Home
last modified time | relevance | path

Searched full:username (Results 1 – 25 of 461) sorted by relevance

12345678910>>...19

/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dclient.py82 def __init__(self, username=None, password=None): argument
85 self.username = username
92 if self.username:
95 await self.auth(self.username, self.password)
238 async def auth(self, username, token): argument
239 result = await self.invoke({"auth": {"username": username, "token": token}})
240 self.username = username
245 async def refresh_token(self, username=None): argument
247 if username:
248 m["username"] = username
[all …]
H A Dserver.py183 If allow_self_service is True, and the "username" property in the request
194 username = request.get("username", self.user.username)
195 if username == self.user.username:
196 request["username"] = self.user.username
201 username = "Anonymous user"
204 username = self.user.username
209 username,
215 f"{username} is not allowed to access permissions(s) {', '.join(permissions)}"
269 def raise_no_user_error(self, username): argument
270 raise bb.asyncrpc.InvokeError(f"No user named '{username}' exists")
[all …]
H A Dsqlite.py40 ("username", "TEXT NOT NULL", "UNIQUE"),
78 username=row["username"],
452 def _get_user(self, username): argument
456 SELECT username, permissions, token FROM users WHERE username=:username
459 "username": username,
464 async def lookup_user_token(self, username): argument
465 row = self._get_user(username)
470 async def lookup_user(self, username): argument
471 return map_user(self._get_user(username))
473 async def set_user_token(self, username, token): argument
[all …]
H A Dsqlalchemy.py79 username = Column(Text, nullable=False) variable in Users
83 __table_args__ = (UniqueConstraint("username"),)
117 def __init__(self, url, username=None, password=None): argument
121 if username is not None:
122 self.url = self.url.set(username=username)
175 username=row.username,
501 async def _get_user(self, username): argument
505 Users.username,
509 Users.username == username,
514 async def lookup_user_token(self, username): argument
[all …]
/openbmc/openbmc-test-automation/lib/
H A Dhost.tcl46 proc get_host_domain {host username password {quiet 1}} {
57 # username The host username.
64 "sshpass -p $password ssh -o StrictHostKeyChecking=no -k $username@$host\
71 proc get_host_name_servers {host username password {quiet 1}} {
82 # username The host username.
89 $username@$host\
97 proc get_host_mac_address {host username password {interface {}} {quiet 1}} {
110 # username The host username.
118 set_var_default interface [get_host_default_interface $host $username\
121 $username@$host 'cat /sys/class/net/$interface/address'" \
[all …]
/openbmc/phosphor-user-manager/
H A Duser_mgr.cpp182 bool UserMgr::isUserExist(const std::string& userName) in isUserExist() argument
184 if (userName.empty()) in isUserExist()
190 if (usersList.find(userName) == usersList.end()) in isUserExist()
197 void UserMgr::throwForUserDoesNotExist(const std::string& userName) in throwForUserDoesNotExist() argument
199 if (!isUserExist(userName)) in throwForUserDoesNotExist()
201 lg2::error("User '{USERNAME}' does not exist", "USERNAME", userName); in throwForUserDoesNotExist()
220 void UserMgr::throwForUserExists(const std::string& userName) in throwForUserExists() argument
222 if (isUserExist(userName)) in throwForUserExists()
224 lg2::error("User '{USERNAME}' already exists", "USERNAME", userName); in throwForUserExists()
230 const std::string& userName, const std::vector<std::string>& groupNames) in throwForUserNameConstraints() argument
[all …]
H A Duser_mgr.hpp132 * @param[in] userName - Name of the user which has to be created
137 void createUser(std::string userName, std::vector<std::string> groupNames,
143 * @param[in] userName - current name of the user
146 void renameUser(std::string userName, std::string newUserName) override;
151 * @param[in] userName - Name of the user which has to be deleted
153 void deleteUser(std::string userName);
158 * @param[in] userName - user name, for which update is requested
162 void updateGroupsAndPriv(const std::string& userName,
