yaml: format with prettier
Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
Change-Id: I193f690f3612fe72ec69030f81f4d5096a761601
diff --git a/yaml/xyz/openbmc_project/Control/Security/RestrictionMode.interface.yaml b/yaml/xyz/openbmc_project/Control/Security/RestrictionMode.interface.yaml
index 0baae0e..fa69d7b 100644
--- a/yaml/xyz/openbmc_project/Control/Security/RestrictionMode.interface.yaml
+++ b/yaml/xyz/openbmc_project/Control/Security/RestrictionMode.interface.yaml
@@ -10,30 +10,30 @@
enumerations:
- name: Modes
description: >
- Possible modes of restriction.
+ Possible modes of restriction.
values:
- - name: None
- description: >
- No restriction.
- - name: Whitelist
- description: >
- Allow, only if in the whitelist.
- - name: Blacklist
- description: >
- Prevent, if in the blacklist.
- - name: Provisioning
- description: >
- Indicate that system is in provisioning mode
- and all commands are allowed in system interface
- in both pre and post BIOS boot.
- - name: ProvisionedHostWhitelist
- description: >
- Commands in the whitelist will only be executed
- through system interface after BIOS POST complete.
- All KCS commands are supported before POST complete.
- - name: ProvisionedHostDisabled
- description: >
- Commands through system interface are executed only
- till BIOS POST complete notification, after
- which system interface commands are blocked (except BIOS SMI
- based ones).
+ - name: None
+ description: >
+ No restriction.
+ - name: Whitelist
+ description: >
+ Allow, only if in the whitelist.
+ - name: Blacklist
+ description: >
+ Prevent, if in the blacklist.
+ - name: Provisioning
+ description: >
+ Indicate that system is in provisioning mode
+ and all commands are allowed in system interface
+ in both pre and post BIOS boot.
+ - name: ProvisionedHostWhitelist
+ description: >
+ Commands in the whitelist will only be executed
+ through system interface after BIOS POST complete.
+ All KCS commands are supported before POST complete.
+ - name: ProvisionedHostDisabled
+ description: >
+ Commands through system interface are executed only
+ till BIOS POST complete notification, after
+ which system interface commands are blocked (except BIOS SMI
+ based ones).
diff --git a/yaml/xyz/openbmc_project/Control/Security/SpecialMode.interface.yaml b/yaml/xyz/openbmc_project/Control/Security/SpecialMode.interface.yaml
index 6760076..e8649a2 100644
--- a/yaml/xyz/openbmc_project/Control/Security/SpecialMode.interface.yaml
+++ b/yaml/xyz/openbmc_project/Control/Security/SpecialMode.interface.yaml
@@ -10,17 +10,17 @@
enumerations:
- name: Modes
description: >
- Possible modes available.
+ Possible modes available.
values:
- - name: None
- description: >
- BMC is under normal working condition.
- - name: Manufacturing
- description: >
- Indicate that BMC is in manufacturing mode
- and is allowed to perform any manufacturing related
- activity
- - name: ValidationUnsecure
- description: >
- Indicate that BMC is in validation mode, and can
- execute any special validation related commands
+ - name: None
+ description: >
+ BMC is under normal working condition.
+ - name: Manufacturing
+ description: >
+ Indicate that BMC is in manufacturing mode
+ and is allowed to perform any manufacturing related
+ activity
+ - name: ValidationUnsecure
+ description: >
+ Indicate that BMC is in validation mode, and can
+ execute any special validation related commands