/external/autotest/scheduler/ |
rdb_hosts.py | 143 self.hostname) 202 self.hostname, self.status, payload, self.dbg_str) 208 '%s through rdb on behalf of %s: %s', self.hostname, 223 'hostname': self.hostname,
|
prejob_task.py | 193 logging.info("starting verify on %s", self.host.hostname) 231 logging.info("starting cleanup task for host: %s", self.host.hostname) 286 self.host.hostname) 343 return autoserv_utils._autoserv_command_line(self.host.hostname, 351 logging.info("starting provision task for host: %s", self.host.hostname)
|
host_scheduler_unittests.py | 91 host = self.db_helper.get_host(hostname='h1')[0] 111 host = self.db_helper.get_host(hostname='h1')[0] 134 host = self.db_helper.get_host(hostname='h1')[0] 141 self.assertTrue(self.db_helper.get_host(hostname='h1')[0].leased == 0) 189 self.assertTrue(self.db_helper.get_host(hostname='h')[0].leased == 1 and 190 self.db_helper.get_host(hostname='h1')[0].leased == 1) 272 host = self.db_helper.get_host(hostname='h1')[0]
|
scheduler_models.py | 63 # can just set the hostname in a single place in the config file. 65 'SERVER', 'hostname') 67 logging.critical('[SERVER] hostname missing from the config file.') 389 _fields = ('id', 'hostname', 'locked', 'synch_id', 'status', 397 logging.info('%s -> %s', self.hostname, status) 430 A comparison function for sorting Host objects by hostname. 441 This hopefully satisfy most people's hostname sorting needs regardless 445 lower_a = a.hostname.lower() 446 lower_b = b.hostname.lower() 530 logging.info('Assigning host %s to entry %s', host.hostname, self [all...] |
rdb_testing_utils.py | 46 def __init__(self, hostname, host_id, **kwargs): 47 kwargs.update({'hostname': hostname, 'id': host_id}) 139 """Create a shard with the given hostname if one doesn't already exist. 141 @param shard_hostname: The hostname of the shard. 143 shard = cls.get_shard(hostname=shard_hostname) 144 return (models.Shard.objects.create(hostname=shard_hostname) 176 @param shard_hostname: The hostname of a shard to assign the job. 210 @param name: The hostname. 226 hostname=name, status=status, locked=locked [all...] |
/external/autotest/server/cros/chaos_lib/ |
chaos_runner.py | 22 # Webdriver master hostname 57 @param capturer_hostname: a string or None, hostname or IP of capturer. 60 @param work_client_hostname: a string or None, hostname of work client 71 lock_manager, hostname=capturer_hostname) 99 lock_manager, hostname=work_client_hostname) 126 hosts.create_host(self._host.hostname),
|
/external/autotest/server/cros/ |
sonic_client_utils.py | 147 @return: A string specifying the hostname of a locked sonic host. 175 def __init__(self, hostname): 177 @param hostname: The name of the host for this sonic proxy. 179 self._sonic_server = 'http://%s:%s' % (hostname, self.SONIC_SERVER_PORT) 180 self._hostname = hostname
|
telemetry_runner.py | 278 self._host.hostname) 280 self._host.hostname) 343 '--remote=%s' % self._host.hostname])
|
/external/autotest/server/ |
lab_status_unittest.py | 309 'SERVER', 'hostname').AndReturn('not-cautotest') 315 'SERVER', 'hostname').AndReturn('cautotest') 329 'SERVER', 'hostname').AndReturn('cautotest')
|
/external/autotest/server/site_tests/buffet_PrivetSetupFlow/ |
buffet_PrivetSetupFlow.py | 49 client_hostname=host.hostname, 129 hostname=privet_record.address, 185 host=host, hostname=managed_netblock.addr,
|
/external/autotest/server/site_tests/firmware_FWupdate/ |
firmware_FWupdate.py | 114 def repack_shellball(self, hostname): 117 @param hostname: hostname of DUT. 126 dut_access = remote_access.RemoteDevice(hostname, username='root') 172 self.repack_shellball(host.hostname)
|
/external/autotest/site_utils/deployment/ |
