/openbmc/openbmc/poky/bitbake/doc/ |
H A D | releases.rst | 11 - :yocto_docs:`BitBake 2.10 User Manual </bitbake/2.10/>` 17 - :yocto_docs:`BitBake 2.8 User Manual </bitbake/2.8/>` 23 - :yocto_docs:`BitBake 2.0 User Manual </bitbake/2.0/>` 33 - :yocto_docs:`BitBake 2.6 User Manual </bitbake/2.6/>` 39 - :yocto_docs:`BitBake 2.4 User Manual </bitbake/2.4/>` 45 - :yocto_docs:`BitBake 2.2 User Manual </bitbake/2.2/>` 51 - :yocto_docs:`BitBake 1.52 User Manual </bitbake/1.52/>` 57 - :yocto_docs:`BitBake 1.50 User Manual </bitbake/1.50/>` 63 - :yocto_docs:`BitBake 1.48 User Manual </bitbake/1.48/>` 69 - :yocto_docs:`BitBake 1.46 User Manual </bitbake/1.46/>` [all …]
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/ |
H A D | meson.build | 13 sdbusplus_current_path = 'xyz/openbmc_project/User' 16 'xyz/openbmc_project/User/AccountPolicy__markdown'.underscorify(), 18 '../../../../yaml/xyz/openbmc_project/User/AccountPolicy.interface.yaml', 32 'xyz/openbmc_project/User/AccountPolicy', 40 'xyz/openbmc_project/User/Attributes__markdown'.underscorify(), 42 '../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml', 56 'xyz/openbmc_project/User/Attributes', 64 'xyz/openbmc_project/User/Common__markdown'.underscorify(), 65 input: ['../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'], 78 'xyz/openbmc_project/User/Common', [all …]
|
/openbmc/openbmc-test-automation/redfish/dmtf_tools/ |
H A D | test_redfishtool_local_user.robot | 31 [Teardown] Redfishtool Delete User "UserT100" 33 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 34 Redfishtool Verify User "UserT100" "ReadOnly" 40 [Teardown] Redfishtool Delete User "UserT100" 42 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 43 Redfishtool Update User Role "UserT100" "Administrator" 44 Redfishtool Verify User "UserT100" "Administrator" 51 Redfishtool Create User "UserT100" "TestPwd123" "ReadOnly" true 52 Redfishtool Delete User "UserT100" 53 ${status}= Redfishtool Verify User Name Exists "UserT100" [all …]
|
/openbmc/openbmc-test-automation/ipmi/ |
H A D | test_ipmi_user.robot | 34 # User defined count. 39 Verify IPMI User Summary 44 ... Delete Created User ${random_userid} 46 ${initial_user_count} ${maximum_ids}= Get Enabled User Count 48 ${random_userid} ${random_username}= Create Random IPMI User 53 ${current_user_count} ${maximum_ids}= Get Enabled User Count 61 Verify IPMI User List 65 ... Delete Created User ${random_userid} 67 ${random_userid} ${random_username}= Create Random IPMI User 78 ${users_access}= Get User Access Ipmi ${CHANNEL_NUMBER} [all …]
|
H A D | test_ipmi_payload.robot | 93 Verify Set User Access Payload For Standard Payload SOL 96 [Teardown] Run Keywords Set User Access Payload For Given User ${user_id_in_hex} 97 ... AND Delete Created User ${userid} 100 ${userid} ${username}= Create And Verify IPMI User 105 …${default_user_access_payload}= Get User Access Payload For Given Channel ${userid_in_hex_format} 108 Set User Access Payload For Given User ${user_id_in_hex} Disable 113 Verify Set User Access Payload For Operator Privileged User 116 [Teardown] Run Keywords Delete Created User ${userid} AND FFDC On Test Case Fail 118 ${userid} ${username}= Create And Verify IPMI User ${operator_priv} Operator 127 Verify Set User Access Payload For Invalid User [all …]
|
/openbmc/openbmc-test-automation/gui/test/access_control/ |
