/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/ |
cwutil | 37 namespace: The namespace to use, usually "AWS/EC2", "AWS/SQS", etc.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/ |
README.rst | 49 * Amazon Elastic Compute Cloud (EC2) (Python 3) 54 * Amazon EC2 Container Service (Python 3) 99 * Amazon CloudWatch (EC2 Only) (Python 3)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/cloudformation/ |
test_connection.py | 23 "Type" : "AWS::EC2::Instance", 33 "Description" : "InstanceId of the newly created EC2 instance", 588 <Description>EC2 KeyPair</Description> 615 self.assertEqual(param2.description, 'EC2 KeyPair')
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/rds2/ |
layer1.py | 214 authorization. First, EC2 or VPC security groups can be added 216 is running on EC2 or VPC instances. Second, IP ranges are 222 You cannot authorize ingress from an EC2 security group in one 237 :param ec2_security_group_name: Name of the EC2 security group to 243 :param ec2_security_group_id: Id of the EC2 security group to 250 the EC2 security group specified in the EC2SecurityGroupName 476 :param vpc_security_group_ids: A list of EC2 VPC security groups to 478 Default: The default EC2 VPC security group for the DB subnet group's 482 :param availability_zone: The EC2 Availability Zone that the database 752 :param availability_zone: The Amazon EC2 Availability Zone that th [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/opsworks/ |
layer1.py | 259 + If your account supports EC2 Classic, the default value is no VPC. 260 + If your account does not support EC2 Classic, the default value is 282 and EC2 Classic, see `Supported Platforms`_. 306 the default profile for all of the stack's EC2 instances. For more 399 layers. You must create appropriate EC2 security groups and [all...] |
/external/clang/lib/AST/ |
ASTImporter.cpp | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/redshift/ |
layer1.py | 162 cluster is running on the Internet or an EC2 instance, you can 164 Routing (CIDR) IP address range or an EC2 security group. You 172 that clients running on these IP addresses or the EC2 instance 186 :param ec2_security_group_name: The EC2 security group to be added the 439 :param availability_zone: The EC2 Availability Zone (AZ) in which you 441 have several EC2 instances running in a specific Availability Zone, 567 Constraints: The cluster must be provisioned in EC2-VPC and publicly- 569 provisioning clusters in EC2-VPC, go to `Supported Platforms to [all...] |
/external/icu/icu4c/source/data/sprep/ |
rfc3491.txt | 1003 1EC2; 1EC3; MAP [all...] |
rfc3530csci.txt | 1002 1EC2; 1EC3; MAP [all...] |
rfc3722.txt | 1003 1EC2; 1EC3; MAP [all...] |
rfc3920node.txt | 1003 1EC2; 1EC3; MAP [all...] |
rfc4518ci.txt | 970 1EC2; 1EC3; MAP [all...] |
/external/icu/icu4c/source/test/testdata/ |
nfs4_cis_prep.txt | 993 1EC2; 1EC3; MAP [all...] |
nfs4_cs_prep_ci.txt | 993 1EC2; 1EC3; MAP [all...] |
nfs4_mixed_prep_s.txt | 993 1EC2; 1EC3; MAP [all...] |