commandline.py | 199 def _validate_hostname(hostname): 200 """Return whether a given hostname is valid for the test lab. 210 @param hostname The host name to be checked. 211 @return Return a true value iff the hostname is valid. 214 if p.match(hostname): 217 'Hostname %s doesn\'t match a valid location name.\n' % 218 hostname) 343 sys.stderr.write('Must provide at least one hostname.\n') 405 parser.add_argument('hostnames', nargs='*', metavar='HOSTNAME',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/manage/ |
cmdshell.py | 76 self._ssh_client.connect(self.server.hostname, 90 print("%s has an entry in ~/.ssh/known_hosts and it doesn't match" % self.server.hostname) 362 self.hostname = instance.dns_name
|
/external/okhttp/website/static/ |
jquery.smooth-scroll.min.js | 7 (function(l){function t(l){return l.replace(/(:|\.)/g,"\\$1")}var e="1.4.10",o={exclude:[],excludeWithin:[],offset:0,direction:"top",scrollElement:null,scrollTarget:null,beforeScroll:function(){},afterScroll:function(){},easing:"swing",speed:400,autoCoefficent:2},r=function(t){var e=[],o=!1,r=t.dir&&"left"==t.dir?"scrollLeft":"scrollTop";return this.each(function(){if(this!=document&&this!=window){var t=l(this);t[r]()>0?e.push(this):(t[r](1),o=t[r]()>0,o&&e.push(this),t[r](0))}}),e.length||this.each(function(){"BODY"===this.nodeName&&(e=[this])}),"first"===t.el&&e.length>1&&(e=[e[0]]),e};l.fn.extend({scrollable:function(l){var t=r.call(this,{dir:l});return this.pushStack(t)},firstScrollable:function(l){var t=r.call(this,{el:"first",dir:l});return this.pushStack(t)},smoothScroll:function(e){e=e||{};var o=l.extend({},l.fn.smoothScroll.defaults,e),r=l.smoothScroll.filterPath(location.pathname);return this.unbind("click.smoothscroll").bind("click.smoothscroll",function(e){var n=this,s=l(this),c=o.exclude,i=o.excludeWithin,a=0,f=0,h=!0,u={},d=location.hostname===n.hostname||!n.hostname,m=o.scrollTarget||(l.smoothScroll.filterPath(n.pathname)||r)===r,p=t(n.hash);if(o.scrollTarget||d& (…)
|
/packages/apps/Email/provider_src/com/android/email/mail/transport/ |
MailTransport.java | 121 // After the socket connects to an SSL server, confirm that the hostname is as expected 159 * NOTE: No explicit hostname verification is required here, because it's handled automatically 198 * Verify the hostname of the certificate used by the other end of a 199 * connected socket. You MUST call this if you did not supply a hostname 201 * redundantly if the hostname has already been verified. 203 * <p>Wildcard certificates are allowed to verify any matching hostname, 208 * @param hostname The expected hostname of the remote server 212 private static void verifyHostname(Socket socket, String hostname) throws IOException { 226 if (!HOSTNAME_VERIFIER.verify(hostname, session)) [all...] |
/external/autotest/frontend/client/src/autotest/tko/ |
ExistingGraphsFrontend.java | 40 private TextBox hostname = new TextBox(); field in class:ExistingGraphsFrontend 41 private SuggestBox hostnameSuggest = new SuggestBox(oracle, hostname); 68 addBenchmarkItem("(Please select a hostname first)"); 85 addControl("Hostname:", hostnameSuggest); 127 args.put("hostname", hostname.getText()); 145 hostname.setText(args.get("hostname")); 203 hostname.setEnabled(enabled);
|
/external/autotest/frontend/tko/ |
rpc_interface.py | 288 'test_name', 'hostname', 'machine_idx').distinct() 290 hostname = result_dict['hostname'] 293 host_info.setdefault(hostname, {}) 294 host_info[hostname].setdefault('tests', []) 295 host_info[hostname]['tests'].append(test) 296 host_info[hostname]['id'] = machine_idx 482 ['Hostname', 'hostname'],
|
