/external/ltp/android/tools/ |
D | make_install_parser.py | 2 # Copyright 2016 - The Android Open Source Project 8 # http://www.apache.org/licenses/LICENSE-2.0 24 # Parses the output of make install --dry-run and generates directives in the 36 '''Parses the output of make install --dry-run.''' 42 '''Parses the text output of make install --dry-run. 45 input_text: string, output of make install --dry-run 50 pattern = re.compile(r'install\s+-m\s+\d+\s+"%s%s(.+)"\s+/opt/ltp/(.+)' % 74 description='Parse the LTP make install --dry-run output into a list') 76 '--ltp-root', 81 '--dry-run-file', [all …]
|
D | make_parser.py | 2 # Copyright 2016 - The Android Open Source Project 8 # http://www.apache.org/licenses/LICENSE-2.0 29 '''Parses the output of make --dry-run. 42 ar_parser.add_argument('-r', dest='r', action='store_true') 43 ar_parser.add_argument('-c', dest='c', action='store') 47 cc_parser.add_argument('-D', dest='defines', action='append') 48 cc_parser.add_argument('-I', dest='includes', action='append') 49 cc_parser.add_argument('-l', dest='libraries', action='append') 50 cc_parser.add_argument('-L', dest='libraries_path', action='append') 51 cc_parser.add_argument('-c', dest='compile', action='store_true') [all …]
|
/external/ktfmt/core/src/test/java/com/facebook/ktfmt/cli/ |
D | MainTest.kt | 8 * http://www.apache.org/licenses/LICENSE-2.0 53 fun `expandArgsToFileNames - single file arg is used as is`() { in expandArgsToFileNames - single file arg is used as is() 60 fun `expandArgsToFileNames - single arg which is not a file is not returned`() { in expandArgsToFileNames - single arg which is not a file is not returned() 66 …fun `expandArgsToFileNames - single arg which is a directory is resolved to its recursively contai… in expandArgsToFileNames - single arg which is a directory is resolved to its recursively contained kt files() 77 …fun `expandArgsToFileNames - multiple directory args are resolved to their recursively contained k… in expandArgsToFileNames - multiple directory args are resolved to their recursively contained kt files() 97 fun `expandArgsToFileNames - a dash is an error`() { in expandArgsToFileNames - a dash is an error() 99 Main.expandArgsToFileNames(listOf(root.resolve("foo.bar").toString(), File("-").toString())) in expandArgsToFileNames - a dash is an error() 107 fun `Using '-' as the filename formats an InputStream`() { in Using '-' as the filename formats an InputStream() 109 Main(code.byteInputStream(), PrintStream(out), PrintStream(err), arrayOf("-")).run() in Using '-' as the filename formats an InputStream() 112 assertThat(out.toString("UTF-8")).isEqualTo(expected) in Using '-' as the filename formats an InputStream() [all …]
|
D | ParsedArgsTest.kt | 8 * http://www.apache.org/licenses/LICENSE-2.0 47 val (fileNames, _) = ParsedArgs.parseOptions(PrintStream(out), arrayOf("foo.kt", "--unknown")) in files to format are returned and unknown flags are reported() 50 assertThat(out.toString()).isEqualTo("Unexpected option: --unknown\n") in files to format are returned and unknown flags are reported() 82 fun `parseOptions recognizes --dropbox-style and rejects unknown flags`() { in parseOptions recognizes --dropbox-style and rejects unknown flags() 86 ParsedArgs.parseOptions(PrintStream(out), arrayOf("--dropbox-style", "foo.kt", "--unknown")) in parseOptions recognizes --dropbox-style and rejects unknown flags() 91 assertThat(out.toString()).isEqualTo("Unexpected option: --unknown\n") in parseOptions recognizes --dropbox-style and rejects unknown flags() 95 fun `parseOptions recognizes --google-style`() { in parseOptions recognizes --google-style() 99 ParsedArgs.parseOptions(PrintStream(out), arrayOf("--google-style", "foo.kt")) in parseOptions recognizes --google-style() 105 fun `parseOptions recognizes --dry-run`() { in parseOptions recognizes --dry-run() 108 val parsed = ParsedArgs.parseOptions(PrintStream(out), arrayOf("--dry-run", "foo.kt")) in parseOptions recognizes --dry-run() [all …]
|
/external/llvm/utils/release/ |
D | tag.sh | 2 #===-- tag.sh - Tag the LLVM release candidates ----------------------------===# 9 #===------------------------------------------------------------------------===# 13 #===------------------------------------------------------------------------===# 15 set -e 20 projects="llvm cfe test-suite compiler-rt libcxx libcxxabi clang-tools-extra polly lldb lld openmp … 24 base_url="https://llvm.org/svn/llvm-project" 27 echo "usage: `basename $0` -release <num> [-rebranch] [-revision <num>] [-dry-run]" 28 echo "usage: `basename $0` -release <num> -rc <num> [-dry-run]" 30 echo " -release <num> The version number of the release" 31 echo " -rc <num> The release candidate number" [all …]
