 68 <b-form-text id="username-help-block"> 78 id="username" 79 v-model="form.username" 81 aria-describedby="username-help-block" 82 data-test-id="userManagement-input-username" 83 :state="getValidationState(v$.form.username)" 85 @input="v$.form.username.$touch()" 88 <template v-if="v$.form.username.required.$invalid"> [all …]
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.js | 24 $scope.tryLogin = function(host, username, password, event) { argument 28 $scope.login(host, username, password); 31 $scope.login = function(host, username, password) { argument 34 if (!username || username == '' || !password || password == '' || 39 userModel.login(username, password, function(status, description) {
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 108 #username password role_id enabled wrong_password 117 #username password role_id enabled wrong_password 126 #username password role_id enabled wrong_password 135 #username password role_id enabled 144 #username password role_id enabled 153 #username password role_id enabled 162 #username password role_id enabled [all …]
|
/openbmc/bmcweb/include/ |
H A D | login_routes.hpp | 38 std::string_view username; in handleLogin() local 66 username = *userStr; in handleLogin() 94 username = *userStr; in handleLogin() 112 username = *userStr; in handleLogin() 147 username = formpart.content; in handleLogin() 162 username = req.getHeaderValue("username"); in handleLogin() 166 if (!username.empty() && !password.empty()) in handleLogin() 168 int pamrc = pamAuthenticateUser(username, password, std::nullopt); in handleLogin() 178 .generateUserSession(username, req.ipAddress, std::nullopt, in handleLogin() 202 "User '" + session->username + "' logged out"; in handleLogout()
|
H A D | sessions.hpp | 47 std::string username; member 106 userSession->username = *thisValue; in fromJson() 129 if (userSession->uniqueId.empty() || userSession->username.empty() || in fromJson() 272 std::string_view username, const boost::asio::ip::address& clientIp, in generateUserSession() argument 292 std::string(username), in generateUserSession() 387 void removeSessionsByUsername(std::string_view username) in removeSessionsByUsername() argument 389 std::erase_if(authTokens, [username](const auto& value) { in removeSessionsByUsername() 394 return value.second->username == username; in removeSessionsByUsername() 399 std::string_view username, const std::shared_ptr<UserSession>& session) in removeSessionsByUsernameExceptSession() argument 401 std::erase_if(authTokens, [username, session](const auto& value) { in removeSessionsByUsernameExceptSession() [all …]
|
H A D | dbus_privileges.hpp | 59 BMCWEB_LOG_DEBUG("userName = {} userRole = {}", session.username, userRole); in populateUserInfo() 104 req.session->username)); in isUserPrivileged() 137 const std::string& username, in requestUserInfo() argument 156 "xyz.openbmc_project.User.Manager", "GetUserInfo", username); in requestUserInfo() 170 req->session->username, asyncResp, in validatePrivilege() 181 const std::string& username, in getUserInfo() argument 186 username, asyncResp, in getUserInfo()
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 127 toastService.success(`User '${username}' has been created.`); 131 toastService.error(`Failed to create new user '${username}'.`); 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) 343 this.user.username = newUser ? '' : user.UserName; 367 const username = 368 form.username.$pristine ? null : form.username.$modelValue; 384 originalUsername, username, password, role, enabled, [all …]
|
/openbmc/bmcweb/redfish-core/lib/ |
H A D | redfish_sessions.hpp | 44 res.jsonValue["UserName"] = session.username; in fillSessionObject() 123 if (req.session != nullptr && !session->username.empty() && in handleSessionDelete() 124 session->username != req.session->username) in handleSessionDelete() 210 const crow::Request& req, const std::string& username, in processAfterSessionCreation() argument 233 session->username)); in processAfterSessionCreation() 236 crow::getUserInfo(asyncResp, username, session, [asyncResp, session]() { in processAfterSessionCreation() 249 std::string username; in handleSessionCollectionPost() local 258 "UserName", username // in handleSessionCollectionPost() 263 if (password.empty() || username.empty() || in handleSessionCollectionPost() 266 if (username.empty()) in handleSessionCollectionPost() [all …]
|