Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 505) sorted by relevance

12345678910>>...21

/openbmc/openbmc/poky/bitbake/lib/hashserv/
H A Dserver.py175 def permissions(*permissions, allow_anon=True, allow_self_service=False): function
199 if not self.user_has_permissions(*permissions, allow_anon=allow_anon):
205 user_perms = self.user.permissions
212 ", ".join(permissions),
272 def user_has_permissions(self, *permissions, allow_anon=True): argument
273 permissions = set(permissions)
278 if not permissions - self.server.anon_perms:
284 if ALL_PERM in self.user.permissions:
287 if not permissions - self.user.permissions:
321 @permissions(READ_PERM)
[all …]
H A Dsqlalchemy.py81 permissions = Column(Text) variable in Users
176 permissions=set(row.permissions.split()),
506 Users.permissions,
536 async def set_user_perms(self, username, permissions): argument
541 .values(permissions=" ".join(permissions))
550 Users.permissions,
555 async def new_user(self, username, permissions, token): argument
561 permissions=" ".join(permissions),
H A Dsqlite.py79 permissions=set(row["permissions"].split()),
487 async def set_user_perms(self, username, permissions): argument
495 "permissions": " ".join(permissions),
506 async def new_user(self, username, permissions, token): argument
516 "permissions": " ".join(permissions),
H A Dclient.py258 async def set_user_perms(self, username, permissions): argument
260 {"set-user-perms": {"username": username, "permissions": permissions}}
272 async def new_user(self, username, permissions): argument
274 {"new-user": {"username": username, "permissions": permissions}}
/openbmc/openbmc/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch13 test/root/permissions.test | 13 -------------
16 diff --git a/test/root/permissions.test b/test/root/permissions.test
18 --- a/test/root/permissions.test
19 +++ b/test/root/permissions.test
39 Change the owning group. The other permissions should now grant user
52 Verify that permissions in separate matching ACL entries do not
/openbmc/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out4 === Test permissions ===
18 (Removing all permissions)
22 (Granting read permissions for everyone)
23 chmod: changing permissions of 'TEST_DIR/fuse-export': Operation not permitted
47 (Removing all permissions)
51 (Granting read permissions for everyone)
74 (Removing all permissions)
78 (Granting read permissions for everyone)
/openbmc/linux/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/openbmc/phosphor-power/test/
H A Dtemporary_subdirectory_tests.cpp143 fs::permissions(path2, fs::perms::none); in TEST()
157 fs::permissions(path2, fs::perms::owner_all); in TEST()
205 fs::permissions(path, fs::perms::none); in TEST()
213 fs::permissions(path, fs::perms::owner_all); in TEST()
259 fs::permissions(path, fs::perms::none); in TEST()
274 fs::permissions(path, fs::perms::owner_all); in TEST()
/openbmc/linux/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/openbmc/openbmc/poky/meta/files/
H A Dfs-perms-volatile-tmp.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
36 # Special permissions from base-files
H A Dfs-perms.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
55 # Special permissions from base-files
H A Dfs-perms-volatile-log.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/netperf/files/
H A Dnetserver_permissions.patch4 Subject: [PATCH] netserver: don't change permissions on /dev/null
6 the (now default) suppress_debug=1 changes permissions on /dev/null
/openbmc/linux/Documentation/ABI/testing/
H A Dprocfs-attr-prev8 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-current7 The details of permissions required to read from
12 The other details of permissions required to write to
H A Dprocfs-attr-exec8 The details of permissions required to read from
13 The other details of permissions required to write to
/openbmc/openbmc/poky/meta/files/common-licenses/
H A DCAL-1.0-Combined-Work-Exception28 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
248 If this License is terminated for any reason, all permissions granted
250 will immediately cease exercising any permissions granted in this
257 for non-compliance, Your permissions for the Work under this License
[all …]
H A DCAL-1.028 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
248 If this License is terminated for any reason, all permissions granted
250 will immediately cease exercising any permissions granted in this
257 for non-compliance, Your permissions for the Work under this License
[all …]
/openbmc/linux/fs/notify/fanotify/
H A DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/openbmc/linux/fs/hfsplus/
H A Dinode.c521 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
549 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
552 if (file->permissions.dev) in hfsplus_cat_read_inode()
554 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
564 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
642 (file->permissions.rootflags | in hfsplus_cat_write_inode()
643 file->permissions.userflags)) in hfsplus_cat_write_inode()
/openbmc/openbmc/meta-security/recipes-security/fscrypt/
H A Dfscrypt_1.1.0.bb39 # Golang forces permissions to 0500 on directories and 0400 on files in
41 # directory. Let's just fix the permissions here so we don't have to
/openbmc/linux/Documentation/admin-guide/LSM/
H A Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/atop/atop/
H A Dfix-permissions.patch4 Subject: [PATCH] Fix permissions
6 Update permissions of executable files that remove setuid bit and make
/openbmc/linux/Documentation/core-api/
H A Dprotection-keys.rst28 theoretically space in the PAE PTEs. These permissions are enforced on data
43 directly in order to change access permissions to memory covered
98 the plain mprotect() permissions are violated.

12345678910>>...21