/pkg/src/modules/actions/ |
H A D | hardlink.py | 101 def verify(self, img, **args): member in class:HardLinkAction
|
H A D | group.py | 151 def verify(self, img, **args): member in class:GroupAction
|
H A D | directory.py | 210 def verify(self, img, **args): member in class:DirectoryAction
|
H A D | legacy.py | 137 def verify(self, img, **args): member in class:LegacyAction
|
H A D | link.py | 77 def verify(self, img, **args): member in class:LinkAction
|
H A D | user.py | 221 def verify(self, img, **args): member in class:UserAction
|
H A D | driver.py | 73 # compare, verify, etc. 821 def verify(self, img, **args): member in class:DriverAction
|
H A D | license.py | 131 def verify(self, img, pfmri, **args): member in class:LicenseAction
|
H A D | depend.py | 194 def verify(self, image, pfmri, **args): member in class:DependencyAction 333 # cannot verify origin since it applys to upgrade
|
H A D | file.py | 229 # Always verify using the most preferred hash 342 def verify(self, img, **args): member in class:FileAction 408 # on the canonical path, foiling the standard verify 460 # the content hash failed to verify, try the "file:"
|
H A D | generic.py | 778 def verify(self, img, **args): member in class:Action 941 """Common verify logic for filesystem objects."""
|
/pkg/src/modules/ |
H A D | catalog.py | 2299 # Next, verify that all of the updated parts have a 3428 # First, verify that all of the catalog parts the client has 3867 def verify(filename): function
|
/pkg/src/modules/client/ |
H A D | client_api.py | 1363 """Determine verify exit status.""" 1409 # do this because we want to be able to verify that we 1415 # for pkg verify or fix. 2564 "pkg repository.\nPlease verify the repository's " 3071 "incorrect pkg client configuration. Please verify the " 3278 def verify(self, pargs_json=None, opts_json=None): member in class:ClientInterface 3279 """Invoke pkg verify subcommand.""" 3281 return self._cmd_invoke("verify", pargs_json=pargs_json, 3315 "verify" : [_verify, __pkg_verify_output_schema]
|
H A D | image.py | 1653 # First, verify that the publisher has a 1741 def verify(self, fmri, progresstracker, verifypaths=None, member in class:Image 1750 'fmri' is the fmri of the package to verify. 1754 'verifypaths' is the set of paths to verify. 1756 'overlaypaths' is the set of overlaying path to verify. 1824 # pkg verify only looks at actions that have not been dehydrated. 1851 errors, warnings, info = act.verify( 1858 errors, warnings, info = act.verify( 4103 """Create an image plan to fix the image. Note: verify shares
|
/pkg/src/modules/server/ |
H A D | repository.py | 1935 "Unknown repository verify error code: {0}".format( 2163 """A generator that produces verify errors, each a tuple 2270 # verify manifest signatures 2276 # verify payload delivered by this pkg 2313 def verify(self, pub=None, progtrack=None, member in class:_RepoStore 2351 tmp_metaroot = tempfile.mkdtemp(prefix="pkgrepo-verify.") 2396 were found to be faulty, according to self.verify(..). 2424 for error, path, message, reason in self.verify(pub=pub, 3649 def verify(self, pubs=[], allowed_checks=[], member in class:Repository 3692 for verify_tuple in rstore.verify(progtrac [all...] |
/pkg/src/ |
H A D | client.py | 210 "verify", 261 adv_usage["verify"] = _("[-Hqv] [-p path]... [--parsable version]\n" 459 Package Maintenance : verify fix revert 1823 """Determine the exit code of pkg verify, which should be based on 1858 # do this because we want to be able to verify that we 1864 # for pkg verify 2255 def verify(op, api_inst, pargs, omit_headers, parsable_version, quiet, verbose, function 2269 # Since the verify output has been handled by display_plan_cb, only 3695 "\nPlease verify the repository's location and the " 4232 """If we're a child image, verify tha [all...] |