/external/grpc-grpc/ |
D | package.xml | 29 <file baseinstalldir="/" name="config.m4" role="src" /> 30 <file baseinstalldir="/" name="config.w32" role="src" /> 31 <file baseinstalldir="/" name="src/php/README.md" role="src" /> 32 <file baseinstalldir="/" name="src/php/ext/grpc/byte_buffer.c" role="src" /> 33 <file baseinstalldir="/" name="src/php/ext/grpc/call.c" role="src" /> 34 <file baseinstalldir="/" name="src/php/ext/grpc/call_credentials.c" role="src" /> 35 <file baseinstalldir="/" name="src/php/ext/grpc/channel.c" role="src" /> 36 <file baseinstalldir="/" name="src/php/ext/grpc/channel_credentials.c" role="src" /> 37 <file baseinstalldir="/" name="src/php/ext/grpc/completion_queue.c" role="src" /> 38 <file baseinstalldir="/" name="src/php/ext/grpc/php_grpc.c" role="src" /> [all …]
|
/external/autotest/site_utils/ |
D | server_manager.py | 8 create(hostname, role=None, note=None) 9 Create a server with given role, with status primary. 14 modify(hostname, role=None, status=None, note=None, delete=False, 16 Modify a server's role, status, note, or attribute: 17 1. Add role to a server. If the server is in primary status, proper actions 18 like service restart will be executed to enable the role. 19 2. Delete a role from a server. If the server is in primary status, proper 20 actions like service restart will be executed to disable the role. 23 or disable each role of the server. 42 def _add_role(server, role, action): argument [all …]
|
D | server_manager_unittest.py | 54 attrs={'role': server_models.ServerRole.ROLE.DRONE}) 57 attrs={'role': server_models.ServerRole.ROLE.SCHEDULER}) 117 server=mox.IgnoreArg(), role=server_models.ServerRole.ROLE.DRONE 121 role=server_models.ServerRole.ROLE.DRONE) 125 """Test manager can add a role to a repair_failed server successfully. 130 server_models.validate(role=server_models.ServerRole.ROLE.DEVSERVER) 137 [server_models.ServerRole.ROLE.DRONE]) 140 role=server_models.ServerRole.ROLE.DEVSERVER 144 role=server_models.ServerRole.ROLE.DEVSERVER, 149 """Test manager fails to add a role to a repair_required server if [all …]
|
D | server_manager_actions.py | 8 After a role is added or removed from a server, certain services may need to 26 # (the role of which the command should be executed, the command) 27 RESTART_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 29 RESTART_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 31 RELOAD_APACHE = (server_models.ServerRole.ROLE.SCHEDULER, 34 STOP_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 36 STOP_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 39 # Dictionary of actions needed for a role to be enabled. Key is the role, and 40 # value is a list of action. All these actions should be applied after the role 43 server_models.ServerRole.ROLE.SCHEDULER: [RESTART_SCHEDULER], [all …]
|
D | server_manager_utils.py | 39 def warn_missing_role(role, exclude_server): argument 41 given role. 43 @param role: Name of the role. 44 @param exclude_server: Server to be excluded from search for role. 47 roles__role=role, 51 message = ('WARNING! There will be no server with role %s after it\'s ' 53 'normally without any server in role %s.' % 54 (role, exclude_server.hostname, role)) 58 def get_servers(hostname=None, role=None, status=None): argument 59 """Find servers with given role and status. [all …]
|
/external/python/google-api-python-client/docs/dyn/ |
D | dfareporting_v2_7.userRoles.html | 79 <p class="firstline">Deletes an existing user role.</p> 82 <p class="firstline">Gets one user role by ID.</p> 85 <p class="firstline">Inserts a new user role.</p> 94 <p class="firstline">Updates an existing user role. This method supports patch semantics.</p> 97 <p class="firstline">Updates an existing user role.</p> 101 <pre>Deletes an existing user role. 105 id: string, User role ID. (required) 111 <pre>Gets one user role by ID. 115 id: string, User role ID. (required) 120 { # Contains properties of auser role, which is used to manage user access. [all …]
|
D | dfareporting_v2_8.userRoles.html | 79 <p class="firstline">Deletes an existing user role.</p> 82 <p class="firstline">Gets one user role by ID.</p> 85 <p class="firstline">Inserts a new user role.</p> 94 <p class="firstline">Updates an existing user role. This method supports patch semantics.</p> 97 <p class="firstline">Updates an existing user role.</p> 101 <pre>Deletes an existing user role. 105 id: string, User role ID. (required) 111 <pre>Gets one user role by ID. 115 id: string, User role ID. (required) 120 { # Contains properties of auser role, which is used to manage user access. [all …]
|
