/pkg/src/modules/actions/ |
H A D | _actions.c | 52 static const char *notident = "hash attribute not identical to positional hash"; 168 PyObject *hash = NULL; local 192 Py_XDECREF(hash);\ 302 if (PyDict_Size(attrs) > 0 || hash != NULL) { 308 hash = PyUnicode_FromStringAndSize( 311 hash = PyString_FromStringAndSize( 314 if (hash == NULL) { 347 strncmp(keystr, "hash", keysize) == 0) { 494 if (strncmp(keystr, "hash [all...] |
H A D | signature.py | 49 __slots__ = ["hash", "hash_alg", "sig_alg", "cert_ident", 59 self.hash = None 76 # If there's a hash, then there's a certificate to deliver 78 if not self.hash: 101 # given hash or compressed hash attribute to a list of the hash 144 # cert, so get the preferred chain hash value from the 162 # Remove any unused hash attributes. 202 # of pkg.chain.<hash al [all...] |
H A D | license.py | 50 __slots__ = ["hash"] 64 self.hash = "NOHASH" 111 "data hash verification failure: expected: " 181 if hasattr(self, "hash"): 182 indices.append(("license", "hash", self.hash, None)) 183 indices.append(("license", "content", self.hash, None)) 185 # we already have an index entry for self.hash 186 if attr == "hash": 188 hash [all...] |
H A D | file.py | 62 __slots__ = ["hash", "replace_required"] 229 # Always verify using the most preferred hash 246 details=_("Action data hash verification " 385 # different size files may have the same content-hash 420 # throw while computing the hash, 426 # content hash that matches 449 "ELF content hash: {0}".format(e)) 453 elferror = _("ELF content hash: " 459 # If we failed to compute the "gelf:" content hash, or 460 # the content hash faile [all...] |
H A D | generic.py | 266 The form is the name, followed by the SHA1 hash, if it exists, 267 (this use of a positional SHA1 hash is deprecated, with 268 pkg.*hash.* attributes being preferred over positional hashes) 273 such a way that the hash field is not populated, or not 275 that at the time that __str__() is called, the hash is properly 282 h = self.hash 288 sattrs.append("hash") 290 # No hash to stash. 307 # hash. 'h' will only be in scope if the block 350 if hasattr(self, "hash") an [all...] |
H A D | __init__.py | 253 The "ahash" parameter is used to set the hash value for the action. 318 action.hash = ahash 343 local_path, used_basedir = set_action_data(action.hash, action,
|
H A D | depend.py | 383 if hasattr(act, "hash") and act.hash != "NOHASH": 384 out += " " + act.hash
|
/pkg/src/modules/flavor/ |
H A D | base.py | 43 def __init__(self, file_path, dirs=None, hash=None): 47 self.hash = hash 52 elif self.hash != "NOHASH": 53 return _("Couldn't find '{hash}' needed for '{path}'" 55 "{dirs}").format(hash=self.hash, 197 return hash(self.key())
|
/pkg/src/modules/ |
H A D | digest.py | 40 # pkg(7) uses cryptographic hash functions for a number of tasks. We define the 41 # default hash function, along with the hash name here. Note that the use of 49 # Other uses are essentially volatile, and the hash used has no persistence 50 # (e.g. saving the hash to a file in a temporary directory, when the hash gets 62 # support for a certain hash algorithm, but still retain the ability to install 63 # actions using that hash. 67 # the first hash value in the list when using the *old* publication model (ie. 71 # using the "least preferred" hash fo [all...] |
H A D | version.py | 106 return hash(tuple(self)) 489 # If a timestamp is present, it's enough to hash on, and is 493 return hash(self.timestr) 495 return hash((self.release, self.branch)) 804 # If a timestamp is present, it's enough to hash on, and is 808 return hash(self.timestr) 810 return hash((self.release, self.branch))
|
H A D | fmri.py | 406 # __hash__ need not generate a unique hash value for all 408 # items which are equal (i.e. a = b) always hash to 413 h = self._hash = hash(self.version) + hash(self.pkg_name)
|
/pkg/src/util/publish/ |
H A D | pkgdiff.py | 312 if (hasattr(old, "hash") and 313 "hash" not in ignoreattrs): 314 if old.hash != new.hash: 315 s.append(" - {0}".format(old.hash)) 316 s.append(" + {0}".format(new.hash)) 323 if hasattr(old, "hash") and "hash" in onlyattrs: 324 if old.hash != new.hash [all...] |
/pkg/src/modules/bundle/ |
