/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/rackspace/ |
H A D | rax_scaling_policy.py | 130 def rax_asp(module, at=None, change=0, cron=None, cooldown=300, argument 145 sg = au.find(name=scaling_group) 155 policies = filter(lambda p: name == p.name, sg.list_policies()) 168 cooldown=cooldown, change=change, 185 if hasattr(policy, 'change') and change != policy.change: 214 policies = filter(lambda p: name == p.name, sg.list_policies()) 238 name=dict(required=True), 258 change = module.params.get('change') 263 name = module.params.get('name') 274 rax_asp(module, at=at, change=change, cron=cron, cooldown=cooldown, [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/cloud/rackspace/ |
H A D | rax_scaling_policy.py | 136 def rax_asp(module, at=None, change=0, cron=None, cooldown=300, argument 151 sg = au.find(name=scaling_group) 161 policies = filter(lambda p: name == p.name, sg.list_policies()) 174 cooldown=cooldown, change=change, 191 if hasattr(policy, 'change') and change != policy.change: 220 policies = filter(lambda p: name == p.name, sg.list_policies()) 244 name=dict(required=True), 264 change = module.params.get('change') 269 name = module.params.get('name') 280 rax_asp(module, at=at, change=change, cron=cron, cooldown=cooldown, [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/ |
H A D | rax_scaling_policy.py | 136 def rax_asp(module, at=None, change=0, cron=None, cooldown=300, argument 151 sg = au.find(name=scaling_group) 161 policies = filter(lambda p: name == p.name, sg.list_policies()) 174 cooldown=cooldown, change=change, 191 if hasattr(policy, 'change') and change != policy.change: 220 policies = filter(lambda p: name == p.name, sg.list_policies()) 244 name=dict(required=True), 264 change = module.params.get('change') 269 name = module.params.get('name') 280 rax_asp(module, at=at, change=change, cron=cron, cooldown=cooldown, [all …]
|
H A D | keycloak_user_federation.py | 756 name=dict(type='str'), 768 name=dict(type='str'), 798 name = module.params.get('name') 818 …s(urlencode(dict(type='org.keycloak.storage.UserStorageProvider', parent=realm, name=name)), realm) 820 …module.fail_json(msg='No ID given and found multiple user federations with name `{name}`. Cannot c… 849 for change in module.params['mappers']: 850 change = dict((k, v) for k, v in change.items() if change[k] is not None) 851 if change.get('id') is None and change.get('name') is None: 860 found = kc.get_components(urlencode(dict(parent=cid, name=change['name'])), realm) 862 …module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=cha… [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/aws/plugins/modules/ |
H A D | wafv2_web_acl.py | 209 self.name = name 217 Name=self.name, 237 Name=self.name, 280 'Name': self.name, 327 name = module.params.get("name") 350 metric_name = name 352 web_acl = WebACL(module.client('wafv2'), name, scope, module.fail_json_aws) 353 change = False 376 change = True 403 change = True [all …]
|
H A D | wafv2_rule_group.py | 219 self.name = name 226 'Name': self.name, 294 'Name': self.name, 344 name = module.params.get("name") 362 metric_name = name 364 rule_group = RuleGroup(module.client('wafv2'), name, scope, module.fail_json_aws) 366 change = False 372 change = change or rule_group.get().get('RuleGroup').get('Description') != description 386 change = True 412 change = True [all …]
|
H A D | wafv2_ip_set.py | 134 self.name = name 150 Name=self.name, 161 'Name': self.name, 183 'Name': self.name, 290 name = module.params.get("name") 301 change = False 304 ip_set = IpSet(wafv2, name, scope, module.fail_json_aws) 324 change = True 331 if change and not check_mode: 339 change = True [all …]
|
H A D | wafv2_resources.py | 75 def get_web_acl(wafv2, name, scope, id, fail_json_aws): argument 78 Name=name, 122 name=dict(type='str'), 127 module = AnsibleAWSModule( 134 name = module.params.get("name") 147 change = False 150 if item.get('Name') == name: 154 existing_acl = get_web_acl(wafv2, name, scope, id, module.fail_json_aws) 162 change = True 169 change = True [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/eval/ |
H A D | reflect-name.rkt | 8 (provide module-compiled-name 9 module-compiled-current-name 10 change-module-name 11 module-compiled-immediate-name 15 (define/who module-compiled-name 34 (change-module-name c i-name prefix)])) 49 (define (change-module-name c name prefix) 55 (change-module-name sub-c name next-prefix))) 58 (define (change-submodule-name sub-c) 60 (define pre-compiled-in-memorys (map change-submodule-name [all …]