|
/external/python/parse_type/tasks/ |
D | _dry_run.py | 1 # -*- coding: UTF-8 -*- 3 Basic support to use a --dry-run mode w/ invoke tasks. 5 .. code-block:: 14 # -- DRY-RUN MODE: Only echos commands. 15 ctx.run("rm -rf {}".format(path)) 21 PREFIX = "DRY-RUN: " 35 def run(self, command, **kwargs): member in DryRunContext 44 self.run(command2, **kwargs)
|
/external/python/google-api-python-client/docs/dyn/ |
D | apigee_v1.organizations.environments.apis.revisions.deployments.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
/external/crosvm/ci/kokoro/ |
D | build-merge-into-chromeos.sh | 3 # Use of this source code is governed by a BSD-style license that can be 5 set -e 7 readonly GERRIT_URL=https://chromium-review.googlesource.com 10 readonly MIN_COMMIT_COUNT=${MIN_COMMIT_COUNT:-5} 14 # See: https://gerrit-review.googlesource.com/Documentation/dev-rest-api.html 16 curl --silent "$url" | tail -n +2 24 if [[ -z "${cookie_file}" ]]; then 29 curl --silent \ 30 --cookie "${cookie_file}" \ 31 -X POST \ [all …]
|
/external/brotli/.github/workflows/ |
D | fuzz.yml | 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 10 oss-fuzz-project-name: 'brotli' 11 dry-run: false 12 - name: Run Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 15 oss-fuzz-project-name: 'brotli' 16 fuzz-seconds: 600 17 dry-run: false [all …]
|
/external/capstone/.github/workflows/ |
D | fuzz.yml | 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 10 oss-fuzz-project-name: 'capstone' 11 dry-run: false 12 - name: Run Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 15 oss-fuzz-project-name: 'capstone' 16 fuzz-seconds: 600 17 dry-run: false [all …]
|
/external/rust/crates/libz-sys/src/zlib-ng/.github/workflows/ |
D | fuzz.yml | 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 10 oss-fuzz-project-name: 'zlib-ng' 11 dry-run: false 12 - name: Run Fuzzers 13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 15 oss-fuzz-project-name: 'zlib-ng' 16 fuzz-seconds: 600 17 dry-run: false [all …]
|
/external/harfbuzz_ng/.github/workflows/ |
D | cifuzz.yml | 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'harfbuzz' 12 dry-run: false 13 - name: Run Fuzzers 14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 16 oss-fuzz-project-name: 'harfbuzz' 17 fuzz-seconds: 600 18 dry-run: false [all …]
|
/external/oss-fuzz/infra/cifuzz/ |
D | example_main.yml | 5 runs-on: ubuntu-latest 7 - name: Build Fuzzers 9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 11 oss-fuzz-project-name: 'example' 12 dry-run: false 13 - name: Run Fuzzers 14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master 16 oss-fuzz-project-name: 'example' 17 fuzz-seconds: 600 18 dry-run: false [all …]
|
/external/autotest/site_utils/admin_audit/ |
D | main.py | 3 # Use of this source code is governed by a BSD-style license that can be 36 ACTION_VERIFY_DUT_STORAGE = 'verify-dut-storage' 37 ACTION_VERIFY_SERVO_USB = 'verify-servo-usb-drive' 38 ACTION_VERIFY_SERVO_FW = 'verify-servo-fw' 39 ACTION_FLASH_SERVO_KEYBOARD_MAP = 'flash-servo-keyboard-map' 40 ACTION_VERIFY_DUT_MACADDR = 'verify-dut-macaddr' 41 ACTION_VERIFY_RPM_CONFIG = 'verify-rpm-config' 119 logging.info('DRY RUN: Would have run actions %s', action) 130 """Run verifier for the action with targeted host. 132 @param action: The action requested to run the verifier. [all …]
|
/external/python/cpython2/Tools/scripts/ |
D | fixnotice.py | 12 -h / --help 15 --oldnotice=file 19 --newnotice=file 23 --dry-run 25 would change. When used with -v, a status will be printed for every 28 -v / --verbose 35 Copyright (c) 1995-2000, Corporation for National Research Initiatives. 36 Copyright (c) 1990-1995, Stichting Mathematisch Centrum. 64 'dry-run', 'verbose']) 69 if opt in ('-h', '--help'): [all …]
|
/external/python/cpython3/Tools/scripts/ |
D | fixnotice.py | 12 -h / --help 15 --oldnotice=file 19 --newnotice=file 23 --dry-run 25 would change. When used with -v, a status will be printed for every 28 -v / --verbose 35 Copyright (c) 1995-2000, Corporation for National Research Initiatives. 36 Copyright (c) 1990-1995, Stichting Mathematisch Centrum. 64 'dry-run', 'verbose']) 69 if opt in ('-h', '--help'): [all …]
|
/external/clang/ |
