/external/autotest/site_utils/ |
D | server_manager.py | 8 create(hostname, role=None, note=None) 9 Create a server with given role, with status backup. 15 modify(hostname, role=None, status=None, note=None, delete=False, 17 Modify a server's role, status, note, or attribute: 18 1. Add role to a server. If the server is in primary status, proper actions 19 like service restart will be executed to enable the role. 20 2. Delete a role from a server. If the server is in primary status, proper 21 actions like service restart will be executed to disable the role. 24 or disable each role of the server. 43 def _add_role(server, role, action): argument [all …]
|
D | server_manager_unittest.py | 54 attrs={'role': server_models.ServerRole.ROLE.DRONE}) 57 attrs={'role': server_models.ServerRole.ROLE.SCHEDULER}) 117 server=mox.IgnoreArg(), role=server_models.ServerRole.ROLE.DRONE 121 role=server_models.ServerRole.ROLE.DRONE) 125 """Test manager can add a role to a backup server successfully. 130 server_models.validate(role=server_models.ServerRole.ROLE.DEVSERVER) 137 [server_models.ServerRole.ROLE.DRONE]) 140 role=server_models.ServerRole.ROLE.DEVSERVER 144 role=server_models.ServerRole.ROLE.DEVSERVER, 149 """Test manager fails to add a role to a backup server if server already [all …]
|
D | server_manager_actions.py | 8 After a role is added or removed from a server, certain services may need to 26 # (the role of which the command should be executed, the command) 27 RESTART_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 29 RESTART_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 31 RESTART_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 33 RELOAD_APACHE = (server_models.ServerRole.ROLE.SCHEDULER, 36 STOP_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 38 STOP_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 40 STOP_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 43 # Dictionary of actions needed for a role to be enabled. Key is the role, and [all …]
|
D | server_manager_utils.py | 37 def warn_missing_role(role, exclude_server): argument 39 given role. 41 @param role: Name of the role. 42 @param exclude_server: Server to be excluded from search for role. 45 roles__role=role, 49 message = ('WARNING! There will be no server with role %s after it\'s ' 51 'normally without any server in role %s.' % 52 (role, exclude_server.hostname, role)) 56 def get_servers(hostname=None, role=None, status=None): argument 57 """Find servers with given role and status. [all …]
|
/external/libxml2/test/relaxng/ |
D | docbook.rng | 600 <define name="role.attrib"> 602 <attribute name="role"> 816 <define name="title.role.attrib"> 817 <ref name="role.attrib"/> 832 <ref name="title.role.attrib"/> 834 <define name="titleabbrev.role.attrib"> 835 <ref name="role.attrib"/> 849 <ref name="titleabbrev.role.attrib"/> 851 <define name="subtitle.role.attrib"> 852 <ref name="role.attrib"/> [all …]
|
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 1 Role Statements 4 role section in Role Statements 7 Declares a role identifier in the current namespace. 11 (role role_id) 22 <td align="left"><p><code>role</code></p></td> 23 <td align="left"><p>The <code>role</code> keyword.</p></td> 27 <td align="left"><p>The <code>role</code> identifier.</p></td> 34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`: 36 (role object_r) 39 (role role) [all …]
|
/external/selinux/libsepol/tests/ |
D | test-linker-roles.c | 33 * - role in appropriate symtab (global and decl) 38 * - role in base, no modules 39 * - role in base optional, no modules 40 * - role a in base, b in module 41 * - role a in base and module (additive) 42 * - role a in base and 2 module 43 * - role a in base optional, b in module 44 * - role a in base, b in module optional 45 * - role a in base optional, b in module optional 46 * - role a in base optional and module [all …]
|
/external/selinux/libsepol/tests/policies/test-linker/ |
D | module1.conf | 6 role g_b_role_2; 21 #add role in module test 22 role g_m1_role_1; 23 role g_m1_role_1 types g_m1_type_1; 40 #add type to base role test 41 role g_b_role_2 types g_m1_type_1; 42 role g_b_role_3; 43 role g_b_role_3 types g_m1_type_2; 45 #add type to base optional role test 46 role o1_b_role_2; [all …]
|
D | module2.conf | 15 role g_m2_role_1; 16 role g_m2_role_1 types g_m2_type_1; 21 #add types to role declared in base test 23 role g_b_role_3; 24 role g_b_role_3 types g_m2_type_2; 26 #optional base role w/ adds in 2 modules 27 role o4_b_role_1; 28 role o4_b_role_1 types g_m2_type_1; 51 role o1_m2_role_1; 52 role o1_m2_role_1 types o1_m2_type_1;
