/dports/graphics/ospray/ospray-2.8.0/scripts/scan/ |
H A D | protex.sh | 12 LOG_FILE=$SRC_PATH/ip_protex.log 25 $BDSTOOL new-project --server $SERVER_URL $PROTEX_PROJECT_NAME |& tee $LOG_FILE 26 $BDSTOOL analyze --server $SERVER_URL --path $SRC_PATH |& tee -a $LOG_FILE 28 if ! grep -E "^Files scanned successfully with no discoveries: [0-9]+$" $LOG_FILE; then 33 if grep -E "^Files pending identification: [0-9]+$" $LOG_FILE; then
|
/dports/net-mgmt/bpft/bpft/trafd/ |
H A D | trafd.sh | 60 LOG_FILE=/var/log/trafd.log 74 …n/echo `/bin/date +"%b %e %H:%M:%S"` `/bin/hostname -s` trafd.sh: '('$iface')' started >> $LOG_FILE 85 …ate +"%b %e %H:%M:%S"` `/bin/hostname -s` trafd.sh: '('$iface')' signaling to shutdown >> $LOG_FILE 88 if [ ! -d $LOG_FILE -a -w $LOG_FILE ]; then 89 …:%S"` `/bin/hostname -s` trafd.sh: \(stop\) error: $PID_FILE not found" | /usr/bin/tee -a $LOG_FILE
|
/dports/www/yaws/yaws-2.0.6/testsuite/ |
H A D | run_common_test.in | 7 LOG_FILE=${LOG_DIR}/${LABEL}.log 82 -pa $EBIN_DIR -pa $CUR_DIR -include $INC_DIR > $LOG_FILE 97 TEST_PATH=$(grep "^CWD set to: " ${LOG_FILE} | sed -e 's/^.*"\(.*\)".*$/\1/') 99 echo " see ${LOG_FILE} for details${std}" 113 init_failures=$(grep -c "_SUITE:init_per_suite_failed failed" ${LOG_FILE}) 114 ts_failures=$(grep -c "RESULT: Failed" ${LOG_FILE}) 122 cat ${LOG_FILE}
|
/dports/deskutils/ganttproject/ganttproject-2.8.11-r2393/ |
H A D | ganttproject | 40 LOG_FILE="$GP_LOG_DIR/.ganttproject-"$(date +%Y%m%d%H%M%S)".log" 41 if [ -e "$LOG_FILE" ] && [ ! -w "$LOG_FILE" ]; then 42 echo "Log file $LOG_FILE is not writable" >2 71 JAVA_ARGS="-Xmx1024m -Duser.dir=$GP_HOME $BOOT_CLASS $ECLIPSITO_ARGS -log true -log_file $LOG_FILE"
|
/dports/math/py-yt/yt-4.0.1/doc/ |
H A D | install_script.sh | 124 LOG_FILE="${DEST_DIR}/yt_install.log" 253 echo "EXECUTING:" >> ${LOG_FILE} 254 echo " $*" >> ${LOG_FILE} 255 ( $* 2>&1 ) 1>> ${LOG_FILE} || do_exit 340 echo " ${LOG_FILE}" 369 tail -n 10 ${LOG_FILE} 373 echo "Failure. Check ${LOG_FILE}. The last 10 lines are above." 392 ( ${DEST_DIR}/bin/${PYTHON_EXEC} -c "import yt" 2>&1 ) 1>> ${LOG_FILE} || do_exit 545 ( ${GETFILE} "$EMBREE_URL" 2>&1 ) 1>> ${LOG_FILE} || do_exit 558 ( ${GETFILE} "$PYEMBREE_URL" 2>&1 ) 1>> ${LOG_FILE} || do_exit [all …]
|
/dports/net/kea/kea-2.0.1/src/lib/testutils/ |
H A D | dhcp_test_lib.sh.in | 273 if test -n "${LOG_FILE+x}" && test -s "${LOG_FILE}"; then 275 cat "${LOG_FILE}" 429 printf 'Kea log will be stored in %s.\n' "${LOG_FILE}" 430 export KEA_LOGGER_DESTINATION=${LOG_FILE} 587 if test -n "${LOG_FILE+x}" && test -s "${LOG_FILE}"; then 602 _GET_RECONFIGS=$(grep -Fo CONFIG_COMPLETE "${LOG_FILE}" | wc -w) 666 if test -n "${LOG_FILE+x}" && test -n "${LOG_FILE}"; then 667 rm -rf "${LOG_FILE}" 668 rm -rf "${LOG_FILE}.lock" 1102 if grep -q 'sensitive' "${LOG_FILE}"; then [all …]
|
/dports/devel/cmake-gui/cmake-3.22.1/Tests/RunCMake/ctest_memcheck/ |
H A D | testUndefinedBehaviorSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{UBSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 13 file(REMOVE "${LOG_FILE}.2343") 19 file(APPEND "${LOG_FILE}.2343"
|
H A D | testAddressLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{ASAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
H A D | testLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{LSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
/dports/devel/cmake/cmake-3.22.1/Tests/RunCMake/ctest_memcheck/ |
H A D | testUndefinedBehaviorSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{UBSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 13 file(REMOVE "${LOG_FILE}.2343") 19 file(APPEND "${LOG_FILE}.2343"
|
H A D | testLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{LSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
H A D | testAddressLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{ASAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
/dports/devel/cmake-doc/cmake-3.22.1/Tests/RunCMake/ctest_memcheck/ |
H A D | testUndefinedBehaviorSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{UBSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 13 file(REMOVE "${LOG_FILE}.2343") 19 file(APPEND "${LOG_FILE}.2343"
|
H A D | testAddressLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{ASAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
H A D | testLeakSanitizer.cmake | 5 string(REGEX REPLACE ".*log_path='([^']*)'.*" "\\1" LOG_FILE "$ENV{LSAN_OPTIONS}") 6 message("LOG_FILE=[${LOG_FILE}]") 14 file(REMOVE "${LOG_FILE}.2343") 15 file(REMOVE "${LOG_FILE}.2344") 19 file(APPEND "${LOG_FILE}.2343" 30 file(APPEND "${LOG_FILE}.2342"
|
/dports/security/ossec-hids-local/ossec-hids-3.6.0/active-response/ |
H A D | firewall-drop.sh | 43 LOG_FILE="${PWD}/../logs/active-responses.log" 45 echo "`date` $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 57 … * ) echo "`date` Unable to run active response (invalid IP: '${IP}')." >> ${LOG_FILE} && exit 1;; 104 echo "`date` Killed process ${C_PID} holding lock." >> ${LOG_FILE} 114 echo "`date` Unable kill process ${C_PID} holding lock." >> ${LOG_FILE} 168 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 206 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE}
|
/dports/security/ossec-hids-server/ossec-hids-3.6.0/active-response/ |
H A D | firewall-drop.sh | 43 LOG_FILE="${PWD}/../logs/active-responses.log" 45 echo "`date` $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 57 … * ) echo "`date` Unable to run active response (invalid IP: '${IP}')." >> ${LOG_FILE} && exit 1;; 104 echo "`date` Killed process ${C_PID} holding lock." >> ${LOG_FILE} 114 echo "`date` Unable kill process ${C_PID} holding lock." >> ${LOG_FILE} 168 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 206 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE}
