/external/autotest/site_utils/ |
D | server_manager.py | 8 create(hostname, role=None, note=None) 9 Create a server with given role, with status backup. 15 modify(hostname, role=None, status=None, note=None, delete=False, 17 Modify a server's role, status, note, or attribute: 18 1. Add role to a server. If the server is in primary status, proper actions 19 like service restart will be executed to enable the role. 20 2. Delete a role from a server. If the server is in primary status, proper 21 actions like service restart will be executed to disable the role. 24 or disable each role of the server. 43 def _add_role(server, role, action): argument [all …]
|
D | server_manager_unittest.py | 54 attrs={'role': server_models.ServerRole.ROLE.DRONE}) 57 attrs={'role': server_models.ServerRole.ROLE.SCHEDULER}) 117 server=mox.IgnoreArg(), role=server_models.ServerRole.ROLE.DRONE 121 role=server_models.ServerRole.ROLE.DRONE) 125 """Test manager can add a role to a backup server successfully. 130 server_models.validate(role=server_models.ServerRole.ROLE.DEVSERVER) 137 [server_models.ServerRole.ROLE.DRONE]) 140 role=server_models.ServerRole.ROLE.DEVSERVER 144 role=server_models.ServerRole.ROLE.DEVSERVER, 149 """Test manager fails to add a role to a backup server if server already [all …]
|
D | server_manager_actions.py | 8 After a role is added or removed from a server, certain services may need to 26 # (the role of which the command should be executed, the command) 27 RESTART_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 29 RESTART_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 31 RESTART_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 33 RELOAD_APACHE = (server_models.ServerRole.ROLE.SCHEDULER, 36 STOP_SCHEDULER = (server_models.ServerRole.ROLE.SCHEDULER, 38 STOP_HOST_SCHEDULER = (server_models.ServerRole.ROLE.HOST_SCHEDULER, 40 STOP_SUITE_SCHEDULER = (server_models.ServerRole.ROLE.SUITE_SCHEDULER, 43 # Dictionary of actions needed for a role to be enabled. Key is the role, and [all …]
|
D | server_manager_utils.py | 39 def warn_missing_role(role, exclude_server): argument 41 given role. 43 @param role: Name of the role. 44 @param exclude_server: Server to be excluded from search for role. 47 roles__role=role, 51 message = ('WARNING! There will be no server with role %s after it\'s ' 53 'normally without any server in role %s.' % 54 (role, exclude_server.hostname, role)) 58 def get_servers(hostname=None, role=None, status=None): argument 59 """Find servers with given role and status. [all …]
|
/external/libxml2/test/relaxng/ |
D | docbook.rng | 600 <define name="role.attrib"> 602 <attribute name="role"> 816 <define name="title.role.attrib"> 817 <ref name="role.attrib"/> 832 <ref name="title.role.attrib"/> 834 <define name="titleabbrev.role.attrib"> 835 <ref name="role.attrib"/> 849 <ref name="titleabbrev.role.attrib"/> 851 <define name="subtitle.role.attrib"> 852 <ref name="role.attrib"/> [all …]
|
/external/selinux/libsepol/tests/ |
D | test-linker-roles.c | 33 * - role in appropriate symtab (global and decl) 38 * - role in base, no modules 39 * - role in base optional, no modules 40 * - role a in base, b in module 41 * - role a in base and module (additive) 42 * - role a in base and 2 module 43 * - role a in base optional, b in module 44 * - role a in base, b in module optional 45 * - role a in base optional, b in module optional 46 * - role a in base optional and module [all …]
|
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 1 Role Statements 4 role section in Role Statements 7 Declares a role identifier in the current namespace. 11 (role role_id) 22 <td align="left"><p><code>role</code></p></td> 23 <td align="left"><p>The <code>role</code> keyword.</p></td> 27 <td align="left"><p>The <code>role</code> identifier.</p></td> 34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`: 36 (role object_r) 39 (role role) [all …]
|
/external/selinux/libsepol/tests/policies/test-linker/ |
D | module1.conf | 6 role g_b_role_2; 21 #add role in module test 22 role g_m1_role_1; 23 role g_m1_role_1 types g_m1_type_1; 40 #add type to base role test 41 role g_b_role_2 types g_m1_type_1; 42 role g_b_role_3; 43 role g_b_role_3 types g_m1_type_2; 45 #add type to base optional role test 46 role o1_b_role_2; [all …]
|
D | module2.conf | 15 role g_m2_role_1; 16 role g_m2_role_1 types g_m2_type_1; 21 #add types to role declared in base test 23 role g_b_role_3; 24 role g_b_role_3 types g_m2_type_2; 26 #optional base role w/ adds in 2 modules 27 role o4_b_role_1; 28 role o4_b_role_1 types g_m2_type_1; 51 role o1_m2_role_1; 52 role o1_m2_role_1 types o1_m2_type_1;