H A D | test_obmc_gui_local_users.robot | 29 Verify Existence Of All Sections In Local User Management Page 36 Verify Existence Of All Buttons In Local User Management Page 46 Verify Existence Of All Input Boxes In Local User Management Page 53 Add User And Verify 58 Delete User testUser1 59 Add User testUser1 testUserPwd1 Administrator 63 Delete User And Verify 68 Delete User testUser2 69 Add User testUser2 testUserPwd2 Callback 70 Delete User testUser2 [all …]
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_user_account.robot | 31 Verify Redfish Admin User Persistence After Reboot 35 ... Redfish Create User admin_user TestPwd123 Administrator ${True} 43 Redfish Verify User admin_user TestPwd123 Administrator ${True} 46 Verify Redfish Operator User Persistence After Reboot 50 ... Redfish Create User operator_user TestPwd123 Operator ${True} 58 Redfish Verify User operator_user TestPwd123 Operator ${True} 61 Verify Redfish Readonly User Persistence After Reboot 65 ... Redfish Create User readonly_user TestPwd123 ReadOnly ${True} 73 Redfish Verify User readonly_user TestPwd123 ReadOnly ${True} 76 Redfish Create and Verify Admin User [all...] |
H A D | test_ipmi_redfish_user.robot | 23 ${empty_name_pattern} ^User Name\\s.*\\s:\\s$ 27 Create Admin Redfish User And Verify Login Via IPMI 46 Update User Password Via Redfish And Verify Using IPMI 71 Update User Privilege Via Redfish And Verify Using IPMI 106 Delete User Via Redfish And Verify Using IPMI 128 Create IPMI User And Verify Login Via Redfish 132 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 144 Update User Password Via IPMI And Verify Using Redfish 149 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 165 Update User Privilege To Operator Via IPMI And Verify Using Redfish [all …]
|
/openbmc/linux/Documentation/arch/arm/ |
H A D | sunxi.rst | 26 * User Manual 28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf 41 * User Manual 43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf 57 * User Manual 59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf 67 * User Manual 69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf 78 * User Manual 88 * User Manual [all …]
|
/openbmc/docs/architecture/ |
H A D | user-management.md | 1 # User Management - OpenBMC - Design document 18 4. User creation has to be generic in nature wherever possible. 25 6. User name, Password, Group and Privilege roles are maintained by the common 28 words, with the exception of User Name, Password, Group and Privileged Role, 59 groups (i.e. User will have same privilege for REDFISH / Webserver / IPMI / SSH 60 / HostConsole). User can belong to any one of the following privilege roles at 73 ## Common User Manager - D-Bus API (phosphor-user-manager) 75 User Manager service exposes D-Bus methods for user-management operations. It 76 exposes `xyz.openbmc_project.User.Manager` as a service and handles objects 78 https://github.com/openbmc/phosphor-dbus-interfaces/tree/master/yaml/xyz/openbmc_project/User [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/User/ |
H A D | README.md | 1 # User Management 5 User Manager service exposes D-Bus methods for user management operations. 7 ### User Manager Interface 9 User manager interface `xyz.openbmc_project.User.Manager` provides following 12 #### xyz.openbmc_project.User.Manager interface 28 #### xyz.openbmc_project.User.AccountPolicy interface 42 User manager daemon, will create user objects for every user existing in the 44 object can be handled through 'org.freedesktop.DBus.ObjectManager'. User object 47 #### xyz.openbmc_project.User.Attributes interface 53 - UserEnabled - User enabled state.
