Home
last modified time | relevance | path

Searched full:role (Results 1 – 25 of 881) sorted by relevance

12345678910>>...36

/external/autotest/site_utils/
Dserver_manager.py8 create(hostname, role=None, note=None)
9 Create a server with given role, with status backup.
15 modify(hostname, role=None, status=None, note=None, delete=False,
17 Modify a server's role, status, note, or attribute:
18 1. Add role to a server. If the server is in primary status, proper actions
19 like service restart will be executed to enable the role.
20 2. Delete a role from a server. If the server is in primary status, proper
21 actions like service restart will be executed to disable the role.
24 or disable each role of the server.
43 def _add_role(server, role, action): argument
[all …]
Dserver_manager_unittest.py54 attrs={'role': server_models.ServerRole.ROLE.DRONE})
57 attrs={'role': server_models.ServerRole.ROLE.SCHEDULER})
117 server=mox.IgnoreArg(), role=server_models.ServerRole.ROLE.DRONE
121 role=server_models.ServerRole.ROLE.DRONE)
125 """Test manager can add a role to a backup server successfully.
130 server_models.validate(role=server_models.ServerRole.ROLE.DEVSERVER)
137 [server_models.ServerRole.ROLE.DRONE])
140 role=server_models.ServerRole.ROLE.DEVSERVER
144 role=server_models.ServerRole.ROLE.DEVSERVER,
149 """Test manager fails to add a role to a backup server if server already
[all …]
Dserver_manager_actions.py8 After a role is added or removed from a server, certain services may need to
26 # (the role of which the command should be executed, the command)
27 RESTART_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER,
29 RESTART_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER,
31 RESTART_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER,
33 RELOAD_APACHE = (server_models.ServerRole.ROLE.SCHEDULER,
36 STOP_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER,
38 STOP_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER,
40 STOP_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER,
43 # Dictionary of actions needed for a role to be enabled. Key is the role, and
[all …]
Dserver_manager_utils.py37 def warn_missing_role(role, exclude_server): argument
39 given role.
41 @param role: Name of the role.
42 @param exclude_server: Server to be excluded from search for role.
45 roles__role=role,
49 message = ('WARNING! There will be no server with role %s after it\'s '
51 'normally without any server in role %s.' %
52 (role, exclude_server.hostname, role))
56 def get_servers(hostname=None, role=None, status=None): argument
57 """Find servers with given role and status.
[all …]
/external/libxml2/test/relaxng/
Ddocbook.rng600 <define name="role.attrib">
602 <attribute name="role">
816 <define name="title.role.attrib">
817 <ref name="role.attrib"/>
832 <ref name="title.role.attrib"/>
834 <define name="titleabbrev.role.attrib">
835 <ref name="role.attrib"/>
849 <ref name="titleabbrev.role.attrib"/>
851 <define name="subtitle.role.attrib">
852 <ref name="role.attrib"/>
[all …]
/external/selinux/secilc/docs/
Dcil_role_statements.md1 Role Statements
4 role section in Role Statements
7 Declares a role identifier in the current namespace.
11 (role role_id)
22 <td align="left"><p><code>role</code></p></td>
23 <td align="left"><p>The <code>role</code> keyword.</p></td>
27 <td align="left"><p>The <code>role</code> identifier.</p></td>
34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`:
36 (role object_r)
39 (role role)
[all …]
/external/selinux/libsepol/tests/
Dtest-linker-roles.c33 * - role in appropriate symtab (global and decl)
38 * - role in base, no modules
39 * - role in base optional, no modules
40 * - role a in base, b in module
41 * - role a in base and module (additive)
42 * - role a in base and 2 module
43 * - role a in base optional, b in module
44 * - role a in base, b in module optional
45 * - role a in base optional, b in module optional
46 * - role a in base optional and module
[all …]
/external/selinux/libsepol/tests/policies/test-linker/
Dmodule1.conf6 role g_b_role_2;
21 #add role in module test
22 role g_m1_role_1;
23 role g_m1_role_1 types g_m1_type_1;