D | admin_directory_v1.roles.html | 79 <p class="firstline">Deletes a role.</p> 82 <p class="firstline">Retrieves a role.</p> 85 <p class="firstline">Creates a role.</p> 94 <p class="firstline">Updates a role. This method supports patch semantics.</p> 97 <p class="firstline">Updates a role.</p> 101 <pre>Deletes a role. 105 roleId: string, Immutable ID of the role. (required) 111 <pre>Retrieves a role. 115 roleId: string, Immutable ID of the role. (required) 120 { # JSON template for role resource in Directory API. [all …]
|
D | admin_directory_v1.roleAssignments.html | 79 <p class="firstline">Deletes a role assignment.</p> 82 <p class="firstline">Retrieve a role assignment.</p> 85 <p class="firstline">Creates a role assignment.</p> 95 <pre>Deletes a role assignment. 99 roleAssignmentId: string, Immutable ID of the role assignment. (required) 105 <pre>Retrieve a role assignment. 109 roleAssignmentId: string, Immutable ID of the role assignment. (required) 117 "roleId": "A String", # The ID of the role that is assigned. 118 "assignedTo": "A String", # The unique ID of the user this role is assigned to. 120 "scopeType": "A String", # The scope in which this role is assigned. Possible values are: [all …]
|
D | dfareporting_v2_8.userRolePermissions.html | 79 <p class="firstline">Gets one user role permission by ID.</p> 82 <p class="firstline">Gets a list of user role permissions, possibly filtered.</p> 86 <pre>Gets one user role permission by ID. 90 id: string, User role permission ID. (required) 95 { # Contains properties of a user role permission. 96 …"permissionGroupId": "A String", # ID of the permission group that this user role permission belon… 98 "availability": "A String", # Levels of availability for a user role permission. 99 "name": "A String", # Name of this user role permission. 100 "id": "A String", # ID of this user role permission. 106 <pre>Gets a list of user role permissions, possibly filtered. [all …]
|
D | dfareporting_v2_7.userRolePermissions.html | 79 <p class="firstline">Gets one user role permission by ID.</p> 82 <p class="firstline">Gets a list of user role permissions, possibly filtered.</p> 86 <pre>Gets one user role permission by ID. 90 id: string, User role permission ID. (required) 95 { # Contains properties of a user role permission. 96 …"permissionGroupId": "A String", # ID of the permission group that this user role permission belon… 98 "availability": "A String", # Levels of availability for a user role permission. 99 "name": "A String", # Name of this user role permission. 100 "id": "A String", # ID of this user role permission. 106 <pre>Gets a list of user role permissions, possibly filtered. [all …]
|
/external/libxml2/test/relaxng/ |
D | docbook.rng | 600 <define name="role.attrib"> 602 <attribute name="role"> 816 <define name="title.role.attrib"> 817 <ref name="role.attrib"/> 832 <ref name="title.role.attrib"/> 834 <define name="titleabbrev.role.attrib"> 835 <ref name="role.attrib"/> 849 <ref name="titleabbrev.role.attrib"/> 851 <define name="subtitle.role.attrib"> 852 <ref name="role.attrib"/> [all …]
|
/external/selinux/libsepol/tests/ |
D | test-linker-roles.c | 33 * - role in appropriate symtab (global and decl) 38 * - role in base, no modules 39 * - role in base optional, no modules 40 * - role a in base, b in module 41 * - role a in base and module (additive) 42 * - role a in base and 2 module 43 * - role a in base optional, b in module 44 * - role a in base, b in module optional 45 * - role a in base optional, b in module optional 46 * - role a in base optional and module [all …]
|
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 1 Role Statements 4 role section in Role Statements 7 Declares a role identifier in the current namespace. 11 (role role_id) 22 <td align="left"><p><code>role</code></p></td> 23 <td align="left"><p>The <code>role</code> keyword.</p></td> 27 <td align="left"><p>The <code>role</code> identifier.</p></td> 34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`: 36 (role object_r) 39 (role role) [all …]
|
/external/selinux/libsepol/tests/policies/test-linker/ |
D | module1.conf | 6 role g_b_role_2; 21 #add role in module test 22 role g_m1_role_1; 23 role g_m1_role_1 types g_m1_type_1; 40 #add type to base role test 41 role g_b_role_2 types g_m1_type_1; 42 role g_b_role_3; 43 role g_b_role_3 types g_m1_type_2; 45 #add type to base optional role test 46 role o1_b_role_2; [all …]
|
/external/selinux/secilc/ |
D | secilc.8.xml | 33 …role="italic">secilc</emphasis> invokes the CIL compiler with the specified <emphasis role="italic… 40 …stitem><para>Write binary policy to <emphasis role="italic">file</emphasis> (default: policy.<emph… 45 …<listitem><para>Write file contexts to <emphasis role="italic">file</emphasis> (default: <emphasis… 50 …chitecture. May be <emphasis role="bold">selinux</emphasis> or <emphasis role="bold">xen</emphasis… 55 …role="bold">true</emphasis> or <emphasis role="bold">false</emphasis>. This will override the <emp… 60 …olicy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems SEL… 65 …role="bold">deny</emphasis>, <emphasis role="bold">allow</emphasis>, or <emphasis role="bold">reje… 70 …<listitem><para>Do not add <emphasis role="bold">dontaudit</emphasis> rules to the binary policy.<… 85 … <listitem><para>Do not check <emphasis role="bold">neverallow</emphasis> rules.</para></listitem> 95 …<listitem><para>Expand type attributes with fewer than <emphasis role="bold"><SIZE></emphasis> … [all …]