169 * @param[in] userName - user name, for which update is requested
172 void userEnable(const std::string& userName, bool enabled);
[all …]
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/
H A Dtest_user_management_sub_menu.robot24 ${xpath_username_input_button} //*[@data-test-id='userManagement-input-username']
39 @{username} admin_user readonly_user disabled_user variable
110 [Teardown] Delete Users Via Redfish @{username}
113 # username privilege_level enabled
114 ${username}[0] Administrator ${True}
115 ${username}[1] ReadOnly ${True}
116 ${username}[2] Administrator ${False}
125 # username privilege_level enabled
149 Create User And Verify ${username}[0] Administrator ${True}
152 Delete Users Via GUI ${username}[0]
[all …]
/openbmc/phosphor-user-manager/test/
H A Duser_mgr_test.cpp40 void createLocalUser(const std::string& userName, in createLocalUser() argument
45 tempObjPath /= userName; in createLocalUser()
58 userName, std::make_unique<phosphor::user::Users>( in createLocalUser()
106 std::string userName = "user"; in TEST_F() local
109 EXPECT_CALL(mockManager, getPrimaryGroup(userName)) in TEST_F()
111 EXPECT_THROW(userInfo = mockManager.getUserInfo(userName), in TEST_F()
118 std::string userName = "testUser"; in TEST_F() local
122 createLocalUser(userName, groups, privilege, true); in TEST_F()
123 EXPECT_CALL(mockManager, userLockedForFailedAttempt(userName)).Times(1); in TEST_F()
124 userInfo = mockManager.getUserInfo(userName); in TEST_F()
[all …]
/openbmc/openbmc/meta-phosphor/classes/
H A Dphosphor-deploy-ssh-keys.bbclass31 username=`echo "$current_key" | awk -F":" '{ print $1}'`
34 if [ ! -d ${IMAGE_ROOTFS}/home/${username} ]; then
35 perform_useradd "${IMAGE_ROOTFS}" "-R ${IMAGE_ROOTFS} -p '' ${username}"
38 if [ ! -d ${IMAGE_ROOTFS}/home/${username}.ssh/ ]; then
39 install -d ${IMAGE_ROOTFS}/home/${username}/.ssh/
42 if [ ! -f ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys ]; then
43 install -m 0600 ${key_path} ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
45 cat ${key_path} >> ${IMAGE_ROOTFS}/home/${username}/.ssh/authorized_keys
48 uid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $3}'`
49 guid=`cat ${IMAGE_ROOTFS}/etc/passwd | grep "${username}:" | awk -F ":" '{print $4}'`
[all …]
/openbmc/openbmc-test-automation/redfish/account_service/
H A Dtest_user_account.robot81 #username password role_id enabled
90 #username password role_id enabled
99 #username password role_id enabled
108 #username password role_id enabled wrong_password
117 #username password role_id enabled wrong_password
126 #username password role_id enabled wrong_password
135 #username password role_id enabled
144 #username password role_id enabled
153 #username password role_id enabled
162 #username password role_id enabled
[all …]
H A Dtest_ipmi_redfish_user.robot35 ... UserName=${random_username} Password=${valid_password}
43 Verify IPMI Username And Password ${random_username} ${valid_password}
55 ... UserName=${random_username} Password=${valid_password}
65 Verify IPMI Username And Password ${random_username} ${valid_password2}
68 ... Verify IPMI Username And Password ${random_username} ${valid_password}
80 ... UserName=${random_username} Password=${valid_password}
115 ... UserName=${random_username} Password=${valid_password}
125 ... Verify IPMI Username And Password ${random_username} ${valid_password}
132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege
138 Redfish.Login ${username} ${valid_password}
[all …]
/openbmc/phosphor-host-ipmid/user_channel/
H A Duser_layer.cpp36 SecureString ipmiUserGetPassword(const std::string& userName) in ipmiUserGetPassword() argument
38 return passwdMgr.getPasswdByUserName(userName); in ipmiUserGetPassword()
41 Cc ipmiClearUserEntryPassword(const std::string& userName) in ipmiClearUserEntryPassword() argument
43 if (passwdMgr.updateUserEntry(userName, "") != 0) in ipmiClearUserEntryPassword()
50 Cc ipmiRenameUserEntryPassword(const std::string& userName, in ipmiRenameUserEntryPassword() argument
53 if (passwdMgr.updateUserEntry(userName, newUserName) != 0) in ipmiRenameUserEntryPassword()
70 uint8_t ipmiUserGetUserId(const std::string& userName) in ipmiUserGetUserId() argument
