Home
last modified time | relevance | path

Searched +full:dry +full:- +full:run (Results 1 – 25 of 379) sorted by relevance

12345678910>>...16

/external/ltp/android/tools/
Dmake_install_parser.py2 # Copyright 2016 - The Android Open Source Project
8 # http://www.apache.org/licenses/LICENSE-2.0
24 # Parses the output of make install --dry-run and generates directives in the
36 '''Parses the output of make install --dry-run.'''
42 '''Parses the text output of make install --dry-run.
45 input_text: string, output of make install --dry-run
50 pattern = re.compile(r'install\s+-m\s+\d+\s+"%s%s(.+)"\s+/opt/ltp/(.+)' %
74 description='Parse the LTP make install --dry-run output into a list')
76 '--ltp-root',
81 '--dry-run-file',
[all …]
Dmake_parser.py2 # Copyright 2016 - The Android Open Source Project
8 # http://www.apache.org/licenses/LICENSE-2.0
29 '''Parses the output of make --dry-run.
42 ar_parser.add_argument('-r', dest='r', action='store_true')
43 ar_parser.add_argument('-c', dest='c', action='store')
47 cc_parser.add_argument('-D', dest='defines', action='append')
48 cc_parser.add_argument('-I', dest='includes', action='append')
49 cc_parser.add_argument('-l', dest='libraries', action='append')
50 cc_parser.add_argument('-L', dest='libraries_path', action='append')
51 cc_parser.add_argument('-c', dest='compile', action='store_true')
[all …]
/external/ktfmt/core/src/test/java/com/facebook/ktfmt/cli/
DMainTest.kt8 * http://www.apache.org/licenses/LICENSE-2.0
53 fun `expandArgsToFileNames - single file arg is used as is`() { in expandArgsToFileNames - single file arg is used as is()
60 fun `expandArgsToFileNames - single arg which is not a file is not returned`() { in expandArgsToFileNames - single arg which is not a file is not returned()
66 …fun `expandArgsToFileNames - single arg which is a directory is resolved to its recursively contai… in expandArgsToFileNames - single arg which is a directory is resolved to its recursively contained kt files()
77 …fun `expandArgsToFileNames - multiple directory args are resolved to their recursively contained k… in expandArgsToFileNames - multiple directory args are resolved to their recursively contained kt files()
97 fun `expandArgsToFileNames - a dash is an error`() { in expandArgsToFileNames - a dash is an error()
99 Main.expandArgsToFileNames(listOf(root.resolve("foo.bar").toString(), File("-").toString())) in expandArgsToFileNames - a dash is an error()
107 fun `Using '-' as the filename formats an InputStream`() { in Using '-' as the filename formats an InputStream()
109 Main(code.byteInputStream(), PrintStream(out), PrintStream(err), arrayOf("-")).run() in Using '-' as the filename formats an InputStream()
112 assertThat(out.toString("UTF-8")).isEqualTo(expected) in Using '-' as the filename formats an InputStream()
[all …]
DParsedArgsTest.kt8 * http://www.apache.org/licenses/LICENSE-2.0
47 val (fileNames, _) = ParsedArgs.parseOptions(PrintStream(out), arrayOf("foo.kt", "--unknown")) in files to format are returned and unknown flags are reported()
50 assertThat(out.toString()).isEqualTo("Unexpected option: --unknown\n") in files to format are returned and unknown flags are reported()
82 fun `parseOptions recognizes --dropbox-style and rejects unknown flags`() { in parseOptions recognizes --dropbox-style and rejects unknown flags()
86 ParsedArgs.parseOptions(PrintStream(out), arrayOf("--dropbox-style", "foo.kt", "--unknown")) in parseOptions recognizes --dropbox-style and rejects unknown flags()
91 assertThat(out.toString()).isEqualTo("Unexpected option: --unknown\n") in parseOptions recognizes --dropbox-style and rejects unknown flags()
95 fun `parseOptions recognizes --google-style`() { in parseOptions recognizes --google-style()
99 ParsedArgs.parseOptions(PrintStream(out), arrayOf("--google-style", "foo.kt")) in parseOptions recognizes --google-style()
105 fun `parseOptions recognizes --dry-run`() { in parseOptions recognizes --dry-run()
108 val parsed = ParsedArgs.parseOptions(PrintStream(out), arrayOf("--dry-run", "foo.kt")) in parseOptions recognizes --dry-run()
[all …]
/external/llvm/utils/release/
Dtag.sh2 #===-- tag.sh - Tag the LLVM release candidates ----------------------------===#
9 #===------------------------------------------------------------------------===#
13 #===------------------------------------------------------------------------===#
15 set -e
20 projects="llvm cfe test-suite compiler-rt libcxx libcxxabi clang-tools-extra polly lldb lld openmp …
24 base_url="https://llvm.org/svn/llvm-project"
27 echo "usage: `basename $0` -release <num> [-rebranch] [-revision <num>] [-dry-run]"
28 echo "usage: `basename $0` -release <num> -rc <num> [-dry-run]"
30 echo " -release <num> The version number of the release"
31 echo " -rc <num> The release candidate number"
[all …]
/external/python/parse_type/tasks/
D_dry_run.py1 # -*- coding: UTF-8 -*-
3 Basic support to use a --dry-run mode w/ invoke tasks.
5 .. code-block::
14 # -- DRY-RUN MODE: Only echos commands.
