Home
last modified time | relevance | path

Searched +full:- +full:czf (Results 1 – 25 of 47) sorted by relevance

12

/external/grpc-grpc/tools/bazelify_tests/
Dgrpc_repo_archive.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -e
24 mkdir -p "${ARCHIVES_DIR}"
25 rm -rf "${ARCHIVES_DIR}"/*
44 # extract STABLE_GIT_COMMIT from stable-status.txt
45 …MMIT_FROM_STABLE_STATUS=$(grep ^STABLE_GRPC_GIT_COMMIT bazel-out/stable-status.txt | cut -d' ' -f2)
49 … gRPC git commit from the bazel workspace. Make sure you invoke bazel with --workspace_status_comm…
53 …E_STATUS=$(grep ^STABLE_GRPC_UNCOMMITED_PATCH_CHECKSUM bazel-out/stable-status.txt | cut -d' ' -f2)
54 …_STABLE_STATUS=$(grep ^STABLE_GRPC_GIT_WORKSPACE_DIRTY bazel-out/stable-status.txt | cut -d' ' -f2)
58 if [ "${GRPC_GIT_COMMIT_FROM_STABLE_STATUS}" != "$(git rev-parse HEAD)" ]
[all …]
/external/libxml2/.gitlab-ci/
Dtest_cmake.sh3 set -e
5 CFLAGS="-Werror $CFLAGS" \
7 -DBUILD_SHARED_LIBS=$BUILD_SHARED_LIBS \
8 -DCMAKE_INSTALL_PREFIX=libxml2-install \
9 -DCMAKE_BUILD_TYPE=RelWithDebInfo \
10 -S . -B libxml2-build
11 cmake --build libxml2-build --target install
13 (cd libxml2-build && ctest -VV)
15 mkdir -p libxml2-install/share/libxml2
16 cp Copyright libxml2-install/share/libxml2
[all …]
/external/google-auth-library-java/oauth2_http/testresources/
Dservice_account_keys.json2-----BEGIN CERTIFICATE-----\nMIIDPDCCAiSgAwIBAgIIFJsPvyc/ZSUwDQYJKoZIhvcNAQEFBQAwQTE/MD0GA1UE\nAxM…
3-----BEGIN CERTIFICATE-----\nMIIC+jCCAeKgAwIBAgIIIwRR4+AftjswDQYJKoZIhvcNAQEFBQAwIDEeMBwGA1UE\nAxM…
/external/autotest/client/cros/crash/crasher/
DMakefile2 # Use of this source code is governed by a BSD-style license that can be
8 # Use a non-standard extension to avoid the AUTOTEST_MASK that intends to
10 TGZ = crasher.tgz-unmasked
16 tar czf $(TGZ) $^
17 rm -f $(BINS)
20 $(CXX) $(CXXFLAGS) -o $@ $^
23 $(CXX) $(CXXFLAGS) -c $< -o $@
/external/tpm2-tss/.ci/
Dcoverity.run2 # SPDX-License-Identifier: BSD-3-Clause
4 source $TRAVIS_BUILD_DIR/.ci/docker-prelude.sh
6 export PATH=$PATH:$TRAVIS_BUILD_DIR/cov-analysis/bin
14 echo "coverity.run invoked for non-coverity branch $TRAVIS_BRANCH...exiting!"