|
/external/autotest/server/site_tests/firmware_PDDataSwap/ |
D | firmware_PDDataSwap.py | 16 Servo based USB PD data role swap test 18 Pass critera is all data role swaps complete, or 29 # Upward facing port data role 31 # Downward facing port data role 97 """Get data role of PD connection 104 role = console.get_pd_role(port) 105 m = re.search('[\w]+-([\w]+)', role) 109 """Invert data role 111 @param local_role: data role to be flipped 113 @returns: flipped data role value [all …]
|
/external/selinux/secilc/ |
D | secilc.8.xml | 33 …role="italic">secilc</emphasis> invokes the CIL compiler with the specified <emphasis role="italic… 40 …stitem><para>Write binary policy to <emphasis role="italic">file</emphasis> (default: policy.<emph… 45 …<listitem><para>Write file contexts to <emphasis role="italic">file</emphasis> (default: <emphasis… 50 …chitecture. May be <emphasis role="bold">selinux</emphasis> or <emphasis role="bold">xen</emphasis… 55 …role="bold">true</emphasis> or <emphasis role="bold">false</emphasis>. This will override the <emp… 60 …olicy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems SEL… 65 …role="bold">deny</emphasis>, <emphasis role="bold">allow</emphasis>, or <emphasis role="bold">reje… 70 …<listitem><para>Do not add <emphasis role="bold">dontaudit</emphasis> rules to the binary policy.<… 80 … <listitem><para>Do not check <emphasis role="bold">neverallow</emphasis> rules.</para></listitem> 108 …scribing the CIL language statements is available starting with <emphasis role="italic">docs/html/… [all …]
|
/external/autotest/cli/ |
D | server.py | 13 modify: modify a server's role or status. 16 --role / -r: role that's related to server actions. 50 self.parser.add_option('-r', '--role', 51 help='Name of a role', 54 metavar='ROLE') 56 help=('Set to True to apply actions when role ' 72 role_info = topic_common.item_parse_info(attribute_name='role') 92 self.role = options.role 113 """atest server list [--role <role>]""" 158 @return: A list of servers matched given hostname and role. [all …]
|
/external/skia/infra/project-config/ |
D | cr-buildbucket.cfg | 12 role: READER 16 role: SCHEDULER 20 role: SCHEDULER 24 role: WRITER 32 role: READER 36 role: SCHEDULER 40 role: SCHEDULER 44 role: WRITER 52 role: READER 56 role: SCHEDULER [all …]
|
/external/selinux/libsepol/src/ |
D | context.c | 37 role_datum_t *role; in context_is_valid() local 44 if (!c->role || c->role > p->p_roles.nprim) in context_is_valid() 53 if (c->role != OBJECT_R_VAL) { in context_is_valid() 55 * Role must be authorized for the type. in context_is_valid() 57 role = p->role_val_to_struct[c->role - 1]; in context_is_valid() 58 if (!ebitmap_get_bit(&role->cache, c->type - 1)) in context_is_valid() 59 /* role may not be associated with type */ in context_is_valid() 63 * User must be authorized for the role. in context_is_valid() 69 if (!ebitmap_get_bit(&usrdatum->cache, c->role - 1)) in context_is_valid() 70 /* user may not be associated with role */ in context_is_valid() [all …]
|
D | context_record.c | 14 /* Selinux role */ 15 char *role; member 51 /* Role */ in hidden_def() 55 return con->role; in hidden_def() 61 sepol_context_t * con, const char *role) in hidden_def() 64 char *tmp_role = strdup(role); in hidden_def() 67 "context role to %s", role); in hidden_def() 70 free(con->role); in hidden_def() 71 con->role = tmp_role; in hidden_def() 142 con->role = NULL; in hidden_def() [all …]
|
/external/autotest/frontend/server/ |
D | models.py | 49 roles = ','.join([r.role for r in self.roles.all()]) 62 """Get a list of role names of the server. 64 @return: A list of role names of the server. 66 return [r.role for r in self.roles.all()] 96 """Role associated with hosts.""" 101 ROLE = enum.Enum(*ROLE_LIST, string_values=True) variable in ServerRole 104 ROLES_REQUIRE_BACKUP = [ROLE.SCHEDULER, ROLE.HOST_SCHEDULER, 105 ROLE.DATABASE, ROLE.SUITE_SCHEDULER, 106 ROLE.DRONE] 109 ROLES_REQUIRE_UNIQUE_INSTANCE = [ROLE.SCHEDULER, [all …]
|
/external/tcpdump/tests/ |
D | mstp-v.out | 2 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 15 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 28 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 41 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 [all …]
|
D | rstp-v.out | 3 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 6 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 9 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 12 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 15 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 18 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 21 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 24 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 27 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 30 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated [all …]