15 ctx.run("rm -rf {}".format(path))
21 PREFIX = "DRY-RUN: "
35 def run(self, command, **kwargs): member in DryRunContext
44 self.run(command2, **kwargs)
/external/python/google-api-python-client/docs/dyn/
Dapigee_v1.organizations.environments.apis.revisions.deployments.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
/external/crosvm/ci/kokoro/
Dbuild-merge-into-chromeos.sh3 # Use of this source code is governed by a BSD-style license that can be
5 set -e
7 readonly GERRIT_URL=https://chromium-review.googlesource.com
10 readonly MIN_COMMIT_COUNT=${MIN_COMMIT_COUNT:-5}
14 # See: https://gerrit-review.googlesource.com/Documentation/dev-rest-api.html
16 curl --silent "$url" | tail -n +2
24 if [[ -z "${cookie_file}" ]]; then
29 curl --silent \
30 --cookie "${cookie_file}" \
31 -X POST \
[all …]
/external/brotli/.github/workflows/
Dfuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'brotli'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'brotli'
16 fuzz-seconds: 600
17 dry-run: false
[all …]
/external/capstone/.github/workflows/
Dfuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'capstone'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'capstone'
16 fuzz-seconds: 600
17 dry-run: false
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/.github/workflows/
Dfuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
10 oss-fuzz-project-name: 'zlib-ng'
11 dry-run: false
12 - name: Run Fuzzers
13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
15 oss-fuzz-project-name: 'zlib-ng'
16 fuzz-seconds: 600
17 dry-run: false
[all …]
/external/harfbuzz_ng/.github/workflows/
Dcifuzz.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'harfbuzz'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'harfbuzz'
17 fuzz-seconds: 600
18 dry-run: false
[all …]
/external/oss-fuzz/infra/cifuzz/
Dexample_main.yml5 runs-on: ubuntu-latest
7 - name: Build Fuzzers
9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
11 oss-fuzz-project-name: 'example'
12 dry-run: false
13 - name: Run Fuzzers
14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master
16 oss-fuzz-project-name: 'example'
17 fuzz-seconds: 600
18 dry-run: false
[all …]
/external/autotest/site_utils/admin_audit/
Dmain.py3 # Use of this source code is governed by a BSD-style license that can be
36 ACTION_VERIFY_DUT_STORAGE = 'verify-dut-storage'
37 ACTION_VERIFY_SERVO_USB = 'verify-servo-usb-drive'
38 ACTION_VERIFY_SERVO_FW = 'verify-servo-fw'
39 ACTION_FLASH_SERVO_KEYBOARD_MAP = 'flash-servo-keyboard-map'
40 ACTION_VERIFY_DUT_MACADDR = 'verify-dut-macaddr'
41 ACTION_VERIFY_RPM_CONFIG = 'verify-rpm-config'
119 logging.info('DRY RUN: Would have run actions %s', action)
130 """Run verifier for the action with targeted host.
132 @param action: The action requested to run the verifier.
[all …]
/external/python/cpython2/Tools/scripts/
Dfixnotice.py12 -h / --help
15 --oldnotice=file
19 --newnotice=file
23 --dry-run
25 would change. When used with -v, a status will be printed for every
28 -v / --verbose
35 Copyright (c) 1995-2000, Corporation for National Research Initiatives.
36 Copyright (c) 1990-1995, Stichting Mathematisch Centrum.
64 'dry-run', 'verbose'])
69 if opt in ('-h', '--help'):
[all …]
/external/python/cpython3/Tools/scripts/
Dfixnotice.py12 -h / --help
15 --oldnotice=file
19 --newnotice=file
23 --dry-run
25 would change. When used with -v, a status will be printed for every
28 -v / --verbose
35 Copyright (c) 1995-2000, Corporation for National Research Initiatives.
36 Copyright (c) 1990-1995, Stichting Mathematisch Centrum.
64 'dry-run', 'verbose'])
69 if opt in ('-h', '--help'):
[all …]
/external/clang/
Dbuild.py9 # http://www.apache.org/licenses/LICENSE-2.0
37 # pylint: disable=missing-docstring
47 # Set True to skip all actions (log only). Controlled by --dry-run.