19 rm -fr $TRAVIS_BUILD_DIR/cov-int
21 cov-build --dir $TRAVIS_BUILD_DIR/cov-int make -j $(nproc)
24 rm -fr README
25 export AUTHOR="$(git log -1 $TRAVIS_COMMIT --pretty="%aN")"
28 echo "Project: 01org/TPM2.0-TSS" >> README
29 echo "Build-Version: $TRAVIS_COMMIT" >> README
[all …]
/external/python/google-api-python-client/
DMakefile2 find googleapiclient samples -name "*.py" | xargs pep8 --ignore=E111,E202
12 find tests -name "test_*.py" | xargs --max-args=1 coverage run -a runtests.py
19 mkdir -p docs/dyn
24 python samples-index.py > ../google-api-python-client.wiki/SampleApps.wiki
28 -rm -rf dist/
29 -sudo rm -rf dist/
30 -rm -rf snapshot/
31 -sudo rm -rf snapshot/
34 cd snapshot; python setup.py sdist --formats=gztar,zip bdist_wheel --universal
35 …cd snapshot; tar czf google-api-python-client-samples-$(shell python setup.py --version).tar.gz sa…
[all …]
/external/nanopb-c/tools/
Dmake_mac_package.sh6 # Requires: protobuf, python-protobuf, pyinstaller
8 set -e
9 set -x
11 VERSION=`git describe --always`-macosx-x86
14 rm -rf $DEST
15 mkdir -p $DEST
18 git archive HEAD | tar x -C $DEST
21 make -BC $DEST/generator/proto
25 mv $DEST/generator/dist/nanopb_generator $DEST/generator-bin
28 rm -rf $DEST/generator/dist $DEST/generator/build $DEST/generator/nanopb_generator.spec
[all …]
Dmake_linux_package.sh6 # Requires: protobuf, python-protobuf, pyinstaller
8 set -e
9 set -x
11 VERSION=`git describe --always`-linux-x86
14 rm -rf $DEST
15 mkdir -p $DEST
18 git archive HEAD | tar x -C $DEST
21 make -BC $DEST/generator/proto
25 mv $DEST/generator/dist/nanopb_generator $DEST/generator-bin
28 rm -rf $DEST/generator/dist $DEST/generator/build $DEST/generator/nanopb_generator.spec
[all …]
/external/googleapis/google/maps/
Dpostprocessing.bzl6 """Target to build a post-processed ads-specific GAPIC assembly package.
8 Explodes a GAPIC assembly package, runs language-specific post-processing, and repackages.
11 produced by a gapic-generator build target.
18 {{language}}_assembly_pkg target produced by gapic-generator
19 language: the programming language to post-process
21 post-processin script of the form `postprocessing_{language}.sh
27 set -eu
31 tar czf $@ %s
51 The first element's target (i.e.- the part after the ":"), else None if empty.
/external/angle/third_party/spirv-tools/src/kokoro/scripts/macos/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
21 set -x
24 SRC=$PWD/github/SPIRV-Tools
30 git config --global --add safe.directory $SRC
33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip
34 unzip -q ninja-mac.zip
39 python3 utils/git-sync-deps --treeless
44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
47 -GNinja \
[all …]
/external/deqp-deps/SPIRV-Tools/kokoro/scripts/macos/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
21 set -x
24 SRC=$PWD/github/SPIRV-Tools
30 git config --global --add safe.directory $SRC
33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip
34 unzip -q ninja-mac.zip
39 python3 utils/git-sync-deps --treeless
44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
47 -GNinja \
[all …]
/external/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/macos/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
21 set -x
24 SRC=$PWD/github/SPIRV-Tools
30 git config --global --add safe.directory $SRC
33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip
34 unzip -q ninja-mac.zip
39 python3 utils/git-sync-deps --treeless
44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
47 -GNinja \
[all …]
/external/igt-gpu-tools/tests/
Dddx_intel_after_fbdev6 whoami | grep -q root || {
12 find /tmp/ -name .X*lock 2>/dev/null | grep -q X && {
17 TMPDIR=$(mktemp -d /tmp/igt.XXXX) || {
37 dmesg -c > $TMPDIR/dmesg.1.before.fbdev
41 xinit -- /usr/bin/X -config $TMPDIR/xorg.conf.fbdev &
43 if [ -f `which intel_reg` ]; then
49 dmesg -c > $TMPDIR/dmesg.2.after.fbdev.before.intel
55 xinit -- /usr/bin/X -config $TMPDIR/xorg.conf.intel &
57 if [ -f `which intel_reg` ]; then
63 dmesg -c > $TMPDIR/dmesg.3.after.intel
[all …]
/external/perfetto/tools/
Drepackage_llvm_demangler.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -eu
18 # For perfetto maintainers. Pulls out demangling-related sources out of
19 # llvm-project and repackages them as a single tar archive. This works around
20 # the fact that gitiles, when generating an on-demand archive, uses a current
26 # Then upload the tar with "gsutil cp -n -a public-read ... gs://perfetto/...",
27 # and update install-build-deps.
