/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | client.py | 82 def __init__(self, username=None, password=None): argument 85 self.username = username 92 if self.username: 95 await self.auth(self.username, self.password) 238 async def auth(self, username, token): argument 239 result = await self.invoke({"auth": {"username": username, "token": token}}) 240 self.username = username 245 async def refresh_token(self, username=None): argument 247 if username: 248 m["username"] = username [all …]
|
H A D | server.py | 183 If allow_self_service is True, and the "username" property in the request 194 username = request.get("username", self.user.username) 195 if username == self.user.username: 196 request["username"] = self.user.username 201 username = "Anonymous user" 204 username = self.user.username 209 username, 215 f"{username} is not allowed to access permissions(s) {', '.join(permissions)}" 269 def raise_no_user_error(self, username): argument 270 raise bb.asyncrpc.InvokeError(f"No user named '{username}' exists") [all …]
|
H A D | sqlite.py | 40 ("username", "TEXT NOT NULL", "UNIQUE"), 78 username=row["username"], 452 def _get_user(self, username): argument 456 SELECT username, permissions, token FROM users WHERE username=:username 459 "username": username, 464 async def lookup_user_token(self, username): argument 465 row = self._get_user(username) 470 async def lookup_user(self, username): argument 471 return map_user(self._get_user(username)) 473 async def set_user_token(self, username, token): argument [all …]
|
H A D | sqlalchemy.py | 79 username = Column(Text, nullable=False) variable in Users 83 __table_args__ = (UniqueConstraint("username"),) 117 def __init__(self, url, username=None, password=None): argument 121 if username is not None: 122 self.url = self.url.set(username=username) 175 username=row.username, 501 async def _get_user(self, username): argument 505 Users.username, 509 Users.username == username, 514 async def lookup_user_token(self, username): argument [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | host.tcl | 46 proc get_host_domain {host username password {quiet 1}} { 57 # username The host username. 64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\ 71 proc get_host_name_servers {host username password {quiet 1}} { 82 # username The host username. 89 $username@$host\ 97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} { 110 # username The host username. 118 set_var_default interface [get_host_default_interface $host $username\ 121 $username@$host 'cat /sys/class/net/$interface/address'" \ [all …]
|
/openbmc/phosphor-user-manager/ |
H A D | user_mgr.cpp | 202 bool UserMgr::isUserExist(const std::string& userName) in isUserExist() 204 if (userName.empty()) in isUserExist() 210 if (usersList.find(userName) == usersList.end()) in isUserExist() 217 void UserMgr::throwForUserDoesNotExist(const std::string& userName) in throwForUserDoesNotExist() 219 if (!isUserExist(userName)) in throwForUserDoesNotExist() 221 lg2::error("User '{USERNAME}' does not exist", "USERNAME", userName); in throwForUserDoesNotExist() 240 void UserMgr::throwForUserExists(const std::string& userName) in throwForUserExists() 242 if (isUserExist(userName)) in throwForUserExists() 201 isUserExist(const std::string & userName) isUserExist() argument 216 throwForUserDoesNotExist(const std::string & userName) throwForUserDoesNotExist() argument 239 throwForUserExists(const std::string & userName) throwForUserExists() argument 249 throwForUserNameConstraints(const std::string & userName,const std::vector<std::string> & groupNames) throwForUserNameConstraints() argument 360 createUser(std::string userName,std::vector<std::string> groupNames,std::string priv,bool enabled) createUser() argument 409 deleteUser(std::string userName) deleteUser() argument 495 renameUser(std::string userName,std::string newUserName) renameUser() argument 531 updateGroupsAndPriv(const std::string & userName,std::vector<std::string> groupNames,const std::string & priv) updateGroupsAndPriv() argument 762 userEnable(const std::string & userName,bool enabled) userEnable() argument 854 userLockedForFailedAttempt(const std::string & userName) userLockedForFailedAttempt() argument 877 userLockedForFailedAttempt(const std::string & userName,const bool & value) userLockedForFailedAttempt() argument 901 userPasswordExpired(const std::string & userName) userPasswordExpired() argument 981 std::string userName(pwp->pw_name); getUserAndSshGrpList() local 