Searched refs:foobar (Results 1 – 19 of 19) sorted by relevance
/systemd-251/test/units/ |
D | testsuite-22.06.sh | 10 d /var/tmp/foobar-test-06 11 d /var/tmp/foobar-test-06/important 12 R /var/tmp/foobar-test-06 17 test -d /var/tmp/foobar-test-06 18 test -d /var/tmp/foobar-test-06/important 21 test ! -f /var/tmp/foobar-test-06 22 test ! -f /var/tmp/foobar-test-06/important 25 test -d /var/tmp/foobar-test-06 26 test -d /var/tmp/foobar-test-06/important 28 touch /var/tmp/foobar-test-06/something-else [all …]
|
D | testsuite-17.01.sh | 14 udevadm info /dev/sda | grep -q -v SYSTEMD_WANTS=foobar.service 16 systemctl show -p WantedBy foobar.service | grep -q -v sda 32 udevadm info /dev/sda | grep -q SYSTEMD_WANTS=foobar.service 34 systemctl show -p WantedBy foobar.service | grep -q sda 50 udevadm info /dev/sda | grep -q -v SYSTEMD_WANTS=foobar.service 52 systemctl show -p WantedBy foobar.service | grep -q -v sda 66 udevadm info /dev/sda | grep -q -v SYSTEMD_WANTS=foobar.service 68 systemctl show -p WantedBy foobar.service | grep -q -v sda
|
D | testsuite-44.service | 6 Wants=systemd-journald@foobar.socket systemd-journald-varlink@foobar.socket 7 After=systemd-journald@foobar.socket systemd-journald-varlink@foobar.socket 13 LogTarget=foobar
|
D | testsuite-44.sh | 7 systemd-run --wait -p LogNamespace=foobar echo "hello world" 9 journalctl --namespace=foobar --sync 10 journalctl -o cat --namespace=foobar >/tmp/hello-world
|
D | testsuite-17.02.sh | 51 ip link set hoge name foobar 52 udevadm info --wait-for-initialization=10s /sys/devices/virtual/net/foobar 56 if ! systemctl status sys-devices-virtual-net-foobar.device; then exit 1; fi 57 if ! systemctl status sys-subsystem-net-devices-foobar.device; then exit 1; fi
|
D | testsuite-22.10.sh | 11 f /tmp/xxx5 0644 - - - foobar\x20
|
D | testsuite-13.sh | 136 …systemd-nspawn --register=no -D /testsuite-13.nc-container --ephemeral --machine foobar /bin/sh -x…
|
/systemd-251/docs/ |
D | CONVERTING_TO_HOMED.md | 42 ID is `foobar`. Then do: 45 mv /home/foobar /home/foobar.saved 53 getent passwd foobar 54 getent shadow foobar 62 The fourth field in the `getent passwd foobar` output tells you the GID of 89 exists safely under the `/home/foobar.saved` name. Let's now create a new 93 homectl create foobar --uid=$UID --real-name=$GECOS 97 i.e. the third field of the `getent passwd foobar` output above. Similar, 117 homectl with foobar -- rsync -aHAXv --remove-source-files /home/foobar.saved/ . 131 rmdir /home/foobar.saved
|
D | PORTABLE_SERVICES.md | 103 `foobar-*.{service|socket|target|timer|path}`, 104 `foobar@.{service|socket|target|timer|path}` as well as 105 `foobar.*.{service|socket|target|timer|path}` and 106 `foobar.{service|socket|target|timer|path}` are copied out. These unit files 114 `foobar-waldo.service` was one of the unit files copied to 116 `/etc/systemd/system.attached/foobar-waldo.service.d/20-portable.conf` is 121 RootImage=/path/to/foobar.raw 122 Environment=PORTABLE=foobar 123 LogExtraFields=PORTABLE=foobar 291 # portablectl attach --extension foobar_0.7.23.raw debian-runtime_11.1.raw foobar [all …]
|
D | CREDENTIALS.md | 120 LoadCredential=foobar:/etc/myfoobarcredential.txt 121 Environment=FOOBARPATH=%d/foobar 130 sha256sum $CREDENTIAL_PATH/foobar 136 `/etc/myfoobarcredential.txt` passed as credential `foobar`, which is hence 137 accessible under `$CREDENTIALS_DIRECTORY/foobar`. Since we additionally pass 199 systemd-run -P --wait -p LoadCredentialEncrypted=foobar:$(pwd)/ciphertext.cred systemd-creds cat fo… 205 and passes it as decrypted credential `foobar` to the invoked service binary 213 systemd-creds encrypt -p --name=foobar plaintext.txt - 222 ExecStart=/usr/bin/systemd-creds cat foobar 223 SetCredentialEncrypted=foobar: \
|
D | CODING_STYLE.md | 60 if (foobar) 67 if (foobar) { 75 if (foobar) { 243 a = foobar(); 251 int a = foobar(); 266 struct foobar t = { 275 struct foobar t;
|
D | JOURNAL_NATIVE_PROTOCOL.md | 140 CODE_FILE=src/foobar.c\n
|
D | ENVIRONMENT.md | 259 processes. Contains the full unit name (e.g. "foobar.service"). NSS and PAM
|
D | JOURNAL_FILE_FORMAT.md | 402 `_SYSTEMD_UNIT=foobar.service`. The **hash** field is a hash value of the
|
/systemd-251/src/test/ |
D | test-os-util.c | 20 _cleanup_free_ char *id = NULL, *id2 = NULL, *name = NULL, *foobar = NULL; in TEST() local 51 assert_se(parse_os_release(NULL, "FOOBAR", &foobar) == 0); in TEST() 52 log_info("FOOBAR: %s", strnull(foobar)); in TEST() 53 assert_se(foobar == NULL); in TEST()
|
/systemd-251/docs/sysvinit/ |
D | README.in | 13 foobar.service" and "systemctl stop foobar.service" to start or stop a 18 system. An init script {{ SYSTEM_SYSVINIT_PATH }}/foobar is implicitly mapped 19 into a service unit foobar.service during system initialization.
|
/systemd-251/test/test-execute/ |
D | exec-environment-multiple.service | 6 …rt=/bin/sh -x -c 'test "$$VAR1" = "word1 word2" && test "$$VAR2" = word3 && test "$$VAR3" = foobar' 9 Environment="VAR3=foobar"
|
/systemd-251/ |
D | TODO | 903 * add support for "portablectl attach http://foobar.com/waaa.raw (i.e. importd integration) 1028 ReadWritePaths=:/var/lib/foobar 1323 * teach ConditionKernelCommandLine= globs or regexes (in order to match foobar={no,0,off}) 1726 * add "systemctl start -v foobar.service" that shows logs of a service
|
D | NEWS | 2189 systemctl --user -M lennart@foobar start foo 2192 "foobar". If no container name is specified, the specified user on 6582 unit template name (i.e. a name in the form of 'foobar@.service', 10215 * Udev rules can now remove tags on devices with TAG-="foobar". 10770 host. "systemctl -H root@foobar:waldi" will now connect as 10771 user "root" to host "foobar", and then proceed directly to 12446 /var/lib/container/foobar it is now sufficient to run 12447 "systemctl start systemd-nspawn@foobar.service" to boot it. 12564 /etc/systemd/system/foobar.service.d/*.conf) 12695 change one value for a service file foobar.service he can [all …]
|