/pkg/src/modules/lint/ |
H A D | opensolaris.py | 66 for key in keys: 67 if key not in manifest: 69 _("Missing attribute '{key}' in " 70 "{pkg}").format(key=key, pkg=manifest.fmri),
|
H A D | base.py | 405 for key in action.attrs.keys(): 406 if key.startswith("pkg.linted") and linted.startswith(key): 407 val = action.attrs.get(key, "false") 413 _("Multiple values for {key} " 414 "in {actions}").format(key=key, 421 for key in manifest.attributes.keys(): 422 if key.startswith("pkg.linted") and linted.startswith(key) [all...] |
H A D | pkglint_action.py | 329 for key in a.differences(targ): 333 if key.startswith("variant") or \ 334 key.startswith("facet") or \ 335 key.startswith("mediator") or \ 336 key.startswith("target") or \ 337 key.startswith("pkg.linted"): 345 differences.add(key) 350 for key in sorted(differences): 352 # this key the fmris that deliver them 361 if key i [all...] |
H A D | pkglint_manifest.py | 129 for key in [ "pkg.description", "pkg.summary" ]: 130 if key in manifest: 131 action = engine.get_attr_action(key, manifest) 135 "{key} attribute").format( 137 key=key), 435 for key in seen_deps: 436 actions = seen_deps[key] 442 duplicates.append(key) 470 for key i [all...] |
H A D | config.py | 51 defaults = OrderedDict(sorted(defaults.items(), key=lambda t: t[0])) 93 # sanity check our config by looking for a known key
|
H A D | log.py | 203 key = "{0} {1}".format(LEVELS[msg.level], msg.msgid) 227 key = ("{0} pkglint001.5".format( 234 key.ljust(34), linted_msg)) 237 self.logger.warning("{0}{1}".format(key.ljust(34),
|
/pkg/src/modules/client/ |
H A D | debugvalues.py | 53 def get_value(self, key): 54 return self[key] 56 def set_value(self, key, value): 57 self[key] = value
|
H A D | firmware.py | 70 if portable.osname != "sunos" and key not in self._cache: 71 self._cache[key] = (True, None) 147 key = str(args) 148 self._cache[key] = ans 149 return self._cache[key] 198 key = str(args) 199 self._cache[key] = ans 200 return self._cache[key]
|
/pkg/src/modules/client/transport/ |
H A D | exception.py | 198 def key(self): member in class:TransportProtoError 205 return self.key() == other.key() 210 return self.key() < other.key() 213 return hash(self.key()) 257 def key(self): member in class:TransportFrameworkError 263 return self.key() == other.key() 268 return self.key() < othe 296 def key(self): member in class:TransportStallError 335 def key(self): member in class:TransferContentException 378 def key(self): member in class:InvalidContentException 427 def key(self): member in class:PkgProtoError 469 def key(self): member in class:ExcessiveTransientFailure [all...] |
H A D | stats.py | 47 # uses TransportRepoURI.key() values as its key. 50 def __getitem__(self, key): 51 return self.__rsobj[key] 53 def __contains__(self, key): 54 return key in self.__rsobj 104 key = ruri.key() 105 if key in self.__rsobj: 106 rs = self.__rsobj[key] [all...] |
/pkg/src/util/qual-simulator/ |
H A D | depot.py | 136 def key(self): member in class:RepositoryURI 142 The key is a (uri, proxy) tuple, where the proxy is 184 if not rc[self.key()].used: 185 rc[self.key()].record_connection(self.cspeed) 190 rc[self.key()].record_connection(self.cspeed) 192 rc[self.key()].record_tx() 197 rc[self.key()].record_error(decayable=True) 199 rc[self.key()].record_error(content=True) 201 rc[self.key()].record_error() 213 rc[self.key()] [all...] |
/pkg/src/modules/flavor/ |
H A D | script.py | 109 for key in py_attrs: 110 if key in pkg_attrs: 111 pkg_attrs[key].extend(py_attrs[key]) 113 pkg_attrs[key] = py_attrs[key]
|
H A D | base.py | 184 def key(self): member in class:Dependency 191 return self.key() == other.key() 194 return self.key() < other.key() 197 return hash(self.key())
|
/pkg/src/modules/actions/ |
H A D | _actions.c | 56 add_to_attrs(PyObject *attrs, PyObject *key, PyObject *attr, bool concat) argument 60 PyObject *av = PyDict_GetItem(attrs, key); 63 return (PyDict_SetItem(attrs, key, attr)); 104 ret = PyDict_SetItem(attrs, key, av); 117 ret = PyDict_SetItem(attrs, key, list); 170 PyObject *key = NULL; local 173 KEY, /* key */ 189 Py_XDECREF(key);\ 303 malformed("whitespace in key"); 329 key [all...] |
