| /openbmc/phosphor-webui/app/access-control/controllers/ |
| H A D | user-controller.js | 77 .then((users) => { 78 $scope.localUsers = users; 79 $scope.tableData = users.map(mapTableData); 164 function deleteUsers(users = []) { argument 167 users.map((user) => APIUtils.deleteUser(user.UserName)); 171 if (users.length > 1) { 174 message = `User '${users[0].UserName}' has been removed.` 181 if (users.length > 1) { 184 message = `Failed to remove user '${users[0].UserName}'.` 199 function updateUserStatus(users = [], enabled = true) { argument [all …]
|
| /openbmc/openbmc/meta-openembedded/meta-gnome/recipes-support/usermode/ |
| H A D | usermode_1.114.bb | 3 programs to be run with superuser privileges by ordinary users, and several \ 4 graphical tools for users: \ 5 * userinfo allows users to change their finger information. \ 6 * usermount lets users mount, unmount, and format filesystems. \ 7 * userpasswd allows users to change their passwords. \
|
| /openbmc/phosphor-webui/app/access-control/styles/ |
| H A D | user-accounts.scss | 1 .local-users { 11 .modal__local-users, 12 .modal__local-users-settings { 19 .modal__local-users {
|
| /openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/files/ |
| H A D | vsftpd.user_list | 2 # If userlist_deny=NO, only allow users in this file 3 # If userlist_deny=YES (default), never allow users in this file, and 6 # for users that are denied.
|
| /openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
| H A D | UserManagementStore.js | 75 .then((users) => { 76 const userData = users.map((user) => user.data); 191 async deleteUsers({ dispatch }, users) { argument 192 const promises = users.map(({ username }) => { 231 async enableUsers({ dispatch }, users) { argument 235 const promises = users.map(({ username }) => { 274 async disableUsers({ dispatch }, users) { argument 278 const promises = users.map(({ username }) => {
|
| /openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
| H A D | sudo.inc | 1 SUMMARY = "Provide limited super user privileges to specific users" 2 …do (superuser do) allows a system administrator to give certain users (or groups of users) the abi… 42 # the directory is accessible by all users. Otherwise the mkinstalldirs 45 # we want (i.e, users would not be able to access /var/lib).
|
| /openbmc/sdbusplus/example/ |
| H A D | list-users.cpp | 23 auto users = reply.unpack<return_type>(); in main() local 25 for (auto& user : users) in main()
|
| H A D | meson.build | 1 executable('list-users', 'list-users.cpp', dependencies: sdbusplus_dep)
|
| /openbmc/qemu/docs/system/ |
| H A D | target-rx.rst | 22 https://osdn.net/users/ysato/pf/qemu/dl/u-boot.bin.gz 28 https://osdn.net/users/ysato/pf/qemu/dl/zImage 31 https://osdn.net/users/ysato/pf/qemu/dl/rx-virt.dtb
|
| /openbmc/qemu/backends/ |
| H A D | iommufd.c | 36 be->users = 0; in iommufd_backend_init() 70 return !be->users; in iommufd_backend_can_be_deleted() 126 if (be->owned && !be->users) { in iommufd_backend_connect() 133 if (!be->users && !vfio_iommufd_cpr_register_iommufd(be, errp)) { in iommufd_backend_connect() 140 be->users++; in iommufd_backend_connect() 142 trace_iommufd_backend_connect(be->fd, be->owned, be->users); in iommufd_backend_connect() 148 if (!be->users) { in iommufd_backend_disconnect() 151 be->users--; in iommufd_backend_disconnect() 152 if (!be->users) { in iommufd_backend_disconnect() 161 trace_iommufd_backend_disconnect(be->fd, be->users); in iommufd_backend_disconnect() [all...] |
| H A D | trace-events | 11 iommufd_backend_connect(int fd, bool owned, uint32_t users) "fd=%d owned=%d users=%d" 12 iommufd_backend_disconnect(int fd, uint32_t users) "fd=%d users=%d"
|
| /openbmc/openbmc/meta-openembedded/meta-gnome/recipes-extended/polkit-gnome/polkit-gnome/ |
| H A D | 0001-Select-the-current-user-to-authenticate-with-by-defa.patch | 31 - for (n = 0; dialog->priv->users[n] != NULL; n++) 32 + for (i = 0, n = 0; dialog->priv->users[n] != NULL; n++) 37 USERNAME_COL, dialog->priv->users[n], 45 + dialog->priv->selected_user = g_strdup (dialog->priv->users[n]);
|
