/external/autotest/site_utils/ |
D | server_manager_actions.py | 27 RESTART_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 29 RESTART_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 31 RESTART_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 33 RELOAD_APACHE = (server_models.ServerRole.ROLE.SCHEDULER, 36 STOP_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 38 STOP_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 40 STOP_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 47 server_models.ServerRole.ROLE.SCHEDULER: [RESTART_SCHEDULER], 48 server_models.ServerRole.ROLE.HOST_SCHEDULER: [RESTART_HOST_SCHEDULER], 49 server_models.ServerRole.ROLE.SUITE_SCHEDULER: [all …]
|
D | server_manager_unittest.py | 54 attrs={'role': server_models.ServerRole.ROLE.DRONE}) 57 attrs={'role': server_models.ServerRole.ROLE.SCHEDULER}) 117 server=mox.IgnoreArg(), role=server_models.ServerRole.ROLE.DRONE 121 role=server_models.ServerRole.ROLE.DRONE) 130 server_models.validate(role=server_models.ServerRole.ROLE.DEVSERVER) 137 [server_models.ServerRole.ROLE.DRONE]) 140 role=server_models.ServerRole.ROLE.DEVSERVER 144 role=server_models.ServerRole.ROLE.DEVSERVER, 152 server_models.validate(role=server_models.ServerRole.ROLE.DRONE) 155 [server_models.ServerRole.ROLE.DRONE]) [all …]
|
D | server_manager_utils.py | 138 for role, _ in server_models.ServerRole.ROLE.choices(): 227 servers = get_servers(role=server_models.ServerRole.ROLE.DRONE, 281 servers = get_servers(role=server_models.ServerRole.ROLE.SHARD,
|
/external/autotest/frontend/server/ |
D | models.py | 101 ROLE = enum.Enum(*ROLE_LIST, string_values=True) variable in ServerRole 104 ROLES_REQUIRE_BACKUP = [ROLE.SCHEDULER, ROLE.HOST_SCHEDULER, 105 ROLE.DATABASE, ROLE.SUITE_SCHEDULER, 106 ROLE.DRONE] 109 ROLES_REQUIRE_UNIQUE_INSTANCE = [ROLE.SCHEDULER, 110 ROLE.HOST_SCHEDULER, 111 ROLE.DATABASE, 112 ROLE.SUITE_SCHEDULER] 115 role = dbmodels.CharField(max_length=128, choices=ROLE.choices())
|
/external/autotest/contrib/ |
D | deploy_puppet.sh | 27 ROLE= 37 ROLE=$OPTARG 65 if [ -n "${ROLE}" ]; then 66 ROLE_OPT="-r ${ROLE}" 73 if [ -z "${ROLE}" ] && [ -z "${STATUS}" ] && [ -z "${HOSTNAME}"]; then
|
/external/selinux/secilc/test/ |
D | minimum.cil | 6 (role ROLE) 14 (roletype ROLE TYPE) 15 (userrole USER ROLE) 18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | optional_test.cil | 7 (role ROLE) 15 (roletype ROLE TYPE) 16 (userrole USER ROLE) 19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | neverallow.cil | 6 (role ROLE) 14 (roletype ROLE TYPE) 15 (userrole USER ROLE) 18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | block_test.cil | 7 (role ROLE) 15 (roletype ROLE TYPE) 16 (userrole USER ROLE) 19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | in_test.cil | 7 (role ROLE) 15 (roletype ROLE TYPE) 16 (userrole USER ROLE) 19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | name_resolution_test.cil | 7 (role ROLE) 15 (roletype ROLE TYPE) 16 (userrole USER ROLE) 19 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
D | bounds.cil | 6 (role ROLE) 14 (roletype ROLE TYPE) 15 (userrole USER ROLE) 18 (sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
|
/external/selinux/checkpolicy/ |
D | policy_parse.y | 95 %token ROLE 499 role_type_def : ROLE identifier TYPES names ';' 502 role_attr_def : ROLE identifier opt_attr_list ';' 520 role_def : ROLE identifier_push ';' 522 | ROLE identifier_push '{' roles '}' 596 | SOURCE ROLE { if (insert_separator(1)) return -1; } names_push 599 | TARGET ROLE { if (insert_separator(1)) return -1; } names_push 602 | ROLE role_mls_op 917 require_decl_def : ROLE { $$ = require_role; }
|
D | policy_scan.l | 79 ROLE | 80 role { return(ROLE); }
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | __init__.py | 26 ROLE = _policy.ROLE variable 572 roles = map(lambda x: x['name'], info(ROLE))
|
/external/selinux/policycoreutils/sepolicy/ |
D | info.c | 57 TYPE, ATTRIBUTE, ROLE, USER, PORT, BOOLEAN, CLASS, SENS, CATS enumerator 1326 case ROLE: in info() 1374 PyModule_AddIntConstant(m, "ROLE", ROLE); in init_info()
|
/external/selinux/sepolgen/src/sepolgen/ |
D | refpolicy.py | 42 ROLE = 4 variable 48 "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
|
D | interfaces.py | 165 return __param_insert(role.role, refpolicy.ROLE, None, params)
|
/external/selinux/policycoreutils/ |
D | ChangeLog | 1056 * Changed genhomedircon to warn on use of ROLE in homedir_template
|