1009 isUserEnabled(const std::string & userName) isUserEnabled() argument 1150 isGroupMember(const std::string & userName,gid_t primaryGid,const std::string & groupName) const isGroupMember() argument 1224 getUserInfo(std::string userName) getUserInfo() argument 1542 executeUserAdd(const char * userName,const char * groups,bool sshRequested,bool enabled) executeUserAdd() argument 1552 executeUserDelete(const char * userName) executeUserDelete() argument 1557 executeUserClearFailRecords(const char * userName) executeUserClearFailRecords() argument 1562 executeUserRename(const char * userName,const char * newUserName) executeUserRename() argument 1570 executeUserModify(const char * userName,const char * newGroups,bool sshRequested) executeUserModify() argument 1577 executeUserModifyUserEnable(const char * userName,bool enabled) executeUserModifyUserEnable() argument 1585 getFailedAttempt(const char * userName) getFailedAttempt() argument 1619 secretKeyRequired(std::string userName) secretKeyRequired() argument [all...] |
H A D | user_mgr.hpp | 145 * @param[in] userName - Name of the user which has to be created 150 void createUser(std::string userName, std::vector<std::string> groupNames, 156 * @param[in] userName - current name of the user 159 void renameUser(std::string userName, std::string newUserName) override; 164 * @param[in] userName - Name of the user which has to be deleted 166 void deleteUser(std::string userName); 171 * @param[in] userName - user name, for which update is requested 175 void updateGroupsAndPriv(const std::string& userName, 182 * @param[in] userName - user name, for which update is requested 185 void userEnable(const std::string& userName, boo [all...] |
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username'] 39 @{username} admin_user readonly_user disabled_user variable 110 [Teardown] Delete Users Via Redfish @{username} 113 # username privilege_level enabled 114 ${username}[0] Administrator ${True} 115 ${username}[1] ReadOnly ${True} 116 ${username}[2] Administrator ${False} 125 # username privilege_level enabled 149 Create User And Verify ${username}[0] Administrator ${True} 152 Delete Users Via GUI ${username}[0] [all …]
|
/openbmc/phosphor-user-manager/test/ |
H A D | user_mgr_test.cpp | 40 void createLocalUser(const std::string& userName, in createLocalUser() argument 45 tempObjPath /= userName; in createLocalUser() 58 userName, std::make_unique<phosphor::user::Users>( in createLocalUser() 106 std::string userName = "user"; in TEST_F() local 109 EXPECT_CALL(mockManager, getPrimaryGroup(userName)) in TEST_F() 111 EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), in TEST_F() 118 std::string userName = "testUser"; in TEST_F() local 122 createLocalUser(userName, groups, privilege, true); in TEST_F() 123 EXPECT_CALL(mockManager, userLockedForFailedAttempt(userName)).Times(1); in TEST_F() 124 userInfo = mockManager.getUserInfo(userName); in TEST_F() 138 std::string userName = "ldapUser"; TEST_F() local 160 std::string userName = "ldapUser"; TEST_F() local 615 std::string username = "user"; TEST_F() local 632 const char* username = "user"; TEST_F() local 680 std::string username = "user001"; TEST_F() local 703 std::string username = "user001"; TEST_F() local 738 std::string username = "user001"; TEST_F() local 754 std::string username = "user001"; TEST_F() local 888 std::string username = "user001"; TEST_F() local 904 std::string username = "user001"; TEST_F() local 918 std::string username = "user001"; TEST_F() local 948 std::string username = "user001"; TEST_F() local 964 std::string username = "user001"; TEST_F() local 978 std::string username = "user001"; TEST_F() local 995 std::string username = "user001"; TEST_F() local [all...] |
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 81 #username password role_id enabled 90 #username password role_id enabled 99 #username password role_id enabled 108 #username password role_id enabled wrong_password 117 #username password role_id enabled wrong_password 126 #username password role_id enabled wrong_password 135 #username password role_id enabled 144 #username password role_id enabled 153 #username password role_id enabled 162 #username password role_id enabled [all …]
|