40 #add type to base role test
41 role g_b_role_2 types g_m1_type_1;
42 role g_b_role_3;
43 role g_b_role_3 types g_m1_type_2;
45 #add type to base optional role test
46 role o1_b_role_2;
[all …]
Dmodule2.conf15 role g_m2_role_1;
16 role g_m2_role_1 types g_m2_type_1;
21 #add types to role declared in base test
23 role g_b_role_3;
24 role g_b_role_3 types g_m2_type_2;
26 #optional base role w/ adds in 2 modules
27 role o4_b_role_1;
28 role o4_b_role_1 types g_m2_type_1;
51 role o1_m2_role_1;
52 role o1_m2_role_1 types o1_m2_type_1;
/external/autotest/server/site_tests/firmware_PDDataSwap/
Dfirmware_PDDataSwap.py16 Servo based USB PD data role swap test
18 Pass critera is all data role swaps complete, or
29 # Upward facing port data role
31 # Downward facing port data role
97 """Get data role of PD connection
104 role = console.get_pd_role(port)
105 m = re.search('[\w]+-([\w]+)', role)
109 """Invert data role
111 @param local_role: data role to be flipped
113 @returns: flipped data role value
[all …]
/external/selinux/secilc/
Dsecilc.8.xml33role="italic">secilc</emphasis> invokes the CIL compiler with the specified <emphasis role="italic…
40 …stitem><para>Write binary policy to <emphasis role="italic">file</emphasis> (default: policy.<emph…
45 …<listitem><para>Write file contexts to <emphasis role="italic">file</emphasis> (default: <emphasis…
50 …chitecture. May be <emphasis role="bold">selinux</emphasis> or <emphasis role="bold">xen</emphasis…
55role="bold">true</emphasis> or <emphasis role="bold">false</emphasis>. This will override the <emp…
60 …olicy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems SEL…
65role="bold">deny</emphasis>, <emphasis role="bold">allow</emphasis>, or <emphasis role="bold">reje…
70 …<listitem><para>Do not add <emphasis role="bold">dontaudit</emphasis> rules to the binary policy.<…
80 … <listitem><para>Do not check <emphasis role="bold">neverallow</emphasis> rules.</para></listitem>
108 …scribing the CIL language statements is available starting with <emphasis role="italic">docs/html/…
[all …]
/external/autotest/cli/
Dserver.py13 modify: modify a server's role or status.
16 --role / -r: role that's related to server actions.
50 self.parser.add_option('-r', '--role',
51 help='Name of a role',
54 metavar='ROLE')
56 help=('Set to True to apply actions when role '
72 role_info = topic_common.item_parse_info(attribute_name='role')
92 self.role = options.role
113 """atest server list [--role <role>]"""
158 @return: A list of servers matched given hostname and role.
[all …]
/external/skia/infra/project-config/
Dcr-buildbucket.cfg12 role: READER
16 role: SCHEDULER
20 role: SCHEDULER
24 role: WRITER
32 role: READER
36 role: SCHEDULER
40 role: SCHEDULER
44 role: WRITER
52 role: READER
56 role: SCHEDULER
[all …]
/external/selinux/libsepol/src/
Dcontext.c37 role_datum_t *role; in context_is_valid() local
44 if (!c->role || c->role > p->p_roles.nprim) in context_is_valid()
53 if (c->role != OBJECT_R_VAL) { in context_is_valid()
55 * Role must be authorized for the type. in context_is_valid()
57 role = p->role_val_to_struct[c->role - 1]; in context_is_valid()
58 if (!ebitmap_get_bit(&role->cache, c->type - 1)) in context_is_valid()
59 /* role may not be associated with type */ in context_is_valid()
63 * User must be authorized for the role. in context_is_valid()
69 if (!ebitmap_get_bit(&usrdatum->cache, c->role - 1)) in context_is_valid()
70 /* user may not be associated with role */ in context_is_valid()
[all …]
Dcontext_record.c14 /* Selinux role */
15 char *role; member
51 /* Role */ in hidden_def()
55 return con->role; in hidden_def()
61 sepol_context_t * con, const char *role) in hidden_def()
64 char *tmp_role = strdup(role); in hidden_def()
67 "context role to %s", role); in hidden_def()
70 free(con->role); in hidden_def()
71 con->role = tmp_role; in hidden_def()
142 con->role = NULL; in hidden_def()
[all …]
/external/autotest/frontend/server/
Dmodels.py49 roles = ','.join([r.role for r in self.roles.all()])
62 """Get a list of role names of the server.
64 @return: A list of role names of the server.
66 return [r.role for r in self.roles.all()]
96 """Role associated with hosts."""