|
/external/autotest/server/site_tests/firmware_PDDataSwap/ |
D | firmware_PDDataSwap.py | 16 Servo based USB PD data role swap test 18 Pass critera is all data role swaps complete, or 29 # Upward facing port data role 31 # Downward facing port data role 97 """Get data role of PD connection 104 role = console.get_pd_role(port) 105 m = re.search('[\w]+-([\w]+)', role) 109 """Invert data role 111 @param local_role: data role to be flipped 113 @returns: flipped data role value [all …]
|
/external/skqp/infra/project-config/ |
D | cr-buildbucket.cfg | 12 role: READER 16 role: SCHEDULER 20 role: SCHEDULER 24 role: WRITER 32 role: READER 36 role: SCHEDULER 40 role: SCHEDULER 44 role: WRITER 52 role: READER 56 role: SCHEDULER [all …]
|
/external/skia/infra/project-config/ |
D | cr-buildbucket.cfg | 12 role: READER 16 role: SCHEDULER 20 role: SCHEDULER 24 role: WRITER 32 role: READER 36 role: SCHEDULER 40 role: SCHEDULER 44 role: WRITER 52 role: READER 56 role: SCHEDULER [all …]
|
/external/tcpdump/tests/ |
D | spb_bpduv4-v.out | 2 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 8 MSTI 10, Flags [Learn, Forward], port-role Designated 14 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 18 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 24 MSTI 10, Flags [Learn, Forward], port-role Designated 30 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 34 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 40 MSTI 10, Flags [Learn, Forward], port-role Designated 46 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 50 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 [all …]
|
D | mstp-v.out | 2 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 15 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 28 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 41 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 [all …]
|
D | rstp-v.out | 3 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 6 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 9 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 12 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 15 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 18 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 21 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 24 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 27 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 30 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated [all …]
|
/external/selinux/libsepol/src/ |
D | context.c | 38 role_datum_t *role; in context_is_valid() local 45 if (!c->role || c->role > p->p_roles.nprim) in context_is_valid() 54 if (c->role != OBJECT_R_VAL) { in context_is_valid() 56 * Role must be authorized for the type. in context_is_valid() 58 role = p->role_val_to_struct[c->role - 1]; in context_is_valid() 59 if (!role || !ebitmap_get_bit(&role->cache, c->type - 1)) in context_is_valid() 60 /* role may not be associated with type */ in context_is_valid() 64 * User must be authorized for the role. in context_is_valid() 70 if (!ebitmap_get_bit(&usrdatum->cache, c->role - 1)) in context_is_valid() 71 /* user may not be associated with role */ in context_is_valid() [all …]
|
/external/autotest/cli/ |
D | server.py | 13 modify: modify a server's role or status. 16 --role / -r: role that's related to server actions. 68 self.parser.add_option('-r', '--role', 69 help='Name of a role', 72 metavar='ROLE') 74 help=('Set to True to apply actions when role ' 94 role_info = topic_common.item_parse_info(attribute_name='role') 122 self.role = options.role 124 if self.skylab and self.role: 125 translation_utils.validate_server_role(self.role) [all …]
|
/external/autotest/server/cros/power/ |
D | servo_v4_charge_utils.py | 12 # Base delay time in seconds for Servo role change and PD negotiation. 14 # Total delay time in minutes for Servo role change and PD negotiation. 16 # Exponential backoff for Servo role change and PD negotiation. 27 responds to Servo charging commands. Restore Servo v4 power role after 46 raise error.TestNAError('Unrecognized Servo v4 power role: %s.', 70 def _change_role(self, role): argument 71 """Change Servo PD role and check if DUT responded accordingly. 73 @param role: string 'src' or 'snk'. If 'src' connect DUT to AC power; if 76 self._servo.set('servo_v4_role', role) 80 def check_servo_role(role): argument [all …]
|