|
/external/skia/infra/project-config/ |
D | cr-buildbucket.cfg | 12 role: READER 16 role: SCHEDULER 20 role: SCHEDULER 24 role: WRITER 32 role: READER 36 role: SCHEDULER 40 role: SCHEDULER 44 role: WRITER 52 role: READER 56 role: SCHEDULER [all …]
|
/external/selinux/secilc/ |
D | secilc.8.xml | 33 …role="italic">secilc</emphasis> invokes the CIL compiler with the specified <emphasis role="italic… 40 …stitem><para>Write binary policy to <emphasis role="italic">file</emphasis> (default: policy.<emph… 45 …<listitem><para>Write file contexts to <emphasis role="italic">file</emphasis> (default: <emphasis… 50 …chitecture. May be <emphasis role="bold">selinux</emphasis> or <emphasis role="bold">xen</emphasis… 55 …role="bold">true</emphasis> or <emphasis role="bold">false</emphasis>. This will override the <emp… 60 …olicy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems SEL… 65 …role="bold">deny</emphasis>, <emphasis role="bold">allow</emphasis>, or <emphasis role="bold">reje… 70 …<listitem><para>Do not add <emphasis role="bold">dontaudit</emphasis> rules to the binary policy.<… 80 … <listitem><para>Do not check <emphasis role="bold">neverallow</emphasis> rules.</para></listitem> 90 …<listitem><para>Expand type attributes with fewer than <emphasis role="bold"><SIZE></emphasis> … [all …]
|
/external/autotest/server/site_tests/firmware_PDDataSwap/ |
D | firmware_PDDataSwap.py | 16 Servo based USB PD data role swap test 18 Pass critera is all data role swaps complete, or 29 # Upward facing port data role 31 # Downward facing port data role 97 """Get data role of PD connection 104 role = console.get_pd_role(port) 105 m = re.search('[\w]+-([\w]+)', role) 109 """Invert data role 111 @param local_role: data role to be flipped 113 @returns: flipped data role value [all …]
|
/external/tcpdump/tests/ |
D | spb_bpduv4-v.out | 2 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 8 MSTI 10, Flags [Learn, Forward], port-role Designated 14 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 18 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 24 MSTI 10, Flags [Learn, Forward], port-role Designated 30 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 34 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 40 MSTI 10, Flags [Learn, Forward], port-role Designated 46 Restricted role-flag: 0, Format id 0 cap 0, Convention id 2 cap 32, 50 port-role Designated, CIST root-id 8000.52:54:00:45:5f:15, CIST ext-pathcost 0 [all …]
|
D | mstp-v.out | 2 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 15 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 28 port-role Root, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 41 port-role Designated, CIST root-id 0000.00:1f:27:b4:7d:80, CIST ext-pathcost 200000 [all …]
|
D | rstp-v.out | 3 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 6 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 9 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 12 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 15 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 18 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 21 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 24 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 27 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated 30 root-id 8001.00:19:06:ea:b8:80, root-pathcost 0, port-role Designated [all …]
|
D | rpvst-v.out | 13 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 16 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 19 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 22 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 25 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 28 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 31 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 34 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 37 root-id 8005.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated 43 root-id 8001.00:1f:6d:96:ec:00, root-pathcost 0, port-role Designated [all …]
|
/external/autotest/frontend/server/ |
D | models.py | 49 roles = ','.join([r.role for r in self.roles.all()]) 62 """Get a list of role names of the server. 64 @return: A list of role names of the server. 66 return [r.role for r in self.roles.all()] 96 """Role associated with hosts.""" 101 ROLE = enum.Enum(*ROLE_LIST, string_values=True) variable in ServerRole 104 ROLES_REQUIRE_BACKUP = [ROLE.SCHEDULER, ROLE.HOST_SCHEDULER, 105 ROLE.DATABASE, ROLE.SUITE_SCHEDULER, 106 ROLE.DRONE] 109 ROLES_REQUIRE_UNIQUE_INSTANCE = [ROLE.SCHEDULER, [all …]