D | build.py | 9 # http://www.apache.org/licenses/LICENSE-2.0 37 # pylint: disable=missing-docstring 47 # Set True to skip all actions (log only). Controlled by --dry-run. 77 """Proxy for subprocess.check_call with logging and dry-run support.""" 85 extra_env = dict(set(kwargs['env'].items()) - set(os.environ.items())) 94 """Proxy for shutil.copy2 with logging and dry-run support.""" 102 """Proxy for shutil.copytree with logging and dry-run support.""" 110 """Proxy for shutil.rmtree with logging and dry-run support.""" 118 """Proxy for os.rename with logging and dry-run support.""" 125 """Proxy for os.makedirs with logging and dry-run support.""" [all …]
|
/external/igt-gpu-tools/runner/ |
D | runner_tests.c | 17 * Such variables have to be either non-local or volatile, otherwise their 39 for (i = 0; i < list->size; i++) { in debug_print_executions() 40 struct job_list_entry *entry = &list->entries[i]; in debug_print_executions() 41 igt_debug(" %s\n", entry->binary); in debug_print_executions() 42 for (k = 0; k < entry->subtest_count; ++k) { in debug_print_executions() 43 igt_debug(" %s\n", entry->subtests[k]); in debug_print_executions() 82 igt_subtest_f("job-list-filters-%s-%s", name, multiple ? "multiple" : "normal") { in job_list_filter_test() 86 multiple ? "--multiple-mode" : "--sync", in job_list_filter_test() 89 "path-to-results", in job_list_filter_test() 128 if (strcmp(dirent->d_name, ".") && in clear_directory_fd() [all …]
|
/external/oss-fuzz/infra/cifuzz/actions/run_fuzzers/ |
D | action.yml | 2 name: 'run-fuzzers' 5 oss-fuzz-project-name: 6 description: 'The OSS-Fuzz project name.' 12 fuzz-seconds: 16 dry-run: 17 description: 'If set, run the action without actually reporting a failure.' 20 description: 'The sanitizer to run the fuzzers with.' 22 run-fuzzers-mode: 24 The mode to run the fuzzers with ("ci" or "batch"). 26 "batch" is for non-interactive fuzzing of an entire project. [all …]
|
/external/autotest/site_utils/ |
D | label_cleaner.py | 4 # Use of this source code is governed by a BSD-style license that can be 15 'cros-version' and are not in use. 17 ./label_cleaner.py -p cros-version 19 If '-p' option is not given, we delete labels whose name is exactly 20 'cros-version' and are not in use. 54 # Per-prefix metrics are generated only for the following prefixes. This 58 'cros-version', 59 'fwro-version', 60 'fwrw-version', 126 return set(r[0] for r in rows) - replaced_label_ids [all …]
|
/external/selinux/.github/workflows/ |
D | cifuzz.yml | 1 --- 6 - master 9 - master 12 runs-on: ubuntu-latest 15 fail-fast: false 19 - name: Build Fuzzers (${{ matrix.sanitizer }}) 21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 23 oss-fuzz-project-name: 'selinux' 24 dry-run: false 25 allowed-broken-targets-percentage: 0 [all …]
|
/external/libbpf/.github/workflows/ |
D | cifuzz.yml | 1 --- 2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/ 7 - master 10 - master 13 runs-on: ubuntu-latest 16 fail-fast: false 20 - name: Build Fuzzers (${{ matrix.sanitizer }}) 22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master 24 oss-fuzz-project-name: 'libbpf' 25 dry-run: false [all …]
|
/external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/ |
D | action.yml | 2 name: 'build-fuzzers' 3 description: "Builds an OSS-Fuzz project's fuzzers." 5 oss-fuzz-project-name: 6 description: 'Name of the corresponding OSS-Fuzz project.' 12 dry-run: 13 description: 'If set, run the action without actually reporting a failure.' 15 allowed-broken-targets-percentage: 21 project-src-path: 24 bad-build-check: 25 description: "Whether or not OSS-Fuzz's check for bad builds should be done." [all …]
|
/external/autotest/site_utils/deployment/prepare/ |
D | main.py | 1 #!/usr/bin/python2 -u 3 # Use of this source code is governed by a BSD-style license that can be 66 logging.info('DRY RUN: Would have run actions %s', opts.actions) 71 if 'stage-usb' in opts.actions: 82 if 'install-test-image' in opts.actions: 89 if 'install-firmware' in opts.actions: 96 if 'verify-recovery-mode' in opts.actions: 103 # TODO (otabek): mix this step with update-label later. 104 if 'setup-labstation' in opts.actions: 111 if 'update-label' in opts.actions: [all …]
|
/external/oss-fuzz/infra/cifuzz/external-actions/run_fuzzers/ |
D | action.yml | 2 name: 'run-fuzzers' 9 fuzz-seconds: 13 dry-run: 14 description: 'If set, run the action without actually reporting a failure.' 17 description: 'The sanitizer to run the fuzzers with.' 19 run-fuzzers-mode: 21 The mode to run the fuzzers with ("ci" or "batch"). 23 "batch" is for non-interactive fuzzing of an entire project. 27 github-token: 32 TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361): [all …]
|