| /openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
| H A D | AccountPermission.pm | 529 my @users = split /\s*,\s*/,$users_section; 530 foreach my $user (@users) { 627 my @users = split ',',($group_entries[3]); 634 foreach my $user (@users) { 978 my @users; 984 push (@users,$1); 987 return @users;
|
| /openbmc/openbmc/poky/meta/recipes-rt/rt-tests/files/ |
| H A D | 0001-sched_attr-Do-not-define-for-glibc-2.41.patch | 16 Upstream-Status: Submitted [https://lore.kernel.org/linux-rt-users/20250128230838.2311298-1-raj.khe… 20 Cc: rt-users <linux-rt-users@vger.kernel.org>
|
| /openbmc/openbmc/poky/meta/recipes-core/base-passwd/base-passwd/ |
| H A D | 0001-Add-a-shutdown-group.patch | 7 correctly. Any users that want to use shutdown like the xuser should 25 users:*:100:
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-kernel/oprofile/oprofile/ |
| H A D | 0010-oprofile-Determine-the-root-home-directory-dynamical.patch | 28 …ename>/root</filename> to avoid storing sample data files in locations accessible by regular users. 30 …ename>~root</filename> to avoid storing sample data files in locations accessible by regular users. 41 …filename">/root</code> to avoid storing sample data files in locations accessible by regular users. 43 …filename">~root</code> to avoid storing sample data files in locations accessible by regular users.
|
| /openbmc/openbmc-tools/tof-voters/ |
| H A D | README.md | 21 The above will yield a JSON dictionary of "users:points" where 'qualified' is 22 set in the users' dictionary from `report.json` like:
|
| /openbmc/openbmc/poky/documentation/dev-manual/ |
| H A D | custom-template-configuration-directory.rst | 7 use by other users, you might want to provide a custom build configuration 27 To use those saved templates as a starting point for a build, users should point 48 users usage information about the build they're setting up 51 available to the users, and provide useful summaries and detailed usage notes.
|
| /openbmc/openbmc/poky/meta/files/common-licenses/ |
| H A D | MMIXware | 4 no changes whatsoever are made. All users are asked to help keep 12 which users can easily make minor alterations without modifying
|
| H A D | Spencer-94 | 8 …ot be misrepresented, either by explicit claim or by omission. Since few users ever read sources,… 10 …and must not be misrepresented as being the original software. Since few users ever read sources,…
|
| /openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libsub/ |
| H A D | libsub-exporter-progressive-perl_0.001013.bb | 4 This module is a \"Sub::Exporter\" wrapper that will let your users just use \ 6 \"Sub::Exporter\" if your users try to use \"Sub::Exporter's\" more advanced \
|
| /openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-pychromecast/ |
| H A D | 0001-Update-setuptools-requirement-from-79.0-65.6-to-65.6.patch | 2 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> 22 Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
| H A D | 0001-Update-setuptools-requirement-from-80.0-65.6-to-65.6.patch | 2 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> 22 Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
| /openbmc/openbmc-test-automation/lib/ |
| H A D | bmc_redfish_utils.robot | 377 [Documentation] Create users with different roles. 378 [Arguments] ${users} ${force}=${False} 381 # users Dictionary of roles and user credentials to be created. 385 FOR ${role} IN @{users} 386 … Redfish Create User ${users['${role}'][0]} ${users['${role}']}[1] ${role} ${True} ${force} 391 [Documentation] Delete BMC users via redfish. 392 [Arguments] ${users} 395 # users Dictionary of roles and user credentials to be deleted. 397 FOR ${role} IN @{users} 398 Redfish.Delete /redfish/v1/AccountService/Accounts/${users['${role}'][0]}
|
| /openbmc/openbmc/poky/meta-skeleton/recipes-skeleton/useradd/ |
| H A D | useradd-example.bb | 30 # useradd command. Multiple users can be created by separating 31 # the commands with a semicolon. Here we'll create two users, 61 # The new users and groups are created before the do_install
|