|
D | rpvst-v.out | 13 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 16 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 19 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 22 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 25 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 28 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 31 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 34 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 37 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 43 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated [all …]
|
/external/guava/guava/src/com/google/common/math/ |
D | MathPreconditions.java | 30 static int checkPositive(@Nullable String role, int x) { in checkPositive() argument 32 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 37 static long checkPositive(@Nullable String role, long x) { in checkPositive() argument 39 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 44 static BigInteger checkPositive(@Nullable String role, BigInteger x) { in checkPositive() argument 46 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 51 static int checkNonNegative(@Nullable String role, int x) { in checkNonNegative() argument 53 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative() 58 static long checkNonNegative(@Nullable String role, long x) { in checkNonNegative() argument 60 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative() [all …]
|
/external/autotest/server/site_tests/firmware_PDPowerSwap/ |
D | firmware_PDPowerSwap.py | 15 Servo based USB PD power role swap test. 17 Pass critera is all power role swaps are successful if the DUT 28 # Source power role 30 # Sink power role 36 @returns True if Plankton power role is source, false otherwise 43 # Current Plankton power role should be source 50 a pd power role swap request message. This allows the 67 """Perform a power role swap request 69 Initiate a power role swap request on either the DUT or 71 role swap is then verified to have taken place. [all …]
|
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
D | grantip.py | 17 with ``-``, like ``'-system'`` meaning that role should be 67 for role in roles: 68 if role.startswith('-'): 69 remove_roles.append(role[1:]) 71 if role not in cur_roles: 72 cur_roles.append(role) 73 for role in remove_roles: 74 if role in cur_roles: 75 cur_roles.remove(role) 88 # Give localhost system role (no username): [all …]
|
/external/tpm2/generator/ |
D | commands.txt | 175 _COMMENT handle of parent for new object Auth Index: 1 Auth Role: USER 221 _COMMENT TPM handle of parent key; shall not be a reserved handle Auth Index: 1 Auth Role: USER 311 _COMMENT handle of the object associated with certificate in credentialBlob Auth Index: 1 Auth Role… 314 _COMMENT loaded key used to decrypt the TPMS_SENSITIVE in credentialBlob Auth Index: 2 Auth Role: U… 372 _COMMENT handle of a loaded data object Auth Index: 1 Auth Role: USER 394 _COMMENT handle of the object Auth Index: 1 Auth Role: ADMIN 422 _COMMENT loaded object to duplicate Auth Index: 1 Auth Role: DUP 459 _COMMENT parent of object Auth Index: 1 Auth Role: User 495 _COMMENT the handle of the new parent for the object Auth Index: 1 Auth Role: USER 561 _COMMENT RSA key to use for decryption Auth Index: 1 Auth Role: USER [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
D | connection.py | 286 specify the role with the appropriate permissions) to get 300 are associated with the access policy of the role being 305 intersection of the role's access policy and the policy that 310 To assume a role, your AWS account must be trusted by the 311 role. The trust relationship is defined in the role's trust 312 policy when the IAM role is created. You must also have a 320 :param role_arn: The Amazon Resource Name (ARN) of the role that the 324 :param role_session_name: An identifier for the assumed role session. 332 associated with the role. Use this policy to further restrict the 336 :param duration_seconds: The duration, in seconds, of the role session. [all …]
|
/external/icu/icu4j/ |
D | pom.xml | 37 <role>PMC Member</role> 45 <role>PMC Member</role> 53 <role>PMC Member</role> 61 <role>PMC Member</role> 69 <role>PMC Member</role> 77 <role>PMC Member</role> 85 <role>PMC Member</role> 93 <role>PMC Member</role>
|