/pkg/src/modules/ |
H A D | digest.py | 177 for key in HASH_ALGS: 178 CHASH_ALGS[key.replace("hash", "chash")] = HASH_ALGS[key] 182 for key in HASH_ALGS: 183 CHAIN_ALGS[key.replace("hash", "chain")] = HASH_ALGS[key] 187 for key in HASH_ALGS: 188 CHAIN_CHASH_ALGS[key.replace("hash", "chain.chashes")] = HASH_ALGS[key]
|
H A D | manifest.py | 60 (key, [ 64 for (key, pats) in six.iteritems(fn_pats) 222 """handle key values that may be lists""" 229 # action key attribute, key attribute and mediator, or 230 # id if there is no key attribute. 268 removed.sort(key=remsort, reverse=True) 269 added.sort(key=addsort) 270 changed.sort(key=addsort) 295 # manifest, indexed by unique key an [all...] |
H A D | sysvpkg.py | 250 (key, val) = line.split('=', 1) 251 pkginfo[key] = val.strip('"') 288 for key in sorted(pkg.pkginfo): 289 print(key + '=' + str(pkg.pkginfo[key]))
|
H A D | _varcet.c | 97 PyObject *key = PyList_GET_ITEM(keylist, idx); local 98 PyObject *re = PyDict_GetItem(res, key); 103 facets, key);
|
H A D | query_parser.py | 104 # type, the action key, and the token that followed the last 139 key = fields[-2] 147 t.value = (pkg_name, action_type, key, token) 266 pkg_name, at, key, token = p[1] 267 fields = pkg_name, at, key 279 (pkg_name, at, key), 525 """Method which produces the sort key for an action.""" 598 key = None 600 key = Query.return_action_to_key 601 return sorted(res, key 801 def key(self): member in class:PhraseQuery [all...] |
/pkg/src/modules/bundle/ |
H A D | SolarisPackageDirBundle.py | 269 for key in pkginfo: 270 if not pkginfo[key]: 273 name = key.lower() 274 if name in ignored_keys or "SUNW_" in key: 279 value=pkginfo[key])) 282 for key in pkginfo: 283 name = key.lower() 286 legacy_attrs[name] = pkginfo[key]
|
/pkg/src/svc/ |
H A D | svc-pkg-mirror | 355 key=${ssl_keys[$i]} 361 pkgrecv_from_origin "$repo" "$origin" "$key" \ 399 # pkgrecv_from_origin <repo> <origin> <key path> <cert path> <FMRI> 406 typeset key=$(echo $3 | reduce_null_str) 426 if [ -n "$key" ] && [ -n "$cert" ]; then 427 key="--key $key" 434 $key $cert --clone" 437 -d "$repo" -m all-timestamps $key [all...] |
/pkg/src/tests/cli/ |
H A D | t_https.py | 90 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format( 93 key=os.path.join(self.keys_dir, self.get_cli_key("test")), 99 self.pkg("set-publisher -k {key} -c {cert} -p {url}".format( 102 key=os.path.join(self.keys_dir, self.get_cli_key("test")), 108 # are still possible. (The paths to key and cert should be 118 # Listing the test publisher causes its cert and key to be 133 "-k {key} -c {cert} -p {url}".format( 136 key=os.path.join(self.keys_dir, self.get_cli_key("test")), 148 "-k {key} -c {cert} -p {url}".format( 151 key [all...] |
H A D | t_pkgsign.py | 297 sign_args = "-k {key} -c {cert} -i {ch1} {name}".format( 299 key=os.path.join(self.keys_dir, 481 sign_args = "-k {key} -c {cert} {name}".format( 483 key=os.path.join(self.keys_dir, 508 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 510 "key": os.path.join(self.keys_dir, "cs1_ch5_ta1_key.pem"), 547 sign_args = "-k {key} -c {cert} {pkg}".format(**{ 548 "key": os.path.join(self.keys_dir, "cs1_ta2_key.pem"), 567 sign_args = "-k {key} -c {cert} -i {i1} -i {i2} " \ 569 "key" [all...] |
/pkg/src/util/log-scripts/ |
H A D | an_catalog.py | 82 for i, n in (sorted(catalog_by_raw_agent.items(), key=lambda k_v: (k_v[1],k_v[0]))): 88 for i, n in (sorted(catalog_by_pkg_version.items(), key=lambda k_v: (k_v[1],k_v[0]))): 99 for i, n in (sorted(catalog_by_lang.items(), key=lambda k_v: (k_v[1],k_v[0]))):
|
/pkg/src/util/apache2/depot/ |
H A D | depot_index.py | 305 for key in request.wsgi_environ: 306 if key.startswith("PKG5_REPOSITORY"): 307 prefix = key.replace("PKG5_REPOSITORY_", 310 request.wsgi_environ[key] 315 (request.wsgi_environ[key], 705 for key in ('Cache-Control', 'Pragma'): 706 if key in response.headers: 707 del response.headers[key]
|