101 ROLE = enum.Enum(*ROLE_LIST, string_values=True) variable in ServerRole
104 ROLES_REQUIRE_BACKUP = [ROLE.SCHEDULER, ROLE.HOST_SCHEDULER,
105 ROLE.DATABASE, ROLE.SUITE_SCHEDULER,
106 ROLE.DRONE]
109 ROLES_REQUIRE_UNIQUE_INSTANCE = [ROLE.SCHEDULER,
[all …]
/external/tcpdump/tests/
Dmstp-v.out2 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000
8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated
11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root
15 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000
21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root
24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated
28 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000
34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated
37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root
41 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000
[all …]
Drstp-v.out3 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
6 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
9 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
12 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
15 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
18 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
21 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
24 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
27 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
30 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated
[all …]
Drpvst-v.out13 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
16 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
19 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
22 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
25 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
28 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
31 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
34 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
37 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
43 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated
[all …]
/external/guava/guava/src/com/google/common/math/
DMathPreconditions.java30 static int checkPositive(@Nullable String role, int x) { in checkPositive() argument
32 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive()
37 static long checkPositive(@Nullable String role, long x) { in checkPositive() argument
39 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive()
44 static BigInteger checkPositive(@Nullable String role, BigInteger x) { in checkPositive() argument
46 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive()
51 static int checkNonNegative(@Nullable String role, int x) { in checkNonNegative() argument
53 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative()
58 static long checkNonNegative(@Nullable String role, long x) { in checkNonNegative() argument
60 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative()
[all …]
/external/autotest/server/site_tests/firmware_PDPowerSwap/
Dfirmware_PDPowerSwap.py15 Servo based USB PD power role swap test.
17 Pass critera is all power role swaps are successful if the DUT
28 # Source power role
30 # Sink power role
36 @returns True if Plankton power role is source, false otherwise
43 # Current Plankton power role should be source
50 a pd power role swap request message. This allows the
67 """Perform a power role swap request
69 Initiate a power role swap request on either the DUT or
71 role swap is then verified to have taken place.
[all …]
/external/chromium-trace/catapult/third_party/Paste/paste/auth/
Dgrantip.py17 with ``-``, like ``'-system'`` meaning that role should be
67 for role in roles:
68 if role.startswith('-'):
69 remove_roles.append(role[1:])
71 if role not in cur_roles:
72 cur_roles.append(role)
73 for role in remove_roles:
74 if role in cur_roles:
75 cur_roles.remove(role)
88 # Give localhost system role (no username):
[all …]
/external/tpm2/generator/
Dcommands.txt175 _COMMENT handle of parent for new object Auth Index: 1 Auth Role: USER
221 _COMMENT TPM handle of parent key; shall not be a reserved handle Auth Index: 1 Auth Role: USER
311 _COMMENT handle of the object associated with certificate in credentialBlob Auth Index: 1 Auth Role
314 _COMMENT loaded key used to decrypt the TPMS_SENSITIVE in credentialBlob Auth Index: 2 Auth Role: U…
372 _COMMENT handle of a loaded data object Auth Index: 1 Auth Role: USER
394 _COMMENT handle of the object Auth Index: 1 Auth Role: ADMIN
422 _COMMENT loaded object to duplicate Auth Index: 1 Auth Role: DUP
459 _COMMENT parent of object Auth Index: 1 Auth Role: User
495 _COMMENT the handle of the new parent for the object Auth Index: 1 Auth Role: USER
561 _COMMENT RSA key to use for decryption Auth Index: 1 Auth Role: USER
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/
Dconnection.py286 specify the role with the appropriate permissions) to get
300 are associated with the access policy of the role being
305 intersection of the role's access policy and the policy that
310 To assume a role, your AWS account must be trusted by the
311 role. The trust relationship is defined in the role's trust
312 policy when the IAM role is created. You must also have a
320 :param role_arn: The Amazon Resource Name (ARN) of the role that the
324 :param role_session_name: An identifier for the assumed role session.
332 associated with the role. Use this policy to further restrict the
336 :param duration_seconds: The duration, in seconds, of the role session.
[all …]
/external/icu/icu4j/
Dpom.xml37 <role>PMC Member</role>
45 <role>PMC Member</role>
53 <role>PMC Member</role>
61 <role>PMC Member</role>
69 <role>PMC Member</role>
77 <role>PMC Member</role>
85 <role>PMC Member</role>
93 <role>PMC Member</role>

12345678910>>...36