31 WORK_DIR=$(mktemp -d)
34 CC_DIR="llvm-project/llvm/lib/Demangle"
35 H_DIR="llvm-project/llvm/include/llvm/Demangle"
[all …]
/external/bazelbuild-platforms/distro/
Dmakerel.sh3 if [[ ! -f WORKSPACE ]] ; then
8 if [[ ! -f version.bzl ]] ; then
12 version=$(sed -n -e 's/^version *= *"\(.*\)".*$/\1/p' version.bzl)
21 dist_file="/tmp/platforms-${version}.tar.gz"
22 tar czf "$dist_file" BUILD LICENSE MODULE.bazel WORKSPACE WORKSPACE.bzlmod version.bzl cpu os host
23 sha256=$(shasum -a256 "$dist_file" | cut -d' ' -f1)
25 path="github.com/bazelbuild/platforms/releases/download/$version/platforms-$version.tar.gz"
55 "archive": "platforms-$version.tar.gz",
64 gsutil cp /tmp/platforms-$version.tar.gz "gs://bazel-mirror/${path}"
65 gsutil setmeta -h "Cache-Control: public, max-age=31536000" "gs://bazel-mirror/${path}"
/external/rust/android-crates-io/crates/coset/scripts/
Dbuild-gh-pages.sh8 # http://www.apache.org/licenses/LICENSE-2.0
16 set -o errexit
17 set -o nounset
18 set -o xtrace
19 set -o pipefail
21 # Update the gh-pages branch. Note that `cargo doc` is **not deterministic** so
23 readonly RUST_BRANCH=${1:-main}
24 readonly RUST_GH_BRANCH=gh-pages
26 if [ -z "${FORCE+x}" ]; then
27 …readonly PREV_COMMIT=$(git log --oneline -n 1 ${RUST_GH_BRANCH} | sed 's/.*branch at \([0-9a-f]*\)…
[all …]
/external/AFLplusplus/utils/distributed_fuzzing/
Dsync_script.sh3 # american fuzzy lop++ - fuzzer synchronization tool
4 # --------------------------------------------------
9 # Copyright 2019-2024 AFLplusplus Project. All rights reserved.
15 # http://www.apache.org/licenses/LICENSE-2.0
19 # - Edit FUZZ_HOSTS, FUZZ_DOMAIN, FUZZ_USER, and SYNC_DIR to reflect your
22 # - Make sure that the system you are running this on can log into FUZZ_HOSTS
25 # - Make sure that every fuzzer is running with -o pointing to SYNC_DIR and -S
27 # by some host-local fuzzer ID.