H A D | SolarisPackageDirBundle.py | 145 # hash set to the package path. 146 yield act.hash, act 189 if act.hash == "NOHASH" and \ 192 act.hash = data[len(self.filename) + 1:] 206 if act.hash == "NOHASH" and \ 209 act.hash = data[len(self.filename) + 1:]
|
H A D | SolarisPackageDatastreamBundle.py | 173 act.hash = "install/copyright"
|
/pkg/src/modules/client/transport/ |
H A D | exception.py | 213 return hash(self.key()) 271 return hash(self.key()) 310 return hash(self.key()) 349 return hash(self.key()) 354 """Raised when the content's hash/chash doesn't verify, or the 392 return hash(self.key()) 442 return hash(self.key()) 483 return hash(self.key())
|
/pkg/src/ |
H A D | sysrepo.py | 316 pub_info[uri] = [[prefix, cert, key, hash of the uri, proxy], ... ] 422 [[prefix, cert, key, hash of the uri, proxy, uri type], ... ] 439 # map URIs to (pub.prefix, cert, key, hash, proxy, utype) tuples 515 hash = _uri_hash(uri) 521 (prefix, cert, key, hash, proxy_map.get(uri), utype) 671 for (pub, cert_path, key_path, hash, proxy, utype) in \ 701 for (pub, cert, key, hash, proxy, utype) in \ 706 (uri, cert, key, hash, proxy, utype)) 713 for (uri, cert_path, key_path, hash, proxy, utype) in \ 720 [htdocs_path, pub, hash] [all...] |
H A D | publish.py | 66 "pkg.content-hash", 446 path = pkg.actions.set_action_data(a.hash, a, 555 path, bd = pkg.actions.set_action_data(a.hash, a, 695 if "path" in action.attrs and hasattr(action, "hash") \ 696 and action.hash == "NOHASH": 697 action.hash = action.attrs["path"]
|
H A D | pull.py | 323 if a.has_payload and a.hash not in hashes: 324 hashes.add(a.hash) 340 if a.has_payload and a.hash not in hashes: 342 hashes.add(a.hash) 719 if hasattr(act, "hash"): 727 "allowed.".format(act.hash)) 1639 fhash = a.hash 1662 # preferred hash.
|
H A D | sign.py | 218 usage(_("The {0} hash algorithm does not use a key or " 299 a.hash = cert_path 311 # The hash of 'a' is currently a path, we need 312 # to find the hash of that file to allow 316 # Action identity still uses the 'hash' 318 # stay with the sha1 hash.
|
/pkg/src/tests/cli/ |
H A D | t_sysrepo.py | 396 hash = hashlib.sha1(misc.force_bytes("file://" + 398 url = "http://localhost:{port}/{pub}/{hash}/".format( 399 port=self.sysrepo_port, hash=hash, 437 hash = hashlib.sha1(misc.force_bytes( 439 url = "http://localhost:{port}/test1/{hash}/".format( 440 port=self.sysrepo_port, hash=hash) 568 hash = hashlib.sha1(misc.force_bytes(p5p_url.rstrip("/"))).hexdigest() 569 url = "http://localhost:{port}/test1/{hash}/" [all...] |
H A D | t_pkgrecv.py | 371 if not hasattr(a, "hash"): 374 ifile = open(os.path.join(basedir, a.hash), 418 if not hasattr(a, "hash"): 421 old = orepo.file(a.hash) 423 f.get_dir_path(), a.hash) 456 if not hasattr(a, "hash"): 459 old = orepo.file(a.hash) 460 new = nrepo.file(a.hash) 491 if not hasattr(a, "hash"): 494 old = orepo.file(a.hash) [all...] |
H A D | t_pkg_info.py | 832 license {hash} license=foo chash={chash} pkg.csize={csize} \ 834 hash=a.hash, variable in class:TestPkgInfoPerTestRepo
|
/pkg/src/modules/client/ |
H A D | pkgplan.py | 253 # No need to generate hash of on-disk content as verify 254 # short-circuits hash comparison by setting replace_required 419 src.hash == dest.hash:
|
/pkg/src/tests/api/ |
H A D | t_action.py | 235 # Make sure that the hash member of the action object properly 236 # contains the value of the "hash" named attribute. 237 a = action.fromstr("file hash=abc123 path=usr/bin/foo mode=0755 owner=root group=bin") 238 self.assertTrue(a.hash == "abc123") 292 # the payload hash as the named attribute "hash", in which case 293 # the resulting re-stringification emits the payload hash as a 295 s = "file hash=abc123 path=usr/bin/foo mode=0755 owner=root group=bin" 300 self.assertTrue("hash=abc123" not in s2) 304 # ... unless of course the hash ca [all...] |
/pkg/src/modules/publish/ |
H A D | transaction.py | 348 "pkg.content-hash" in 352 "pkg.content-hash" in 387 # If any of the default content hash attributes we need 422 self.add_file(path, basename=action.hash, 431 # Set the hash member for backwards compatibility and 433 action.hash = hashes.pop("hash", None) 436 # Add file content-hash when preferred_hash is SHA2 or higher. 444 action.attrs["pkg.content-hash"] = "{0}:{1}".format( 447 # Now set the hash valu [all...] |