Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 253) sorted by relevance

1234567891011

/external/ltp/testscripts/
Dtest_fs_bind.sh83 sandbox="${TMPDIR}/sandbox"
103 mkdir "${sandbox}" >& /dev/null
104 if [ ! -d "${sandbox}" -o ! -x "${sandbox}" ]; then
105 tst_brkm TBROK true "$0: failed to make directory \"${sandbox}\""
109 mount --bind "${sandbox}" "${sandbox}" >& /dev/null
111 tst_brkm TBROK true "$0: failed to perform bind mount on directory \"${sandbox}\""
115 mount --make-private "${sandbox}" >& /dev/null
117 tst_brkm TBROK true "$0: failed to make private mountpoint on directory \"${sandbox}\""
124 pushd "${sandbox}" > /dev/null && {
162 …mount --make-shared "${sandbox}" > /dev/null 2>&1 || "${FS_BIND_ROOT}/bin/smount" "${sandbox}" sha…
[all …]
/external/python/setuptools/setuptools/tests/
Dtest_sandbox.py9 import setuptools.sandbox
14 with setuptools.sandbox.DirectorySandbox(str(tmpdir)):
32 setuptools.sandbox._execfile(target, vars(namespace))
39 setuptools.sandbox._execfile(str(setup_py), globals())
44 with setuptools.sandbox.ExceptionSaver():
48 with setuptools.sandbox.ExceptionSaver() as saved_exc:
60 with setuptools.sandbox.ExceptionSaver() as saved_exc:
70 with setuptools.sandbox.ExceptionSaver() as saved_exc:
81 with setuptools.sandbox.ExceptionSaver() as saved_exc:
84 with pytest.raises(setuptools.sandbox.UnpickleableException) as caught:
[all …]
/external/selinux/sandbox/
DMakefile10 SHAREDIR ?= $(PREFIX)/share/sandbox
15 all: sandbox seunshare sandboxX.sh start
21 install -m 755 sandbox $(DESTDIR)$(BINDIR)
23 install -m 644 sandbox.8 $(DESTDIR)$(MANDIR)/man8/
26 install -m 644 sandbox.5 $(DESTDIR)$(MANDIR)/man5/
41 install -m 644 sandbox.conf $(DESTDIR)$(SYSCONFDIR)/sandbox
Dsandbox.conf2 NAME=sandbox
/external/python/asn1crypto/dev/
Dbuild.py9 import setuptools.sandbox
56 setuptools.sandbox.run_setup(setup, ['-q', 'sdist'])
59 setuptools.sandbox.run_setup(setup, ['-q', 'bdist_wheel', '--universal'])
62 setuptools.sandbox.run_setup(setup, ['-q', 'clean'])
69 setuptools.sandbox.run_setup(tests_setup, ['-q', 'sdist'])
72 setuptools.sandbox.run_setup(tests_setup, ['-q', 'bdist_wheel', '--universal'])
75 setuptools.sandbox.run_setup(tests_setup, ['-q', 'clean'])
/external/perfetto/infra/ci/worker/
Dgce-startup-script.sh44 docker pull eu.gcr.io/perfetto-ci/sandbox
48 docker network rm sandbox 2>/dev/null || true # Handles the reboot case.
49 docker network create sandbox -o com.docker.network.bridge.name=sandbox
50 sudo iptables -I DOCKER-USER -i sandbox -d 169.254.0.0/16 -j REJECT
64 SANDBOX_TMP=/mnt/disks/sandbox-$i-tmp
/external/robolectric-shadows/junit/src/main/java/org/robolectric/internal/
DSandboxTestRunner.java199 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) {
210 sandbox.replaceShadowMap(shadowMap);
212 sandbox.configure(createClassHandler(shadowMap, sandbox), getInterceptors());
225 Sandbox sandbox = getSandbox(method);
230 configureSandbox(sandbox, method);
233 Thread.currentThread().setContextClassLoader(sandbox.getRobolectricClassLoader());
236 Class bootstrappedTestClass = sandbox.bootstrappedClass(getTestClass().getJavaClass());
252 beforeTest(sandbox, method, bootstrappedMethod);
292 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro…
342 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) {
/external/perfetto/infra/ci/
DMakefile36 build: build-worker build-sandbox
41 .PHONY: build-sandbox
42 build-sandbox: .deps/${BUILDER}-sandbox
60 .deps/${BUILDER}-sandbox: sandbox/* ${COMMON_DEPS}
61 ${BUILDER} build --rm --force-rm -t ${SANDBOX_IMG} sandbox
/external/grpc-grpc/src/objective-c/tests/
Drun_tests.sh59 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \
127 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \
138 HOST_PORT_REMOTE=grpc-test.sandbox.googleapis.com \
/external/python/jinja/docs/
Dsandbox.rst4 The Jinja sandbox can be used to evaluate untrusted code. Access to unsafe
