/dports/textproc/xom/XOM/src/nu/xom/tests/ |
H A D | NamespaceNodeTest.java | 51 Nodes result = root.query("namespace::pre"); in testGetters() 56 assertEquals(root, namespace.getParent()); in testGetters() 64 Nodes result = root.query("namespace::pre"); in testCopy() 69 assertEquals(namespace, copy); in testCopy() 80 Nodes result = root.query("namespace::pre"); in testToXML() 90 Nodes result = root.query("namespace::pre"); in testGetChildCount() 103 namespace.getChild(0); in testGetChild() 128 namespace.detach(); in testDetachNamespaceNode() 129 assertNull(namespace.getParent()); in testDetachNamespaceNode() 140 root.removeChild(namespace); in testRemoveNamespaceNode() [all …]
|
/dports/lang/racket/racket-8.3/src/expander/namespace/ |
H A D | namespace.rkt | 18 namespace-root-namespace 19 namespace-get-root-expand-ctx 20 namespace-set-root-expand-ctx! 113 (or (namespace-root-namespace share-from-ns) 136 (define (namespace-get-root-expand-ctx ns) 137 (force (unbox (namespace-root-expand-ctx ns)))) 139 (define (namespace-set-root-expand-ctx! ns root-ctx) 140 (set-box! (namespace-root-expand-ctx ns) root-ctx)) 143 (root-expand-context-self-mpi (namespace-get-root-expand-ctx ns))) 146 (define mpi (root-expand-context-self-mpi (namespace-get-root-expand-ctx ns))) [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/namespace/ |
H A D | namespace.rkt | 18 namespace-root-namespace 19 namespace-get-root-expand-ctx 20 namespace-set-root-expand-ctx! 113 (or (namespace-root-namespace share-from-ns) 136 (define (namespace-get-root-expand-ctx ns) 137 (force (unbox (namespace-root-expand-ctx ns)))) 139 (define (namespace-set-root-expand-ctx! ns root-ctx) 140 (set-box! (namespace-root-expand-ctx ns) root-ctx)) 143 (root-expand-context-self-mpi (namespace-get-root-expand-ctx ns))) 146 (define mpi (root-expand-context-self-mpi (namespace-get-root-expand-ctx ns))) [all …]
|
/dports/sysutils/dua-cli/dua-cli-2.14.11/cargo-crates/windows_gen-0.9.1/src/ |
H A D | type_tree.rs | 13 namespace, in from_namespace() 20 let mut root = Self::from_namespace(""); in from_limits() localVariable 28 root.insert_if(reader, &limit.namespace, &mut set, &def); in from_limits() 33 root.insert_if( in from_limits() 44 root in from_limits() 92 let namespace = kind.namespace(); in includes() localVariable 113 pub fn gen<'a>(&'a self, root: &'a Self) -> impl Iterator<Item = TokenStream> + 'a { in gen() 114 let gen = Gen::relative(self.namespace, root); in gen() 119 .chain(gen_namespaces(&self.namespaces, root)) in gen() 125 root: &'a TypeTree, in gen_namespaces() [all …]
|
/dports/textproc/translate-toolkit/translate-toolkit-3.5.1/translate/storage/ |
H A D | flatxml.py | 33 namespace=None, argument 38 self.namespace = namespace 97 namespace=namespace, 121 namespace=None, argument 129 self.namespace = namespace 142 unit.namespace = self.namespace 154 if not (len(self.root)): 197 self.root.tag, 199 if len(self.root): 220 for entry in self.root: [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | token_store_test.go | 34 ClientToken: root, 749 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1118 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1133 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1342 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2551 root, err := ts.rootToken(namespace.RootContext(nil)) 2564 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2600 root, err := ts.rootToken(namespace.RootContext(nil)) 2613 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4086 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 772 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1141 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1156 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1365 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2574 root, err := ts.rootToken(namespace.RootContext(nil)) 2587 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 2959 root, err := ts.rootToken(namespace.RootContext(nil)) 2972 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4888 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 775 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1199 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1214 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1423 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2635 root, err := ts.rootToken(namespace.RootContext(nil)) 2648 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 3026 root, err := ts.rootToken(namespace.RootContext(nil)) 3039 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4955 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 775 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1199 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1214 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1423 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2635 root, err := ts.rootToken(namespace.RootContext(nil)) 2648 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 3023 root, err := ts.rootToken(namespace.RootContext(nil)) 3036 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4952 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | token_store_test.go | 35 ClientToken: root, 775 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1199 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1214 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1423 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2635 root, err := ts.rootToken(namespace.RootContext(nil)) 2648 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 3023 root, err := ts.rootToken(namespace.RootContext(nil)) 3036 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 4952 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/network_namespace/t/ |
