/openbmc/openbmc/poky/bitbake/lib/hashserv/ |
H A D | server.py | 175 def permissions(*permissions, allow_anon=True, allow_self_service=False): function 199 if not self.user_has_permissions(*permissions, allow_anon=allow_anon): 205 user_perms = self.user.permissions 212 ", ".join(permissions), 272 def user_has_permissions(self, *permissions, allow_anon=True): argument 273 permissions = set(permissions) 278 if not permissions - self.server.anon_perms: 284 if ALL_PERM in self.user.permissions: 287 if not permissions - self.user.permissions: 321 @permissions(READ_PERM) [all …]
|
H A D | sqlalchemy.py | 81 permissions = Column(Text) variable in Users 176 permissions=set(row.permissions.split()), 506 Users.permissions, 536 async def set_user_perms(self, username, permissions): argument 541 .values(permissions=" ".join(permissions)) 550 Users.permissions, 555 async def new_user(self, username, permissions, token): argument 561 permissions=" ".join(permissions),
|
H A D | sqlite.py | 79 permissions=set(row["permissions"].split()), 487 async def set_user_perms(self, username, permissions): argument 495 "permissions": " ".join(permissions), 506 async def new_user(self, username, permissions, token): argument 516 "permissions": " ".join(permissions),
|
H A D | client.py | 258 async def set_user_perms(self, username, permissions): argument 260 {"set-user-perms": {"username": username, "permissions": permissions}} 272 async def new_user(self, username, permissions): argument 274 {"new-user": {"username": username, "permissions": permissions}}
|
/openbmc/openbmc/poky/meta/recipes-support/attr/acl/ |
H A D | 0001-test-patch-out-failing-bits.patch | 13 test/root/permissions.test | 13 ------------- 16 diff --git a/test/root/permissions.test b/test/root/permissions.test 18 --- a/test/root/permissions.test 19 +++ b/test/root/permissions.test 39 Change the owning group. The other permissions should now grant user 52 Verify that permissions in separate matching ACL entries do not
|
/openbmc/qemu/tests/qemu-iotests/tests/ |
H A D | fuse-allow-other.out | 4 === Test permissions === 18 (Removing all permissions) 22 (Granting read permissions for everyone) 23 chmod: changing permissions of 'TEST_DIR/fuse-export': Operation not permitted 47 (Removing all permissions) 51 (Granting read permissions for everyone) 74 (Removing all permissions) 78 (Granting read permissions for everyone)
|
/openbmc/linux/Documentation/filesystems/ |
H A D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
H A D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
/openbmc/phosphor-power/test/ |
H A D | temporary_subdirectory_tests.cpp | 143 fs::permissions(path2, fs::perms::none); in TEST() 157 fs::permissions(path2, fs::perms::owner_all); in TEST() 205 fs::permissions(path, fs::perms::none); in TEST() 213 fs::permissions(path, fs::perms::owner_all); in TEST() 259 fs::permissions(path, fs::perms::none); in TEST() 274 fs::permissions(path, fs::perms::owner_all); in TEST()
|
/openbmc/linux/Documentation/usb/ |
H A D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
/openbmc/openbmc/poky/meta/files/ |
H A D | fs-perms-volatile-tmp.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 36 # Special permissions from base-files
|
H A D | fs-perms.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 55 # Special permissions from base-files
|
H A D | fs-perms-volatile-log.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/netperf/files/ |
H A D | netserver_permissions.patch | 4 Subject: [PATCH] netserver: don't change permissions on /dev/null 6 the (now default) suppress_debug=1 changes permissions on /dev/null
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | procfs-attr-prev | 8 The details of permissions required to read from 12 The other details of permissions required to write to
|
H A D | procfs-attr-current | 7 The details of permissions required to read from 12 The other details of permissions required to write to
|
H A D | procfs-attr-exec | 8 The details of permissions required to read from 13 The other details of permissions required to write to
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CAL-1.0-Combined-Work-Exception | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You 248 If this License is terminated for any reason, all permissions granted 250 will immediately cease exercising any permissions granted in this 257 for non-compliance, Your permissions for the Work under this License [all …]
|
H A D | CAL-1.0 | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You 248 If this License is terminated for any reason, all permissions granted 250 will immediately cease exercising any permissions granted in this 257 for non-compliance, Your permissions for the Work under this License [all …]
|
/openbmc/linux/fs/notify/fanotify/ |
H A D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
/openbmc/linux/fs/hfsplus/ |
H A D | inode.c | 521 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 549 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 552 if (file->permissions.dev) in hfsplus_cat_read_inode() 554 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 564 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 642 (file->permissions.rootflags | in hfsplus_cat_write_inode() 643 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
/openbmc/openbmc/meta-security/recipes-security/fscrypt/ |
H A D | fscrypt_1.1.0.bb | 39 # Golang forces permissions to 0500 on directories and 0400 on files in 41 # directory. Let's just fix the permissions here so we don't have to
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/atop/atop/ |
H A D | fix-permissions.patch | 4 Subject: [PATCH] Fix permissions 6 Update permissions of executable files that remove setuid bit and make
|
/openbmc/linux/Documentation/core-api/ |
H A D | protection-keys.rst | 28 theoretically space in the PAE PTEs. These permissions are enforced on data 43 directly in order to change access permissions to memory covered 98 the plain mprotect() permissions are violated.
|