/qemu/tests/ |
H A D | dbus-vmstate-daemon.sh | 39 <allow send_type="signal"/> 44 <allow receive_type="method_call"/> 45 <allow receive_type="method_return"/> 46 <allow receive_type="error"/> 47 <allow receive_type="signal"/> 50 <allow send_destination="org.freedesktop.DBus" 52 <allow send_destination="org.freedesktop.DBus" 54 <allow send_destination="org.freedesktop.DBus" 65 <allow own="org.qemu.VMState1"/> 66 <allow send_destination="org.qemu.VMState1"/> [all …]
|
/qemu/tests/qapi-schema/ |
H A D | allow-preconfig-test.err | 1 allow-preconfig-test.json: In command 'allow-preconfig-test': 2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
|
H A D | allow-preconfig-test.json | 1 # Check against allow-preconfig illegal value 2 { 'command': 'allow-preconfig-test', 'allow-preconfig': 'some-string' }
|
H A D | oob-coroutine.json | 1 # Check that incompatible flags allow-oob and coroutine are rejected 2 { 'command': 'oob-command-1', 'allow-oob': true, 'coroutine': true }
|
H A D | doc-duplicated-arg.json | 1 # Do not allow duplicated argument
|
H A D | doc-duplicated-return.json | 1 # Do not allow duplicated Returns section
|
H A D | doc-duplicated-since.json | 1 # Do not allow duplicated Since section
|
H A D | args-any.json | 1 # we do not allow an 'any' argument
|
H A D | oob-test.json | 2 { 'command': 'oob-command-1', 'allow-oob': 'some-string' }
|
H A D | oob-coroutine.err | 2 oob-coroutine.json:2: flags 'allow-oob' and 'coroutine' are incompatible
|
H A D | args-alternate.json | 1 # we do not allow alternate arguments
|
H A D | alternate-any.json | 1 # we do not allow the 'any' type as an alternate branch
|
H A D | oob-test.err | 2 oob-test.json:2: flag 'allow-oob' may only use true value
|
H A D | union-bad-base.json | 1 # we allow anonymous base, but enforce no duplicate keys
|
H A D | reserved-member-u.json | 2 # We reject use of 'u' as a member name, to allow it for internal use in
|
H A D | union-base-union.json | 2 # TODO: It would be possible to allow a union as a base, as long as all
|
/qemu/tests/qemu-iotests/tests/ |
H A D | fuse-allow-other.out | 1 QA output created by fuse-allow-other 6 --- allow-other=off --- 15 'allow-other': 'off' 35 --- allow-other=on --- 44 'allow-other': 'on' 62 --- allow-other=auto --- 71 'allow-other': 'auto'
|
/qemu/qapi/ |
H A D | block-export.json | 28 # @max-connections: The maximum number of connections to allow at the 63 # @max-connections: The maximum number of connections to allow at the 78 'allow-preconfig': true } 172 # @allow-other: If this is off, only qemu's user is allowed access to 187 '*allow-other': 'FuseExportAllowOther' }, 259 'allow-preconfig': true } 309 'allow-preconfig': true } 320 'allow-preconfig': true } 405 'allow-preconfig': true } 428 'allow-preconfig': true } [all …]
|
H A D | authz.json | 15 # @allow: allow access 21 'data': ['deny', 'allow']}
|
H A D | control.json | 38 'allow-preconfig': true } 116 'allow-preconfig': true } 156 'allow-preconfig': true } 174 'allow-preconfig': true }
|
H A D | yank.json | 98 'allow-oob': true } 119 'allow-oob': true }
|
/qemu/docs/system/ |
H A D | authz.rst | 112 { "match": "fred", "policy": "allow", "format": "exact" }, 113 { "match": "bob", "policy": "allow", "format": "exact" }, 115 { "match": "dan*", "policy": "allow", "format": "glob" } 158 { "match": "fred", "policy": "allow", "format": "exact" }, 159 { "match": "bob", "policy": "allow", "format": "exact" }, 161 { "match": "dan*", "policy": "allow", "format": "glob" } 179 mechanisms that are implemented outside of QEMU. In order to allow maximum 205 account requisite pam_listfile.so item=user sense=allow \ 206 file=/etc/qemu/vnc.allow
|
/qemu/docs/interop/ |
H A D | dbus.rst | 75 For example, to allow only ``qemu`` user to talk to ``qemu-helper`` 81 <allow send_destination="org.qemu.Helper1"/> 82 <allow receive_sender="org.qemu.Helper1"/> 86 <allow own="org.qemu.Helper1"/>
|
/qemu/ui/ |
H A D | vnc-auth-sasl.c | 173 bool allow; in vnc_auth_sasl_check_access() local 194 allow = qauthz_is_allowed_by_id(vs->vd->sasl.authzid, in vnc_auth_sasl_check_access() 203 trace_vnc_auth_sasl_acl(vs, allow); in vnc_auth_sasl_check_access() 204 return allow ? 0 : -1; in vnc_auth_sasl_check_access()
|
/qemu/crypto/ |
H A D | tlssession.c | 355 bool allow; in qcrypto_tls_session_check_certificate() local 357 allow = qauthz_is_allowed_by_id(session->authzid, in qcrypto_tls_session_check_certificate() 363 if (!allow) { in qcrypto_tls_session_check_certificate()
|