H A D | test_ipmi_redfish_user.robot | 35 ... UserName=${random_username} Password=${valid_password} 43 Verify IPMI Username And Password ${random_username} ${valid_password} 55 ... UserName=${random_username} Password=${valid_password} 65 Verify IPMI Username And Password ${random_username} ${valid_password2} 68 ... Verify IPMI Username And Password ${random_username} ${valid_password} 80 ... UserName=${random_username} Password=${valid_password} 115 ... UserName=${random_username} Password=${valid_password} 125 ... Verify IPMI Username And Password ${random_username} ${valid_password} 132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 138 Redfish.Login ${username} ${valid_password} [all …]
|
/openbmc/openbmc/meta-phosphor/classes/ |
H A D | phosphor-deploy-ssh-keys.bbclass | 31 username=`echo "$current_key" | awk -F":" '{ print $1}'` 34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then 35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}" 38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then 39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/ 42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then 43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys 48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'` 49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'` [all …]
|
/openbmc/phosphor-host-ipmid/user_channel/ |
H A D | user_mgmt.cpp | 151 int getUserNameFromPath(const std::string& path, std::string& userName) in getUserNameFromPath() argument 154 userName.assign(objPath.filename()); in getUserNameFromPath() 159 const std::string& userName, const std::string& priv, in userUpdateHelper() argument 165 if (usrAccess.addUserEntry(userName, priv, enabled) == false) in userUpdateHelper() 177 reinterpret_cast<char*>(userData->user[usrIndex].userName), 0, in userUpdateHelper() 179 if (userName == curName) in userUpdateHelper() 188 "USER_NAME", userName, "USER_EVENT", userEvent); in userUpdateHelper() 223 static_cast<uint8_t*>(userData->user[usrIndex].userName), in userUpdateHelper() 224 static_cast<uint8_t*>(userData->user[usrIndex].userName) + in userUpdateHelper() 225 sizeof(userData->user[usrIndex].userName), in userUpdateHelper() [all …]
|
H A D | user_layer.cpp | 36 SecureString ipmiUserGetPassword(const std::string& userName) in ipmiUserGetPassword() argument 38 return passwdMgr.getPasswdByUserName(userName); in ipmiUserGetPassword() 41 Cc ipmiClearUserEntryPassword(const std::string& userName) in ipmiClearUserEntryPassword() argument 43 if (passwdMgr.updateUserEntry(userName, "") != 0) in ipmiClearUserEntryPassword() 50 Cc ipmiRenameUserEntryPassword(const std::string& userName, in ipmiRenameUserEntryPassword() argument 53 if (passwdMgr.updateUserEntry(userName, newUserName) != 0) in ipmiRenameUserEntryPassword() 70 uint8_t ipmiUserGetUserId(const std::string& userName) in ipmiUserGetUserId() argument 72 return getUserAccessObject().getUserId(userName); in ipmiUserGetUserId() 75 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName) in ipmiUserSetUserName() argument 77 std::string newUser(userName, 0, ipmiMaxUserName); in ipmiUserSetUserName() [all …]
|
H A D | user_layer.hpp | 89 * @param[in] userName - user name 93 SecureString ipmiUserGetPassword(const std::string& userName); 96 * username 98 * @param[in] userName - user name to be removed 102 Cc ipmiClearUserEntryPassword(const std::string& userName); 107 * @param[in] userName - user name which has to be renamed 112 Cc ipmiRenameUserEntryPassword(const std::string& userName, 133 * @param[in] userName - user name 137 uint8_t ipmiUserGetUserId(const std::string& userName); 142 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName) [all …]
|
/openbmc/webui-vue/src/views/Login/ |
H A D | Login.vue | 16 <b-form-group label-for="username" :label="$t('pageLogin.username')"> 18 id="username" 19 v-model="userInfo.username" 20 aria-describedby="login-error-alert username-required" 21 :state="getValidationState(v$.userInfo.username)" 24 data-test-id="login-input-username" 25 @input="v$.userInfo.username.$touch()" 28 <b-form-invalid-feedback id="username-required" role="alert"> 29 <template v-if="v$.userInfo.username.required.$invalid"> 95 username: null, [all …]
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | useradd_base.bbclass | 40 local username=`echo "$opts" | awk '{ print $NF }'` 41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 49 bbnote "${PN}: user $username already exists, not re-creating it" 58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr… 59 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 68 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 103 local username=`echo "$opts" | awk '{ print $NF }'` [all …]
|