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLSocketImpl.java | 138 * The peer's DNS hostname if it was supplied during creation. Note that 190 protected OpenSSLSocketImpl(String hostname, int port, SSLParametersImpl sslParameters) 192 super(hostname, port); 194 this.peerHostname = hostname; 211 protected OpenSSLSocketImpl(String hostname, int port, 214 super(hostname, port, clientAddress, clientPort); 216 this.peerHostname = hostname; 237 protected OpenSSLSocketImpl(Socket socket, String hostname, int port, 240 this.peerHostname = hostname; 256 * Try to extract the peer's hostname if it's available from the endpoint address [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustManagerImpl.java | 237 * For backward compatibility with older Android API that used String for the hostname only. 240 String hostname) throws CertificateException { 241 return checkTrusted(chain, authType, hostname, true); 283 * For backward compatibility with older Android API that used String for the hostname only. 286 String hostname) throws CertificateException { 287 return checkTrusted(chain, authType, hostname, false); 364 final String hostname = (session != null) ? session.getPeerHost() : null; local 370 if (!verifier.verify(hostname, session)) { 375 return checkTrusted(certs, authType, hostname, clientAuth); [all...] |
/external/autotest/frontend/afe/ |
rpc_utils.py | 323 failing_hosts = (set(host.hostname for host in host_objects) - 324 set(host.hostname for host in ok_hosts)) 407 possible_hosts.update(h.hostname for h in label.host_set.all()) 411 hosts_in_label = (h.hostname for h in label.host_set.all()) 419 host_set = set(host.hostname for host in host_objects) 430 hosts_in_meta_host = (h.hostname for h in meta_host.host_set.all()) 473 (host.hostname, host.locked_by, host.lock_time)}) 476 'locked': 'Host %s already unlocked.' % host.hostname}) 480 host.hostname}) 560 duplicate_hostnames.add(host.hostname) [all...] |
/bionic/tests/ |
unistd_test.cpp | 498 char hostname[HOST_NAME_MAX + 1]; local 499 memset(hostname, 0, sizeof(hostname)); 501 // Can we get the hostname with a big buffer? 502 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX)); 504 // Can we get the hostname with a right-sized buffer? 506 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1)); 511 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN)); 512 ASSERT_GT(strlen(hostname), 0U) [all...] |
/external/autotest/server/cros/dynamic_suite/ |
job_status_unittest.py | 53 'host': {'hostname': h}} for h in expected_hosts] 67 'host': {'hostname': h}} for h in expected_hosts] 82 'host': {'hostname': h}} for h in expected_hosts] 192 manager.lock([h.hostname for h in running_hosts]) 568 jobs = [FakeJob(0, [FakeStatus('FAIL', 'T0', '', hostname='h0'), 569 FakeStatus('FAIL', 'T1', 'bad', hostname='h0')]), 571 FakeStatus('GOOD', 'T1', '', hostname='h1')]), 572 FakeJob(2, [FakeStatus('TEST_NA', 'T0', 'no', hostname='h2')]), 573 FakeJob(3, [FakeStatus('FAIL', 'T0', 'broken', hostname='h3')]), 575 FakeJob(5, [FakeStatus('GOOD', 'T0', 'Yay', hostname='h5')]) [all...] |
/external/libxml2/ |
nanoftp.c | 124 char *hostname; /* the host name */ member in struct:xmlNanoFTPCtxt 184 * and get the hostname 312 if (ctxt->hostname != NULL) { 313 xmlFree(ctxt->hostname); 314 ctxt->hostname = NULL; 332 ctxt->hostname = xmlMemStrdup(uri->server); 362 * protocol, hostname, port or other information, the 380 if (ctxt->hostname == NULL) 392 (strcmp(ctxt->hostname, uri->server)) || 511 if (ctxt->hostname != NULL) xmlFree(ctxt->hostname) [all...] |
/external/autotest/site_utils/ |
server_manager_unittest.py | 63 attrs={'hostname': 'primary_drone_hostname', 69 attrs={'hostname': 'backup_drone_hostname', 75 attrs={'hostname': 'primary_scheduler_hostname', 81 attrs={'hostname': 'backup_scheduler_hostname', 107 ping_runner.PingRunner().simple_ping(self.BACKUP_DRONE.hostname 110 hostname=self.BACKUP_DRONE.hostname 113 hostname=mox.IgnoreArg(), status=mox.IgnoreArg(), 120 drone = server_manager.create(hostname=self.BACKUP_DRONE.hostname, [all...] |
/external/autotest/server/cros/network/ |
chaos_clique_utils.py | 21 def allocate_packet_capturer(lock_manager, hostname): 28 @param hostname string optional hostname of a packet capture machine. 32 if hostname is not None: 33 return hosts.SSHHost(hostname) 49 @return string hostname of locked webdriver instance
|