|
/external/selinux/libsepol/src/ |
D | context.c | 38 role_datum_t *role; in context_is_valid() local 45 if (!c->role || c->role > p->p_roles.nprim) in context_is_valid() 54 if (c->role != OBJECT_R_VAL) { in context_is_valid() 56 * Role must be authorized for the type. in context_is_valid() 58 role = p->role_val_to_struct[c->role - 1]; in context_is_valid() 59 if (!role || !ebitmap_get_bit(&role->cache, c->type - 1)) in context_is_valid() 60 /* role may not be associated with type */ in context_is_valid() 64 * User must be authorized for the role. in context_is_valid() 70 if (!ebitmap_get_bit(&usrdatum->cache, c->role - 1)) in context_is_valid() 71 /* user may not be associated with role */ in context_is_valid() [all …]
|
D | context_record.c | 15 /* Selinux role */ 16 char *role; member 52 /* Role */ in hidden_def() 56 return con->role; in hidden_def() 62 sepol_context_t * con, const char *role) in hidden_def() 65 char *tmp_role = strdup(role); in hidden_def() 68 "context role to %s", role); in hidden_def() 71 free(con->role); in hidden_def() 72 con->role = tmp_role; in hidden_def() 143 con->role = NULL; in hidden_def() [all …]
|
/external/autotest/cli/ |
D | server.py | 13 modify: modify a server's role or status. 16 --role / -r: role that's related to server actions. 50 self.parser.add_option('-r', '--role', 51 help='Name of a role', 54 metavar='ROLE') 56 help=('Set to True to apply actions when role ' 72 role_info = topic_common.item_parse_info(attribute_name='role') 92 self.role = options.role 113 """atest server list [--role <role>]""" 165 @return: A list of servers matched given hostname and role. [all …]
|
/external/guava/guava/src/com/google/common/math/ |
D | MathPreconditions.java | 30 static int checkPositive(@Nullable String role, int x) { in checkPositive() argument 32 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 37 static long checkPositive(@Nullable String role, long x) { in checkPositive() argument 39 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 44 static BigInteger checkPositive(@Nullable String role, BigInteger x) { in checkPositive() argument 46 throw new IllegalArgumentException(role + " (" + x + ") must be > 0"); in checkPositive() 51 static int checkNonNegative(@Nullable String role, int x) { in checkNonNegative() argument 53 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative() 58 static long checkNonNegative(@Nullable String role, long x) { in checkNonNegative() argument 60 throw new IllegalArgumentException(role + " (" + x + ") must be >= 0"); in checkNonNegative() [all …]
|
/external/autotest/server/site_tests/firmware_PDPowerSwap/ |
D | firmware_PDPowerSwap.py | 15 Servo based USB PD power role swap test. 17 Pass critera is all power role swaps are successful if the DUT 28 # Source power role 30 # Sink power role 36 @returns True if Plankton power role is source, false otherwise 43 # Current Plankton power role should be source 50 a pd power role swap request message. This allows the 67 """Perform a power role swap request 69 Initiate a power role swap request on either the DUT or 71 role swap is then verified to have taken place. [all …]
|
/external/icu/icu4j/ |
D | pom.xml | 39 <role>PMC Member</role> 47 <role>PMC Member</role> 55 <role>PMC Member</role> 63 <role>PMC Member</role> 71 <role>PMC Member</role> 79 <role>PMC Member</role> 87 <role>PMC Member</role> 95 <role>PMC Member</role>
|
/external/selinux/policycoreutils/newrole/ |
D | newrole.1 | 3 newrole \- run a shell with a new SELinux role 6 [\fB-r\fR|\fB--role\fR] 7 \fIROLE\fR 21 .B --role 22 option is specified, then the new context will have the role specified by 23 \fIROLE\fR. 31 If a role is specified, but no type is specified, the default type is derived 32 from the specified role. If the 74 Changing role: 97 Running a program in a given role or level:
|
/external/selinux/python/sepolicy/sepolicy/templates/ |
D | executable.py | 55 role system_r types TEMPLATETYPE_t; 89 role TEMPLATETYPE_roles types TEMPLATETYPE_t; 195 role USER_r; 264 ## allow the specified role the TEMPLATETYPE domain. 271 ## <param name="role"> 273 ## The role to be allowed the TEMPLATETYPE domain. 289 ## Role access for TEMPLATETYPE 291 ## <param name="role"> 293 ## Role allowed access 298 ## User domain for the role [all …]
|