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Ldap/ |
H A D | meson.build | 5 sdbusplus_current_path = 'xyz/openbmc_project/User/Ldap' 8 'xyz/openbmc_project/User/Ldap/Config__markdown'.underscorify(), 10 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Config.interface.yaml', 24 'xyz/openbmc_project/User/Ldap/Config', 32 'xyz/openbmc_project/User/Ldap/Create__markdown'.underscorify(), 34 '../../../../../yaml/xyz/openbmc_project/User/Ldap/Create.interface.yaml', 48 'xyz/openbmc_project/User/Ldap/Create',
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_expire_password.robot | 51 Expire And Change Root User Password And Access Via SSH 55 ... Restore Default Password For Root User AND FFDC On Test Case Fail 72 ... Restore Default Password For Root User AND FFDC On Test Case Fail 83 Expire And Change Root User Password Via Redfish And Verify 88 ... Restore Default Password For Root User 92 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 102 Verify Error While Creating User With Expired Password 106 ... Restore Default Password For Root User AND FFDC On Test Case Fail 110 Verify User Password Expired Using Redfish ${OPENBMC_USERNAME} ${OPENBMC_PASSWORD} 123 ... AND Restore Default Password For Root User AND FFDC On Test Case Fail [all …]
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 3 Documentation Test OpenBMC GUI "User management" sub-menu of "Security and access". 16 ${xpath_user_management_heading} //h1[text()="User management"] 45 Verify Navigation To User Management Page 52 Verify Existence Of All Sections In User Management Page 59 Verify Existence Of All Input Boxes In User Management Page 66 Verify Existence Of All Buttons In User Management Page 76 Verify Existence Of All Button And Fields In Add User 107 Verify User Access Privilege 111 [Template] Create User And Verify 119 Verify Operator User Privilege [all …]
|
/openbmc/linux/Documentation/virt/acrn/ |
H A D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User 11 devices for a User VM based on command line configurations. ACRN Hypervisor 19 Service VM User VM 35 ACRN userspace allocates memory for the User VM, configures and initializes the 36 devices used by the User VM, loads the virtual bootloader, initializes the 37 virtual CPU state and handles I/O request accesses from the User VM. It uses
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 25 Create IPMI User Without Any Privilege And Verify Via Redfish 42 Create Admin User Via Redfish And Verify Login Via IPMI 58 Enable IPMI Access To User Using Redfish ${random_username} 67 Delete User Via Redfish And Verify Using IPMI 81 Enable IPMI Access To User Using Redfish ${random_username} 95 Update User Password Via Redfish And Verify Using IPMI 109 Enable IPMI Access To User Using Redfish ${random_username} 122 Update User Privilege Via Redfish And Verify Using IPMI 136 Enable IPMI Access To User Using Redfish ${random_username} 165 Create IPMI Random User With Password And Privilege [all …]
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Common/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Common' 6 'xyz/openbmc_project/User/Common__cpp'.underscorify(), 7 input: ['../../../../../yaml/xyz/openbmc_project/User/Common.errors.yaml'], 20 'xyz/openbmc_project/User/Common',
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 33 - "User-Agent": "python-requests/2.8.1" 43 + "User-Agent": [ 103 - "User-Agent": "python-requests/2.8.1" 113 + "User-Agent": [ 173 - "User-Agent": "python-requests/2.8.1" 183 + "User-Agent": [ 243 - "User-Agent": "python-requests/2.8.1" 253 + "User-Agent": [ 313 - "User-Agent": "python-requests/2.8.1" 323 + "User-Agent": [ [all …]
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/MultiFactorAuthConfiguration/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/MultiFactorAuthConfiguration' 6 'xyz/openbmc_project/User/MultiFactorAuthConfiguration__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/MultiFactorAuthConfiguration.interface.yaml', 28 'xyz/openbmc_project/User/MultiFactorAuthConfiguration',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPAuthenticator/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPAuthenticator' 6 'xyz/openbmc_project/User/TOTPAuthenticator__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/TOTPAuthenticator.interface.yaml', 28 'xyz/openbmc_project/User/TOTPAuthenticator',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Manager/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Manager' 6 'xyz/openbmc_project/User/Manager__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/Manager.interface.yaml', 28 'xyz/openbmc_project/User/Manager',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapperEntry/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapperEntry' 6 'xyz/openbmc_project/User/PrivilegeMapperEntry__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapperEntry.interface.yaml', 28 'xyz/openbmc_project/User/PrivilegeMapperEntry',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/PrivilegeMapper/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/PrivilegeMapper' 6 'xyz/openbmc_project/User/PrivilegeMapper__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/PrivilegeMapper.interface.yaml', 28 'xyz/openbmc_project/User/PrivilegeMapper',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/TOTPState/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/TOTPState' 6 'xyz/openbmc_project/User/TOTPState__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/TOTPState.interface.yaml', 28 'xyz/openbmc_project/User/TOTPState',
|
/openbmc/phosphor-dbus-interfaces/gen/xyz/openbmc_project/User/Attributes/ |
H A D | meson.build | 3 sdbusplus_current_path = 'xyz/openbmc_project/User/Attributes' 6 'xyz/openbmc_project/User/Attributes__cpp'.underscorify(), 8 '../../../../../yaml/xyz/openbmc_project/User/Attributes.interface.yaml', 28 'xyz/openbmc_project/User/Attributes',
|