|
/dports/security/ossec-hids-agent/ossec-hids-3.6.0/active-response/ |
H A D | firewall-drop.sh | 43 LOG_FILE="${PWD}/../logs/active-responses.log" 45 echo "`date` $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 57 … * ) echo "`date` Unable to run active response (invalid IP: '${IP}')." >> ${LOG_FILE} && exit 1;; 104 echo "`date` Killed process ${C_PID} holding lock." >> ${LOG_FILE} 114 echo "`date` Unable kill process ${C_PID} holding lock." >> ${LOG_FILE} 168 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE} 206 …echo "`date` Unable to run (iptables returning != $RES): $COUNT - $0 $1 $2 $3 $4 $5" >> ${LOG_FILE}
|
/dports/print/pdflib-perl/PDFlib-Lite-7.0.5p3/bind/pdflib/ruby/ |
H A D | mkrbdso.pl | 26 my $LOG_FILE; 34 $LOG_FILE = cwd() . "/mkruby$rbvers.log"; 39 open(LOG, ">> $LOG_FILE"); 56 open(LOG, ">> $LOG_FILE"); 99 system("mv $LOG_FILE .");
|
/dports/print/pdflib/PDFlib-Lite-7.0.5p3/bind/pdflib/ruby/ |
H A D | mkrbdso.pl | 26 my $LOG_FILE; 34 $LOG_FILE = cwd() . "/mkruby$rbvers.log"; 39 open(LOG, ">> $LOG_FILE"); 56 open(LOG, ">> $LOG_FILE"); 99 system("mv $LOG_FILE .");
|
/dports/biology/artemis/artemis-17.0.1-11-g3e43d27e/test/ |
H A D | CreateEvoSuiteTests.sh | 31 LOG_FILE="/tmp/evosuite-run.log" 49 if [ -e "${LOG_FILE}.${x}" ] 52 cat ${LOG_FILE}.${x} 53 rm ${LOG_FILE}.${x} 87 $CMD 2>&1 > ${LOG_FILE}.${i} &
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/tools/testing/selftests/ftrace/ |
H A D | ftracetest | 198 LOG_FILE= 201 LOG_FILE=$LOG_DIR/ftracetest.log 203 date > $LOG_FILE 233 [ "$LOG_FILE" ] && printf "$*$newline" | strip_esc >> $LOG_FILE 237 [ "$LOG_FILE" ] && cat $1 | strip_esc >> $LOG_FILE 374 if [ ! -z "$LOG_FILE" ] ; then 385 elif [ -z "$LOG_FILE" ]; then 397 [ $KEEP_LOG -eq 0 -a ! -z "$LOG_FILE" ] && rm $testlog
|
/dports/multimedia/libv4l/linux-5.13-rc2/tools/testing/selftests/ftrace/ |
H A D | ftracetest | 198 LOG_FILE= 201 LOG_FILE=$LOG_DIR/ftracetest.log 203 date > $LOG_FILE 233 [ "$LOG_FILE" ] && printf "$*$newline" | strip_esc >> $LOG_FILE 237 [ "$LOG_FILE" ] && cat $1 | strip_esc >> $LOG_FILE 374 if [ ! -z "$LOG_FILE" ] ; then 385 elif [ -z "$LOG_FILE" ]; then 397 [ $KEEP_LOG -eq 0 -a ! -z "$LOG_FILE" ] && rm $testlog
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/tools/testing/selftests/ftrace/ |
H A D | ftracetest | 198 LOG_FILE= 201 LOG_FILE=$LOG_DIR/ftracetest.log 203 date > $LOG_FILE 233 [ "$LOG_FILE" ] && printf "$*$newline" | strip_esc >> $LOG_FILE 237 [ "$LOG_FILE" ] && cat $1 | strip_esc >> $LOG_FILE 374 if [ ! -z "$LOG_FILE" ] ; then 385 elif [ -z "$LOG_FILE" ]; then 397 [ $KEEP_LOG -eq 0 -a ! -z "$LOG_FILE" ] && rm $testlog
|
/dports/multimedia/xvid/xvidcore/examples/ |
H A D | bench.pl | 153 if (open( LOG_FILE, ">$log_file" )) { 154 print LOG_FILE $output; 155 close LOG_FILE; 177 if (open( LOG_FILE, ">$log_file" )) { 178 print LOG_FILE $output; 179 close LOG_FILE;
|