/pkg/src/modules/actions/ |
H A D | hardlink.py | 101 def verify(self, img, **args): member in class:HardLinkAction
|
H A D | legacy.py | 137 def verify(self, img, **args): member in class:LegacyAction
|
H A D | link.py | 77 def verify(self, img, **args): member in class:LinkAction
|
H A D | group.py | 151 def verify(self, img, **args): member in class:GroupAction
|
H A D | directory.py | 210 def verify(self, img, **args): member in class:DirectoryAction
|
H A D | license.py | 131 def verify(self, img, pfmri, **args): member in class:LicenseAction
|
H A D | user.py | 221 def verify(self, img, **args): member in class:UserAction
|
H A D | depend.py | 194 def verify(self, image, pfmri, **args): member in class:DependencyAction 333 # cannot verify origin since it applys to upgrade
|
H A D | file.py | 229 # Always verify using the most preferred hash 342 def verify(self, img, **args): member in class:FileAction 408 # on the canonical path, foiling the standard verify 460 # the content hash failed to verify, try the "file:"
|
H A D | signature.py | 403 """Try to verify this signature. It can return True or 404 None. None means we didn't know how to verify this signature. 405 If we do know how to verify the signature but it doesn't verify, 409 to verify the signature. 479 verifier.verify()
|
H A D | driver.py | 73 # compare, verify, etc. 821 def verify(self, img, **args): member in class:DriverAction
|
H A D | generic.py | 778 def verify(self, img, **args): member in class:Action 941 """Common verify logic for filesystem objects."""
|
/pkg/src/modules/client/transport/ |
H A D | transport.py | 773 """A wrapper for catalog.verify() that catches 781 catalog.verify(filepath) 1659 method returns true. If the manifest fails to verify, 2624 def _action_cached(self, action, pub, in_hash=None, verify=None): 2633 The verify parameter specifies whether the payload of the action 2649 if verify is None: 2658 verify = not cache.readonly 2661 if verify: 2666 # hash of the action, verify will have already 2703 verify [all...] |
/pkg/src/modules/server/ |
H A D | repository.py | 1935 "Unknown repository verify error code: {0}".format( 2163 """A generator that produces verify errors, each a tuple 2270 # verify manifest signatures 2276 # verify payload delivered by this pkg 2313 def verify(self, pub=None, progtrack=None, member in class:_RepoStore 2351 tmp_metaroot = tempfile.mkdtemp(prefix="pkgrepo-verify.") 2396 were found to be faulty, according to self.verify(..). 2424 for error, path, message, reason in self.verify(pub=pub, 3649 def verify(self, pubs=[], allowed_checks=[], member in class:Repository 3692 for verify_tuple in rstore.verify(progtrac [all...] |
/pkg/src/tests/api/ |
H A D | t_linked_image.py | 482 for act, err, warn, pinfo in apio.img.verify(pfmri, progtrack, 1223 # verify that our image is out of sync 1228 # verify that we can install an unsynced package 1231 # verify that we can update an unsynced package 1234 # verify that we can downgrade an unsynced package 1237 # verify that we can bring a package into sync via downgrade 1241 # verify that we can bring a package into sync via upgrade 1245 # verify that we can uninstall an out of sync package 1248 # verify that we can install an in sync package. 1251 # verify tha [all...] |
H A D | t_pkg_api_install.py | 269 # administrative change for a misbehaving program and verify we 300 self.pkg("verify") 304 self.pkg("verify") 317 self.pkg("verify") 331 # check that verify finds changes 334 self.pkg("verify", exit=1) 339 self.pkg("verify") 341 self.pkg("verify") 360 self.pkg("verify") 366 self.pkg("verify") [all...] |
/pkg/src/modules/client/ |
H A D | image.py | 1653 # First, verify that the publisher has a 1741 def verify(self, fmri, progresstracker, verifypaths=None, member in class:Image 1750 'fmri' is the fmri of the package to verify. 1754 'verifypaths' is the set of paths to verify. 1756 'overlaypaths' is the set of overlaying path to verify. 1824 # pkg verify only looks at actions that have not been dehydrated. 1851 errors, warnings, info = act.verify( 1858 errors, warnings, info = act.verify( 4103 """Create an image plan to fix the image. Note: verify shares
|
H A D | publisher.py | 361 # Decompose URI to verify attributes. 2594 verifier.verify()
|
H A D | imageplan.py | 1482 act.verify(self.image, forever=True) 1616 verify result.""" 1626 errors.add(_("verify or fix overlaying package: " 1659 prefix="pkg-verify" + "-") 1738 # verify purpose, ignore it. 1778 # Since every entry returned by verify might not be 1787 for act, errors, warnings, pinfo in self.image.verify( 1887 # No FMRIs specified, verify all packages 1906 # Clean up the BE used for verify. 1954 # Repair anything we failed to verify [all...] |
H A D | client_api.py | 1363 """Determine verify exit status.""" 1409 # do this because we want to be able to verify that we 1415 # for pkg verify or fix. 2564 "pkg repository.\nPlease verify the repository's " 3071 "incorrect pkg client configuration. Please verify the " 3278 def verify(self, pargs_json=None, opts_json=None): member in class:ClientInterface 3279 """Invoke pkg verify subcommand.""" 3281 return self._cmd_invoke("verify", pargs_json=pargs_json, 3315 "verify" : [_verify, __pkg_verify_output_schema]
|
/pkg/src/ |
H A D | pkgrepo.py | 181 pkgrepo verify [-d] [-p publisher ...] [-i ignored_dep_file ...] 1536 fix when in verbose mode, and verify""" 1544 # sr.Repository.verify(..) 1648 subcommand = "verify" 1725 for verify_tuple in repo.verify(pubs=found_pubs, 1782 """A method passed to sr.Repository.fix(..) to emit verify
|
H A D | client.py | 210 "verify", 261 adv_usage["verify"] = _("[-Hqv] [-p path]... [--parsable version]\n" 459 Package Maintenance : verify fix revert 1823 """Determine the exit code of pkg verify, which should be based on 1858 # do this because we want to be able to verify that we 1864 # for pkg verify 2255 def verify(op, api_inst, pargs, omit_headers, parsable_version, quiet, verbose, function 2269 # Since the verify output has been handled by display_plan_cb, only 3695 "\nPlease verify the repository's location and the " 4232 """If we're a child image, verify tha [all...] |
/pkg/src/modules/ |
H A D | catalog.py | 2299 # Next, verify that all of the updated parts have a 3428 # First, verify that all of the catalog parts the client has 3867 def verify(filename): function
|