72 return getUserAccessObject().getUserId(userName); in ipmiUserGetUserId()
75 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName) in ipmiUserSetUserName() argument
77 std::string newUser(userName, 0, ipmiMaxUserName); in ipmiUserSetUserName()
[all …]
H A Duser_mgmt.cpp202 int getUserNameFromPath(const std::string& path, std::string& userName) in getUserNameFromPath() argument
205 userName.assign(objPath.filename()); in getUserNameFromPath()
210 const std::string& userName, const std::string& priv, in userUpdateHelper() argument
216 if (usrAccess.addUserEntry(userName, priv, enabled) == false) in userUpdateHelper()
228 reinterpret_cast<char*>(userData->user[usrIndex].userName), 0, in userUpdateHelper()
230 if (userName == curName) in userUpdateHelper()
239 "USER_NAME", userName, "USER_EVENT", userEvent); in userUpdateHelper()
274 static_cast<uint8_t*>(userData->user[usrIndex].userName), in userUpdateHelper()
275 static_cast<uint8_t*>(userData->user[usrIndex].userName) + in userUpdateHelper()
276 sizeof(userData->user[usrIndex].userName), in userUpdateHelper()
[all …]
H A Duser_layer.hpp89 * @param[in] userName - user name
93 SecureString ipmiUserGetPassword(const std::string& userName);
96 * username
98 * @param[in] userName - user name to be removed
102 Cc ipmiClearUserEntryPassword(const std::string& userName);
107 * @param[in] userName - user name which has to be renamed
112 Cc ipmiRenameUserEntryPassword(const std::string& userName,
133 * @param[in] userName - user name
137 uint8_t ipmiUserGetUserId(const std::string& userName);
142 Cc ipmiUserSetUserName(const uint8_t userId, const char* userName)
[all …]
/openbmc/webui-vue/src/views/Login/
H A DLogin.vue16 <b-form-group label-for="username" :label="$t('pageLogin.username')">
18 id="username"
19 v-model="userInfo.username"
20 aria-describedby="login-error-alert username-required"
21 :state="getValidationState(v$.userInfo.username)"
24 data-test-id="login-input-username"
25 @input="v$.userInfo.username.$touch()"
28 <b-form-invalid-feedback id="username-required" role="alert">
29 <template v-if="v$.userInfo.username.required.$invalid">
95 username: null,
[all …]
/openbmc/openbmc/poky/meta/classes/
H A Duseradd_base.bbclass40 local username=`echo "$opts" | awk '{ print $NF }'`
41 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`"
44 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`"
49 bbnote "${PN}: user $username already exists, not re-creating it"
58 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr…
59 bbnote "${PN}: Running groupmems command with group $groupname and user $username"
60 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr…
63 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||…
68 bbnote "${PN}: group $groupname already contains $username, not re-adding it"
103 local username=`echo "$opts" | awk '{ print $NF }'`
[all …]
/openbmc/phosphor-webui/app/login/controllers/
H A Dlogin-controller.html11 <b>Invalid username or password.</b>
15 …in__form.host.$pristine" required autofocus ng-keydown="tryLogin(host, username, password, $event…
21 <label for="username">Username</label>
22 …d="username" name="username" has-error="invalidCredentials && login__form.$pristine" required ng-m…
23 …<div ng-messages="login__form.username.$error" class="form-error" ng-class="{'visible' : login__fo…
28 …orm.$pristine" required ng-model="password" ng-keydown="tryLogin(host, username, password, $event…
33 …width" type="button" value="Log in" role="button" ng-click="login(host, username, password); submi…
/openbmc/openbmc-test-automation/redfish/dmtf_tools/
H A DRedfish_Service_Validator.robot41 #username password role enabled
49 [Arguments] ${username} ${password} ${role} ${enabled}
50 [Teardown] Delete User Created ${username}
53 # username The username to be created.
57 # enabled Indicates whether the username being created
61 Redfish Create User ${username} ${password} ${role} ${enabled}
67 ... --ip https://${OPENBMC_HOST}:${HTTPS_PORT} --authtype=Session -u ${username}
68 ... -p ${password} --logdir ${EXECDIR}${/}logs_${username}${/} --debugging
80 [Arguments] ${username}
83 # username The username to be deleted.
