Home
last modified time | relevance | path

Searched refs:users (Results 1 – 25 of 578) sorted by relevance

12345678910>>...24

/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js77 .then((users) => {
78 $scope.localUsers = users;
79 $scope.tableData = users.map(mapTableData);
164 function deleteUsers(users = []) { argument
167 users.map((user) => APIUtils.deleteUser(user.UserName));
171 if (users.length > 1) {
174 message = `User '${users[0].UserName}' has been removed.`
181 if (users.length > 1) {
184 message = `Failed to remove user '${users[0].UserName}'.`
199 function updateUserStatus(users = [], enabled = true) { argument
[all …]
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/
H A Dusermode_1.114.bb3 programs to be run with superuser privileges by ordinary users, and several \
4 graphical tools for users: \
5 * userinfo allows users to change their finger information. \
6 * usermount lets users mount, unmount, and format filesystems. \
7 * userpasswd allows users to change their passwords. \
/openbmc/phosphor-webui/app/access-control/styles/
H A Duser-accounts.scss1 .local-users {
11 .modal__local-users,
12 .modal__local-users-settings {
19 .modal__local-users {
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/
H A Dvsftpd.user_list2 # If userlist_deny=NO, only allow users in this file
3 # If userlist_deny=YES (default), never allow users in this file, and
6 # for users that are denied.
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DUserManagementStore.js75 .then((users) => {
76 const userData = users.map((user) => user.data);
191 async deleteUsers({ dispatch }, users) { argument
192 const promises = users.map(({ username }) => {
231 async enableUsers({ dispatch }, users) { argument
235 const promises = users.map(({ username }) => {
274 async disableUsers({ dispatch }, users) { argument
278 const promises = users.map(({ username }) => {
/openbmc/openbmc/poky/meta/recipes-extended/sudo/
H A Dsudo.inc1 SUMMARY = "Provide limited super user privileges to specific users"
2 …do (superuser do) allows a system administrator to give certain users (or groups of users) the abi…
42 # the directory is accessible by all users. Otherwise the mkinstalldirs
45 # we want (i.e, users would not be able to access /var/lib).
/openbmc/sdbusplus/example/
H A Dlist-users.cpp23 auto users = reply.unpack<return_type>(); in main() local
25 for (auto& user : users) in main()
H A Dmeson.build1 executable('list-users', 'list-users.cpp', dependencies: sdbusplus_dep)
/openbmc/qemu/docs/system/
H A Dtarget-rx.rst22 https://osdn.net/users/ysato/pf/qemu/dl/u-boot.bin.gz
28 https://osdn.net/users/ysato/pf/qemu/dl/zImage
31 https://osdn.net/users/ysato/pf/qemu/dl/rx-virt.dtb
/openbmc/qemu/backends/
H A Diommufd.c36 be->users = 0; in iommufd_backend_init()
70 return !be->users; in iommufd_backend_can_be_deleted()
126 if (be->owned && !be->users) { in iommufd_backend_connect()
133 if (!be->users && !vfio_iommufd_cpr_register_iommufd(be, errp)) { in iommufd_backend_connect()
140 be->users++; in iommufd_backend_connect()
142 trace_iommufd_backend_connect(be->fd, be->owned, be->users); in iommufd_backend_connect()
148 if (!be->users) { in iommufd_backend_disconnect()
151 be->users--; in iommufd_backend_disconnect()
152 if (!be->users) { in iommufd_backend_disconnect()
161 trace_iommufd_backend_disconnect(be->fd, be->users); in iommufd_backend_disconnect()
[all...]
H A Dtrace-events11 iommufd_backend_connect(int fd, bool owned, uint32_t users) "fd=%d owned=%d users=%d"
12 iommufd_backend_disconnect(int fd, uint32_t users) "fd=%d users=%d"
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-extended/polkit-gnome/polkit-gnome/
H A D0001-Select-the-current-user-to-authenticate-with-by-defa.patch31 - for (n = 0; dialog->priv->users[n] != NULL; n++)
32 + for (i = 0, n = 0; dialog->priv->users[n] != NULL; n++)
37 USERNAME_COL, dialog->priv->users[n],
45 + dialog->priv->selected_user = g_strdup (dialog->priv->users[n]);
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/
H A DAccountPermission.pm529 my @users = split /\s*,\s*/,$users_section;
530 foreach my $user (@users) {
627 my @users = split ',',($group_entries[3]);
634 foreach my $user (@users) {
978 my @users;
984 push (@users,$1);
987 return @users;
/openbmc/openbmc/poky/meta/recipes-rt/rt-tests/files/
H A D0001-sched_attr-Do-not-define-for-glibc-2.41.patch16 Upstream-Status: Submitted [https://lore.kernel.org/linux-rt-users/20250128230838.2311298-1-raj.khe…
20 Cc: rt-users <linux-rt-users@vger.kernel.org>
/openbmc/openbmc/poky/meta/recipes-core/base-passwd/base-passwd/
H A D0001-Add-a-shutdown-group.patch7 correctly. Any users that want to use shutdown like the xuser should
25 users:*:100:
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/
H A D0010-oprofile-Determine-the-root-home-directory-dynamical.patch28 …ename>/root</filename> to avoid storing sample data files in locations accessible by regular users.
30 …ename>~root</filename> to avoid storing sample data files in locations accessible by regular users.
41 …filename">/root</code> to avoid storing sample data files in locations accessible by regular users.
43 …filename">~root</code> to avoid storing sample data files in locations accessible by regular users.
/openbmc/openbmc-tools/tof-voters/
H A DREADME.md21 The above will yield a JSON dictionary of "users:points" where 'qualified' is
22 set in the users' dictionary from `report.json` like:
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dcustom-template-configuration-directory.rst7 use by other users, you might want to provide a custom build configuration
27 To use those saved templates as a starting point for a build, users should point
48 users usage information about the build they're setting up
51 available to the users, and provide useful summaries and detailed usage notes.
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DMMIXware4 no changes whatsoever are made. All users are asked to help keep
12 which users can easily make minor alterations without modifying
H A DSpencer-948 …ot be misrepresented, either by explicit claim or by omission. Since few users ever read sources,…
10 …and must not be misrepresented as being the original software. Since few users ever read sources,…
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libsub/
H A Dlibsub-exporter-progressive-perl_0.001013.bb4 This module is a \"Sub::Exporter\" wrapper that will let your users just use \
6 \"Sub::Exporter\" if your users try to use \"Sub::Exporter's\" more advanced \
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-pychromecast/
H A D0001-Update-setuptools-requirement-from-79.0-65.6-to-65.6.patch2 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
22 Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
H A D0001-Update-setuptools-requirement-from-80.0-65.6-to-65.6.patch2 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
22 Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
/openbmc/openbmc-test-automation/lib/
H A Dbmc_redfish_utils.robot377 [Documentation] Create users with different roles.
378 [Arguments] ${users} ${force}=${False}
381 # users Dictionary of roles and user credentials to be created.
385 FOR ${role} IN @{users}
386 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force}
391 [Documentation] Delete BMC users via redfish.
392 [Arguments] ${users}
395 # users Dictionary of roles and user credentials to be deleted.
397 FOR ${role} IN @{users}
398 Redfish.Delete /redfish/v1/AccountService/Accounts/${users['${role}'][0]}
/openbmc/openbmc/poky/meta-skeleton/recipes-skeleton/useradd/
H A Duseradd-example.bb30 # useradd command. Multiple users can be created by separating
31 # the commands with a semicolon. Here we'll create two users,
61 # The new users and groups are created before the do_install

12345678910>>...24