|
/dports/lang/racket/racket-8.3/src/expander/eval/ |
H A D | reflect-name.rkt | 8 (provide module-compiled-name 9 module-compiled-current-name 10 change-module-name 11 module-compiled-immediate-name 15 (define/who module-compiled-name 34 (change-module-name c i-name prefix)])) 49 (define (change-module-name c name prefix) 55 (change-module-name sub-c name next-prefix))) 58 (define (change-submodule-name sub-c) 60 (define pre-compiled-in-memorys (map change-submodule-name [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/storage/netapp/ |
H A D | netapp_e_volume.py | 593 change = False 607 change = True 665 … if change < 4 * 1024 ** 3 or change > 256 * 1024 ** 3 or change % (4 * 1024 ** 3) != 0: 696 self.module.log("New thin volume created [%s]." % self.name) 706 self.module.log("New volume created [%s]." % self.name) 773 self.module.log("Thin volume deleted [%s]." % self.name) 781 self.module.log("Volume deleted [%s]." % self.name) 787 change = False 815 self.module.log("Update required: [%s]." % change) 818 if change and not self.module.check_mode: [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/netapp_eseries/santricity/plugins/modules/ |
H A D | netapp_e_volume.py | 605 change = False 619 change = True 677 … if change < 4 * 1024 ** 3 or change > 256 * 1024 ** 3 or change % (4 * 1024 ** 3) != 0: 708 self.module.log("New thin volume created [%s]." % self.name) 718 self.module.log("New volume created [%s]." % self.name) 785 self.module.log("Thin volume deleted [%s]." % self.name) 793 self.module.log("Volume deleted [%s]." % self.name) 799 change = False 827 self.module.log("Update required: [%s]." % change) 830 if change and not self.module.check_mode: [all …]
|
H A D | na_santricity_volume.py | 627 change = False 641 change = True 708 … if change < 4 * 1024 ** 3 or change > 256 * 1024 ** 3 or change % (4 * 1024 ** 3) != 0: 742 self.module.log("New thin volume created [%s]." % self.name) 752 self.module.log("New volume created [%s]." % self.name) 819 self.module.log("Thin volume deleted [%s]." % self.name) 827 self.module.log("Volume deleted [%s]." % self.name) 833 change = False 866 self.module.log("Update required: [%s]." % change) 869 if change and not self.module.check_mode: [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/ucs_managed_objects/tasks/ |
H A D | main.yml | 72 # Test change (check_mode) 73 - name: Managed Objects change (check_mode) 91 - name: Managed Objects change (normal mode) 104 - name: Managed Objects change again (normal mode) 109 # Verfiy change 110 - name: Verify Managed Objects change results 249 - name: Boot Managed Objects change (check_mode) 303 - name: Boot Managed Objects change (normal mode) 316 - name: Boot Managed Objects change again (normal mode) 321 # Verfiy change [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/zabbix/plugins/modules/ |
H A D | zabbix_service.py | 172 change = False 178 change = True 186 change = True 188 change = True 190 change = True 192 if not change: 214 module = AnsibleModule( 219 name = module.params['name'] 235 module.exit_json(changed=False, msg="Service not found, no change: %s" % name) 237 module.exit_json(changed=True, result="Successfully deleted service(s) %s" % name) [all …]
|
/dports/emulators/x49gp/x49gp/x49gp-code/ |
H A D | s3c2410_io_port.c | 293 reg->name, offset, data); in s3c2410_io_port_write() 566 printf("%s: %s:%u\n", module->name, __FUNCTION__, __LINE__); in s3c2410_io_port_load() 572 if (NULL == reg->name) in s3c2410_io_port_load() 575 if (x49gp_module_get_u32(module, key, reg->name, in s3c2410_io_port_load() 591 printf("%s: %s:%u\n", module->name, __FUNCTION__, __LINE__); in s3c2410_io_port_save() 597 if (NULL == reg->name) in s3c2410_io_port_save() 600 x49gp_module_set_u32(module, key, reg->name, *(reg->datap)); in s3c2410_io_port_save() 614 printf("%s: %s:%u\n", module->name, __FUNCTION__, __LINE__); in s3c2410_io_port_reset() 625 if (NULL == reg->name) in s3c2410_io_port_reset() 659 printf("%s: %s:%u\n", module->name, __FUNCTION__, __LINE__); in s3c2410_io_port_init() [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/identity/keycloak/ |
H A D | keycloak_user_federation.py | 756 name=dict(type='str'), 768 name=dict(type='str'), 798 name = module.params.get('name') 818 …s(urlencode(dict(type='org.keycloak.storage.UserStorageProvider', parent=realm, name=name)), realm) 820 …module.fail_json(msg='No ID given and found multiple user federations with name `{name}`. Cannot c… 849 for change in module.params['mappers']: 850 change = dict((k, v) for k, v in change.items() if change[k] is not None) 851 if change.get('id') is None and change.get('name') is None: 860 found = kc.get_components(urlencode(dict(parent=cid, name=change['name'])), realm) 862 …module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=cha… [all …]