20 .. module:: jinja2.sandbox
39 The Jinja sandbox alone is no solution for perfect security. Especially
45 Also the sandbox is only as good as the configuration. We strongly
80 from jinja2.sandbox import SandboxedEnvironment
/external/perfetto/docs/design-docs/
Dcontinuous-integration.md77 They are in a 1:1 relationship, each worker controls at most one sandbox
87 account and have R/W access to the DB. They can also spawn sandbox containers.
97 - Start the sandbox container, passing down the job config and the git revision
99 - Stream the sandbox stdout to the `/logs` sub-tree of the DB.
100 - Terminate the sandbox container prematurely in case of timeouts or job
114 Each sandbox does the following:
120 A sandbox container is almost completely stateless with the only exception of
239 ┗━ docker run sandbox-X ...
241 [sandbox-X] # From /infra/ci/sandbox/Dockerfile
242 ┗━ /infra/ci/sandbox/init.sh
[all …]
/external/autotest/client/cros/
Dwebstore_test.py113 TestEnv.sandbox: 'staging.sandbox',
118 TestEnv.sandbox: 'download-staging.sandbox',
138 def initialize(self, test_env=TestEnv.sandbox,
156 TestEnv.sandbox:
/external/libchrome/ipc/
Dipc_send_fds_test.cc200 int error = sandbox::Seatbelt::Init( in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE()
201 sandbox::Seatbelt::kProfilePureComputation, SANDBOX_NAMED, &error_buff); in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE()
205 sandbox::Seatbelt::FreeError(error_buff); in DEFINE_IPC_CHANNEL_MOJO_TEST_CLIENT_WITH_CUSTOM_FIXTURE()
/external/robolectric-shadows/sandbox/
DAndroid.bp2 // Compile Robolectric sandbox
30 // Compile Robolectric sandbox tests
/external/llvm-project/lldb/utils/lui/
Dsandbox.py70 sandbox = SandboxUI(screen, event_queue)
71 sandbox.eventLoop()
/external/python/jinja/tests/
Dtest_security.py9 from jinja2.sandbox import ImmutableSandboxedEnvironment
10 from jinja2.sandbox import SandboxedEnvironment
11 from jinja2.sandbox import unsafe
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/
DRobolectricTestRunner.java165 protected ClassHandler createClassHandler(ShadowMap shadowMap, Sandbox sandbox) { in createClassHandler() argument
166 …return new ShadowWrangler(shadowMap, ((SdkEnvironment) sandbox).getSdkConfig().getApiLevel(), getI… in createClassHandler()
231 protected void configureSandbox(Sandbox sandbox, FrameworkMethod method) { in configureSandbox() argument
232 SdkEnvironment sdkEnvironment = (SdkEnvironment) sandbox; in configureSandbox()
239 super.configureSandbox(sandbox, method); in configureSandbox()
347 …protected void beforeTest(Sandbox sandbox, FrameworkMethod method, Method bootstrappedMethod) thro… in beforeTest() argument
348 SdkEnvironment sdkEnvironment = (SdkEnvironment) sandbox; in beforeTest()
/external/boringssl/src/
DSANDBOXING.md6 breaks platform abstractions. A syscall-filtering sandbox may, for instance, be
20 would be a sandbox escape.
25 each sandbox imposes different constraints, so, above all, sandboxed consumers
48 atomics-based fast path. If a sandbox blocks a necessary pthreads syscall, it
69 space (and any copies made via `fork`). If a syscall-filtering sandbox is
134 locale. BoringSSL may trigger these paths and assumes the sandbox environment
/external/ltp/testcases/kernel/fs/fs_bind/
DCHANGELOG13 Made tests run in the sandbox directory rather than in testcases/working
25 Logged the sandbox contents before and after, took a diff, and removed the
28 sandbox. This happens after the mount cleanups otherwise it could fail.
/external/crosvm/devices/
DTEST_MAPPING3 // Failed in TH sandbox
/external/crosvm/x86_64/
DTEST_MAPPING3 // Failed in TH sandbox
/external/crosvm/hypervisor/
DTEST_MAPPING3 // Failed in TH sandbox
/external/crosvm/sys_util/
DTEST_MAPPING3 // Failed in TH sandbox
/external/crosvm/net_util/
DTEST_MAPPING3 // Failed in TH sandbox
/external/crosvm/cros_async/
DTEST_MAPPING3 // Failed in TH sandbox

1234567891011