H A D | network_namespace.test | 8 # to support the network namespace. Namely, the network namespace named 'red' 12 # and IP addresses from the root (default) network namespace must be configured. 22 CREATE USER root@10.0.2.1; 31 --exec $EXE_MYSQL --no-defaults -u root --port $MYSQL_PORT --host 10.0.2.1 --network-namespace=red… 35 --exec $EXE_MYSQL --no-defaults -u root --port $MYSQL_PORT --host 10.0.2.1 --network-namespace=gre… 40 … $MYSQLTEST_VARDIR/tmp/mysql --no-defaults -u root --port $MYSQL_PORT --host 10.0.2.1 --network-n… 45 --echo # outer root network namespace. 53 --exec $EXE_MYSQL --no-defaults -u root --port $MYSQL_PORT --host 10.0.2.1 --network-namespace=red… 56 --exec $EXE_MYSQL --no-defaults -u root --port $MYSQL_PORT --host 10.0.1.1 --network-namespace=blu… 71 --exec $EXE_MYSQL --no-defaults -u root --host 10.0.2.1 --port $MASTER_ADMINPORT --network-namespac… [all …]
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/network_namespace/r/ |
H A D | network_namespace.result | 2 CREATE USER root@127.0.0.1; 3 CREATE USER root@10.0.2.1; 7 root@127.0.0.1 10 root@10.0.2.1 12 ERROR: Network namespace error: No such file or directory 14 ERROR: Network namespace error: Operation not permitted 17 # outer root network namespace. 21 root@10.0.2.1 24 root@10.0.1.1 29 root@10.0.2.1 [all …]
|
/dports/devel/php-libawl/awl-827fbfed7dab0ca339998ca6cdcffb328246d83b/inc/ |
H A D | XMLDocument.php | 39 * @var root 41 private $root; variable in XMLDocument 96 $this->namespaces[$namespace] = $prefix; 99 if ( isset($this->namespaces[$namespace]) && $this->namespaces[$namespace] != $prefix ) { 146 if ( $namespace == null ) { 149 $namespace = $matches[1]; 164 $prefix = $this->namespaces[$namespace]; 291 $this->root = $root; 295 $this->root = $this->NewXMLElement( $root, $content, $attributes, $xmlns ); 302 $this->root->SetAttribute( 'xmlns'.($p == '' ? '' : ':') . $p, $n); [all …]
|
/dports/security/vault/vault-1.8.2/vault/ |
H A D | token_store_test.go | 111 testTokenStore_CubbyholeTidy(t, c, root, namespace.RootContext(nil)) 756 salted, err := ts.SaltID(namespace.RootContext(nil), root) 1180 ent, err := ts.Lookup(namespace.RootContext(nil), root) 1195 ent2, err := ts.Lookup(namespace.RootContext(nil), root) 1404 saltedRoot, _ := ts.SaltID(namespace.RootContext(nil), root.ID) 2604 root, err := ts.rootToken(namespace.RootContext(nil)) 2617 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 3094 root, err := ts.rootToken(namespace.RootContext(nil)) 3107 err = exp.RegisterAuth(namespace.RootContext(nil), root, auth) 5024 root, _ := exp.tokenStore.rootToken(namespace.RootContext(nil)) [all …]
|
/dports/net/py-errbot/errbot-6.1.8/errbot/storage/ |
H A D | memory.py | 9 def __init__(self, namespace): argument 10 self.namespace = namespace 11 self.root = ROOTS.get(namespace, {}) 14 if key not in self.root: 16 return self.root[key] 19 self.root[key] = value 24 del self.root[key] 27 return len(self.root) 33 ROOTS[self.namespace] = self.root 37 def open(self, namespace: str) -> StorageBase: [all …]
|
/dports/www/libdom/libdom-0.4.1/src/core/ |
H A D | nodelist.c | 29 dom_node_internal *root; member 69 dom_node_internal *root, dom_string *tagname, in _dom_nodelist_create() argument 82 dom_node_ref(root); in _dom_nodelist_create() 83 l->root = root; in _dom_nodelist_create() 122 l->data.ns.namespace = namespace; in _dom_nodelist_create() 177 dom_node_unref(list->root); in dom_nodelist_unref() 201 dom_node_internal *cur = list->root->first_child; in dom_nodelist_get_length() 272 while (parent != list->root && in dom_nodelist_get_length() 386 while (parent != list->root && in _dom_nodelist_item() 417 dom_node_internal *root, dom_string *tagname, in _dom_nodelist_match() argument [all …]
|
/dports/misc/perkeep/perkeep-0.11/internal/closure/ |
H A D | gendeps.go | 41 func GenDeps(root http.FileSystem) ([]byte, error) { 43 return GenDepsWithPath("../../", root) 47 func GenDepsWithPath(pathPrefix string, root http.FileSystem) ([]byte, error) { 48 d, err := root.Open("/") 50 return nil, fmt.Errorf("Failed to open root of %v: %v", root, err) 57 return nil, fmt.Errorf("root of %v is not a dir", root) 77 f, err := root.Open(name) 190 providedBy[namespace] = jsfile 195 requires[namespace] = required 224 for namespace := range providedBy { [all …]
|
/dports/net/traefik/traefik-2.6.1/pkg/provider/kubernetes/crd/fixtures/ |
H A D | with_servers_transport.yml | 4 name: root-ca0 5 namespace: foo 14 name: root-ca1 24 name: root-ca2 34 name: root-ca3 44 name: root-ca4 99 - root-ca0 100 - root-ca1 101 - root-ca2 102 - root-ca3 [all …]
|
/dports/textproc/p5-CSS-Sass/CSS-Sass-3.6.4/t/sass-spec/spec/directives/use/error/ |
H A D | syntax.hrx | 226 a {a: namespace.member} 231 3 | a {a: namespace.member} 252 a {a: namespace.()} 257 1 | a {a: namespace.()} 265 a {a: namespace._member()} 304 a {a: namespace.$} 309 1 | a {a: namespace.$} 317 a {a: namespace.$_member} 356 a {@include namespace.} 361 1 | a {@include namespace.} [all …]
|
/dports/lang/racket-minimal/racket-8.3/src/expander/compile/ |
H A D | namespace-scope.rkt | 6 "../namespace/namespace.rkt" 7 "../expand/root-expand-context.rkt") 10 extract-namespace-scopes 11 encode-namespace-scopes 12 namespace-scopes=?) 15 ;; different namespace or deserialized, swap the current namespace's 18 ;; To swap a namespace scopes, we partition the namespace scopes into 38 (define root-ctx (namespace-get-root-expand-ctx ns)) 39 (define post-expansion-sc (post-expansion-scope (root-expand-context-post-expansion root-ctx))) 41 (set-remove (list->seteq (root-expand-context-module-scopes root-ctx)) [all …]
|