|
/dports/graphics/qgis/qgis-3.22.3/scripts/qgis_fixes/ |
H A D | fix_pyqt.py | 455 for name in MAPPING[import_mod.value][:-1]: 469 module = "" 471 module += l.value 472 mod_member.value = module 528 def handle_name(name, prefix): argument 529 if name.type == syms.import_as_name: 531 name.children[1].clone(), 532 name.children[2].clone()] 536 for module in modules: 537 elts = mod_dict[module] [all …]
|
/dports/graphics/qgis-ltr/qgis-3.16.16/scripts/qgis_fixes/ |
H A D | fix_pyqt.py | 455 for name in MAPPING[import_mod.value][:-1]: 469 module = "" 471 module += l.value 472 mod_member.value = module 528 def handle_name(name, prefix): argument 529 if name.type == syms.import_as_name: 531 name.children[1].clone(), 532 name.children[2].clone()] 536 for module in modules: 537 elts = mod_dict[module] [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/f5networks/f5_modules/plugins/modules/ |
H A D | bigip_remote_syslog.py | 191 if isinstance(change, dict): 192 result.update(change) 258 self.module.deprecate( 268 change = diff.compare(k) 269 if change is None: 272 if isinstance(change, dict): 273 changed.update(change) 275 changed[k] = change 287 if syslog.name == self.want.name: 444 module = AnsibleModule( [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/vmware/plugins/modules/ |
H A D | vmware_host_sriov.py | 163 def __init__(self, module): argument 189 self.module.fail_json( 215 self.module.fail_json( 227 change = False 232 change = True 237 change = True 241 if not change: 244 diff["change"] = change 323 self.module.fail_json(msg="No nic= %s on host= %s" % (self.vmnic, host.name)) 340 self.module.fail_json( [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/identity/ipa/ |
H A D | ipa_subca.py | 89 return self._post_json(method='ca_find', name=subca_name, item=None) 96 return self._post_json(method='ca_add', name=subca_name, item=item) 100 for change in diff: 102 if item[change] is not None: 103 update_detail.update(setattr="{0}={1}".format(change, item[change])) 104 self._post_json(method='ca_mod', name=subca_name, item=update_detail) 107 return self._post_json(method='ca_del', name=subca_name) 110 return self._post_json(method='ca_disable', name=subca_name) 113 return self._post_json(method='ca_enable', name=subca_name) 130 def ensure(module, client): argument [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/digitalocean/plugins/modules/ |
H A D | digital_ocean_database_info.py | 104 self.module = module 109 self.name = None 176 name = module.params.get("name", None) 180 if id is not None or name is not None: 187 change=False, msg="Database {0} ({1}) not found".format(id, name) 189 elif id is not None and name is None: 190 module.fail_json(change=False, msg="Database {0} not found".format(id)) 191 elif id is None and name is not None: 193 change=False, msg="Database {0} not found".format(name) 212 name=dict(type="str"), [all …]
|
/dports/lang/php73/php-7.3.33/ext/session/tests/ |
H A D | session_ini_set.phpt | 7 session.name="PHPSESSID" 33 * Prototype : string ini_set(string $name, string $value) 41 var_dump(ini_set("session.name", "PHPSESSID")); 67 var_dump(ini_set("session.name", "PHPSESSID")); 119 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 122 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 125 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 129 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 132 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 135 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… [all …]
|
/dports/lang/php74/php-7.4.27/ext/session/tests/ |
H A D | session_ini_set.phpt | 7 session.name="PHPSESSID" 33 * Prototype : string ini_set(string $name, string $value) 41 var_dump(ini_set("session.name", "PHPSESSID")); 67 var_dump(ini_set("session.name", "PHPSESSID")); 119 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 122 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 125 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 129 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 132 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… 135 Warning: ini_set(): A session is active. You cannot change the session module's ini settings at thi… [all …]
|