[all …]
/openbmc/phosphor-webui/app/access-control/controllers/
H A Duser-controller.js22 {label: 'Username'}, {label: 'Privilege'}, {label: 'Account status'}
31 * Returns true if username is 'root'
35 return user.UserName === 'root' ? true : false;
55 user.uiData = [user.UserName, user.RoleId, accountStatus];
122 function createUser(username, password, role, enabled) { argument
124 APIUtils.createUser(username, password, role, enabled)
127 toastService.success(`User '${username}' has been created.`);
131 toastService.error(`Failed to create new user '${username}'.`);
142 originalUsername, username, password, role, enabled, locked) { argument
146 originalUsername, username, password, role, enabled, locked)
[all …]
/openbmc/openbmc-test-automation/gui/test/access_control/
H A Dtest_obmc_gui_local_users.robot21 ${xpath_input_user} //input[@id="username"]
89 [Arguments] ${username} ${password} ${privilege}=Administrator
93 # username Name of the user to be created.
99 Add User Details ${username} ${password} ${privilege} ${account_status}
103 [Arguments] ${username} ${password} ${privilege} ${account_status}
106 # username User name.
114 Input Text ${xpath_input_user} ${username}
132 [Arguments] ${username}
135 # username Name of the user to be created.
137 ${result}= Run Keyword And Return Status Page Should Contain ${username}
[all …]
/openbmc/qemu/crypto/
H A Dtlscredspsk.c35 lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key, in lookup_key() argument
38 const size_t ulen = strlen(username); in lookup_key()
54 if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') { in lookup_key()
61 error_setg(errp, "Username %s not found in PSK file %s", in lookup_key()
62 username, pskfile); in lookup_key()
76 const char *username; in qcrypto_tls_creds_psk_load() local
85 if (creds->username) { in qcrypto_tls_creds_psk_load()
86 error_setg(errp, "username should not be set when endpoint=server"); in qcrypto_tls_creds_psk_load()
127 if (creds->username) { in qcrypto_tls_creds_psk_load()
128 username = creds->username; in qcrypto_tls_creds_psk_load()
[all …]
/openbmc/webui-vue/src/store/modules/SecurityAndAccess/
H A DUserManagementStore.js115 async createUser({ dispatch }, { username, password, privilege, status }) { field in UserManagementStore.actions.AnonymousClassf362ce950701
117 UserName: username, property in UserManagementStore.actions.createUser.data
127 username, field in AnonymousClassf362ce950801
136 username: username, property in AnonymousClassf362ce950901
143 { originalUsername, username, password, privilege, status, locked },
146 if (username) data.UserName = username;
156 username: originalUsername, property in AnonymousClassf362ce950c01
166 username: originalUsername, property in AnonymousClassf362ce950d01
171 async deleteUser({ dispatch }, username) { argument
173 .delete(`/redfish/v1/AccountService/Accounts/${username}`)
[all …]
/openbmc/bmcweb/include/
H A Dlogin_routes.hpp38 std::string_view username; in handleLogin()
55 // check for username/password in the root object in handleLogin()
57 nlohmann::json::iterator userIt = loginCredentials.find("username"); in handleLogin()
66 username = *userStr; in handleLogin()
73 // same keys (username and password), attempt to use that in handleLogin()
77 // Some apis produce an array of value ["username", in handleLogin()
94 username = *userStr; in handleLogin()
102 nlohmann::json::iterator userIt2 = dataIt->find("username"); in handleLogin()
112 username = *userStr; in handleLogin()
145 if (it->value() == "form-data; name=\"username\"") in handleLogin()
28 std::string_view username; handleLogin() local
[all...]
/openbmc/webui-vue/src/views/SecurityAndAccess/UserManagement/
H A DModalUser.vue65 :label="$t('pageUserManagement.modal.username')"
66 label-for="username"
68 <b-form-text id="username-help-block">
78 id="username"
79 v-model="form.username"
81 aria-describedby="username-help-block"
82 data-test-id="userManagement-input-username"
83 :state="getValidationState(v$.form.username)"
85 @input="v$.form.username.$touch()"
88 <template v-if="v$.form.username.required.$invalid">
[all …]

12345678910>>...19