77 """Proxy for subprocess.check_call with logging and dry-run support."""
85 extra_env = dict(set(kwargs['env'].items()) - set(os.environ.items()))
94 """Proxy for shutil.copy2 with logging and dry-run support."""
102 """Proxy for shutil.copytree with logging and dry-run support."""
110 """Proxy for shutil.rmtree with logging and dry-run support."""
118 """Proxy for os.rename with logging and dry-run support."""
125 """Proxy for os.makedirs with logging and dry-run support."""
[all …]
/external/igt-gpu-tools/runner/
Drunner_tests.c17 * Such variables have to be either non-local or volatile, otherwise their
39 for (i = 0; i < list->size; i++) { in debug_print_executions()
40 struct job_list_entry *entry = &list->entries[i]; in debug_print_executions()
41 igt_debug(" %s\n", entry->binary); in debug_print_executions()
42 for (k = 0; k < entry->subtest_count; ++k) { in debug_print_executions()
43 igt_debug(" %s\n", entry->subtests[k]); in debug_print_executions()
82 igt_subtest_f("job-list-filters-%s-%s", name, multiple ? "multiple" : "normal") { in job_list_filter_test()
86 multiple ? "--multiple-mode" : "--sync", in job_list_filter_test()
89 "path-to-results", in job_list_filter_test()
128 if (strcmp(dirent->d_name, ".") && in clear_directory_fd()
[all …]
/external/oss-fuzz/infra/cifuzz/actions/run_fuzzers/
Daction.yml2 name: 'run-fuzzers'
5 oss-fuzz-project-name:
6 description: 'The OSS-Fuzz project name.'
12 fuzz-seconds:
16 dry-run:
17 description: 'If set, run the action without actually reporting a failure.'
20 description: 'The sanitizer to run the fuzzers with.'
22 run-fuzzers-mode:
24 The mode to run the fuzzers with ("ci" or "batch").
26 "batch" is for non-interactive fuzzing of an entire project.
[all …]
/external/autotest/site_utils/
Dlabel_cleaner.py4 # Use of this source code is governed by a BSD-style license that can be
15 'cros-version' and are not in use.
17 ./label_cleaner.py -p cros-version
19 If '-p' option is not given, we delete labels whose name is exactly
20 'cros-version' and are not in use.
54 # Per-prefix metrics are generated only for the following prefixes. This
58 'cros-version',
59 'fwro-version',
60 'fwrw-version',
126 return set(r[0] for r in rows) - replaced_label_ids
[all …]
/external/selinux/.github/workflows/
Dcifuzz.yml1 ---
6 - master
9 - master
12 runs-on: ubuntu-latest
15 fail-fast: false
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
23 oss-fuzz-project-name: 'selinux'
24 dry-run: false
25 allowed-broken-targets-percentage: 0
[all …]
/external/libbpf/.github/workflows/
Dcifuzz.yml1 ---
2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/
7 - master
10 - master
13 runs-on: ubuntu-latest
16 fail-fast: false
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master
24 oss-fuzz-project-name: 'libbpf'
25 dry-run: false
[all …]
/external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/
Daction.yml2 name: 'build-fuzzers'
3 description: "Builds an OSS-Fuzz project's fuzzers."
5 oss-fuzz-project-name:
6 description: 'Name of the corresponding OSS-Fuzz project.'
12 dry-run:
13 description: 'If set, run the action without actually reporting a failure.'
15 allowed-broken-targets-percentage:
21 project-src-path:
24 bad-build-check:
25 description: "Whether or not OSS-Fuzz's check for bad builds should be done."
[all …]
/external/autotest/site_utils/deployment/prepare/
Dmain.py1 #!/usr/bin/python2 -u
3 # Use of this source code is governed by a BSD-style license that can be
66 logging.info('DRY RUN: Would have run actions %s', opts.actions)
71 if 'stage-usb' in opts.actions:
82 if 'install-test-image' in opts.actions:
89 if 'install-firmware' in opts.actions:
96 if 'verify-recovery-mode' in opts.actions:
103 # TODO (otabek): mix this step with update-label later.
104 if 'setup-labstation' in opts.actions:
111 if 'update-label' in opts.actions:
[all …]
/external/oss-fuzz/infra/cifuzz/external-actions/run_fuzzers/
Daction.yml2 name: 'run-fuzzers'
9 fuzz-seconds:
13 dry-run:
14 description: 'If set, run the action without actually reporting a failure.'
17 description: 'The sanitizer to run the fuzzers with.'
19 run-fuzzers-mode:
21 The mode to run the fuzzers with ("ci" or "batch").
23 "batch" is for non-interactive fuzzing of an entire project.
27 github-token:
32 TODO(https://github.com/google/oss-fuzz/pull/5841#discussion_r639393361):
[all …]

12345678910>>...16