/openbmc/phosphor-webui/app/access-control/controllers/ |
H A D | user-controller.js | 22 {label: 'Username'}, {label: 'Privilege'}, {label: 'Account status'} 31 * Returns true if username is 'root' 35 return user.UserName === 'root' ? true : false; 55 user.uiData = [user.UserName, user.RoleId, accountStatus]; 122 function createUser(username, password, role, enabled) { argument 124 APIUtils.createUser(username, password, role, enabled) 127 toastService.success(`User '${username}' has been created.`); 131 toastService.error(`Failed to create new user '${username}'.`); 142 originalUsername, username, password, role, enabled, locked) { argument 146 originalUsername, username, password, role, enabled, locked) [all …]
|
/openbmc/phosphor-webui/app/login/controllers/ |
H A D | login-controller.html | 11 <b>Invalid username or password.</b> 15 …in__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event… 21 <label for="username">Username</label> 22 …d="username" name="username" has-error="invalidCredentials && login__form.$pristine" required ng-m… 23 …<div ng-messages="login__form.username.$error" class="form-error" ng-class="{'visible' : login__fo… 28 …orm.$pristine" required ng-model="password" ng-keydown="tryLogin(host, username, password, $event… 33 …width" type="button" value="Log in" role="button" ng-click="login(host, username, password); submi…
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | Redfish_Service_Validator.robot | 41 #username password role enabled 49 [Arguments] ${username} ${password} ${role} ${enabled} 50 [Teardown] Delete User Created ${username} 53 # username The username to be created. 57 # enabled Indicates whether the username being created 61 Redfish Create User ${username} ${password} ${role} ${enabled} 67 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username} 68 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging 80 [Arguments] ${username} 83 # username The username to be deleted. [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 21 ${xpath_input_user} //input[@id="username"] 89 [Arguments] ${username} ${password} ${privilege}=Administrator 93 # username Name of the user to be created. 99 Add User Details ${username} ${password} ${privilege} ${account_status} 103 [Arguments] ${username} ${password} ${privilege} ${account_status} 106 # username User name. 117 Input Text ${xpath_input_user} ${username} 135 [Arguments] ${username} 138 # username Name of the user to be created. 140 ${result}= Run Keyword And Return Status Page Should Contain ${username} [all …]
|
/openbmc/qemu/crypto/ |
H A D | tlscredspsk.c | 35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument 38 const size_t ulen = strlen(username); in lookup_key() 54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key() 61 error_setg(errp, "Username %s not found in PSK file %s", in lookup_key() 62 username, pskfile); in lookup_key() 76 const char *username; in qcrypto_tls_creds_psk_load() local 85 if (creds->username) { in qcrypto_tls_creds_psk_load() 86 error_setg(errp, "username should not be set when endpoint=server"); in qcrypto_tls_creds_psk_load() 127 if (creds->username) { in qcrypto_tls_creds_psk_load() 128 username = creds->username; in qcrypto_tls_creds_psk_load() [all …]
|
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/ |
H A D | UserManagementStore.js | 115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701 117 UserName: username, property in UserManagementStore.actions.createUser.data 127 username, field in AnonymousClassf362ce950801 136 username: username, property in AnonymousClassf362ce950901 143 { originalUsername, username, password, privilege, status, locked }, 146 if (username) data.UserName = username; 156 username: originalUsername, property in AnonymousClassf362ce950c01 166 username: originalUsername, property in AnonymousClassf362ce950d01 171 async deleteUser({ dispatch }, username) { argument 173 .delete(`/redfish/v1/AccountService/Accounts/${username}`) [all …]
|
/openbmc/bmcweb/include/ |
H A D | login_routes.hpp |
|
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/ |
H A D | ModalUser.vue | 65 :label="$t('pageUserManagement.modal.username')" 66 label-for="username" 68 <b-form-text id="username-help-block"> 78 id="username" 79 v-model="form.username" 81 aria-describedby="username-help-block" 82 data-test-id="userManagement-input-username" 83 :state="getValidationState(v$.form.username)" 85 @input="v$.form.username.$touch()" 88 <template v-if="v$.form.username.required.$invalid"> [all …]
|