42 # We only capture -M main nodes, set the name to your chosen naming scheme
50 if [ "$PWD" = "/tmp" -o "$PWD" = "/var/tmp" ]; then
[all …]
/external/sandboxed-api/.github/workflows/
Dgenerator-tool.yml1 name: generator-tool
5 runs-on: ubuntu-latest
8 - uses: actions/checkout@v3
10 - name: Cache dependencies
13 key: debian-10.13-clang16
17 - name: Install build tools
19 apt-get update
21 apt-get install -qy --no-install-recommends \
22 build-essential \
23 ca-certificates \
[all …]
/external/grpc-grpc/tools/dockerfile/grpc_dist_proto/
DDockerfile7 # http://www.apache.org/licenses/LICENSE-2.0
22 RUN apt-get update && apt-get -y install libgtest-dev
25 RUN mkdir -p /var/local/git
31 ./configure --disable-shared --prefix=/tmp/protoc_static \
32 LDFLAGS="-lgcc_eh -static-libgcc -static-libstdc++" && \
33 make -j12 && make check && make install
38 ./configure --prefix=/usr/local && \
39 make -j12 && make check && make install
44 RUN LDFLAGS=-static make plugins
47 RUN mkdir /tmp/proto-bins_$(cat /version.txt)_linux-$(uname -m)
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/dockerfile/grpc_dist_proto/
DDockerfile7 # http://www.apache.org/licenses/LICENSE-2.0
22 RUN apt-get update && apt-get -y install libgtest-dev
25 RUN mkdir -p /var/local/git
31 ./configure --disable-shared --prefix=/tmp/protoc_static \
32 LDFLAGS="-lgcc_eh -static-libgcc -static-libstdc++" && \
33 make -j12 && make check && make install
38 ./configure --prefix=/usr/local && \
39 make -j12 && make check && make install
44 RUN LDFLAGS=-static make plugins
47 RUN mkdir /tmp/proto-bins_$(cat /version.txt)_linux-$(uname -m)
[all …]
/external/skia/fuzz/
Dcoverage4 # Use of this source code is governed by a BSD-style license that can be
7 if [ -z "$1" ]; then
8 cat <<-EOM
10 $0 [afl-out-loc]
13 $0 ~/afl-out
14 where afl-out is the directory containing all the output of the afl-fuzzers.
15 You can typically ssh into skia-fuzzer-be-1 and skia-fuzzer-be-2 and run
16 tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/*/fuzzer0/queue
23 set -x
24 set -e
[all …]
/external/libpcap/
D.ci-coverity-scan-build.sh3 set -e
7 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi…
8 #[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must b…
9 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e…
10 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
13 TOOL_ARCHIVE=/tmp/cov-analysis-${PLATFORM}.tgz
15 TOOL_BASE=/tmp/coverity-scan-analysis
20 AUTH_RES=$(curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN"…
25 …AUTH=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['uplo…
29 …WHEN=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next…
[all …]
/external/tcpdump/
D.ci-coverity-scan-build.sh3 set -e
7 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi…
8 #[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must b…
9 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e…
10 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
13 TOOL_ARCHIVE=/tmp/cov-analysis-${PLATFORM}.tgz
15 TOOL_BASE=/tmp/coverity-scan-analysis
20 AUTH_RES=$(curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN"…
25 …AUTH=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['uplo…
29 …WHEN=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next…
[all …]
/external/pytorch/.github/workflows/
Dcreate_release.yml6 - main
7 - release/*
10 - v[0-9]+.[0-9]+.[0-9]+
11 # Release candidate tags look like: v1.11.0-rc1
12 - v[0-9]+.[0-9]+.[0-9]+-rc[0-9]+
22 runs-on: ubuntu-latest
23 # https://github.com/softprops/action-gh-release?tab=readme-ov-file#permissions
29 - uses: malfet/checkout@silent-checkout
33 - name: Fake name for PRs
35 run: echo "PT_GITHUB_REF=refs/tags/pr-tag" >> "$GITHUB_ENV"
[all …]
/external/libbpf/scripts/
Dcoverity.sh5 set -e
8 echo -e "\033[33;1mNote: COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN are available on Projec…
9 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi…
10 [ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must be…
11 [ -z "$COVERITY_SCAN_BRANCH_PATTERN" ] && echo "ERROR: COVERITY_SCAN_BRANCH_PATTERN must be set" &&…
12 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e…
13 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
18 TOOL_ARCHIVE=/var//tmp/cov-analysis-${PLATFORM}.tgz
20 TOOL_BASE=/var/tmp/coverity-scan-analysis
26 echo -e "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m"
[all …]

12