Searched +full:- +full:czf (Results 1 – 25 of 47) sorted by relevance
12
/external/grpc-grpc/tools/bazelify_tests/ |
D | grpc_repo_archive.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -e 24 mkdir -p "${ARCHIVES_DIR}" 25 rm -rf "${ARCHIVES_DIR}"/* 44 # extract STABLE_GIT_COMMIT from stable-status.txt 45 …MMIT_FROM_STABLE_STATUS=$(grep ^STABLE_GRPC_GIT_COMMIT bazel-out/stable-status.txt | cut -d' ' -f2) 49 … gRPC git commit from the bazel workspace. Make sure you invoke bazel with --workspace_status_comm… 53 …E_STATUS=$(grep ^STABLE_GRPC_UNCOMMITED_PATCH_CHECKSUM bazel-out/stable-status.txt | cut -d' ' -f2) 54 …_STABLE_STATUS=$(grep ^STABLE_GRPC_GIT_WORKSPACE_DIRTY bazel-out/stable-status.txt | cut -d' ' -f2) 58 if [ "${GRPC_GIT_COMMIT_FROM_STABLE_STATUS}" != "$(git rev-parse HEAD)" ] [all …]
|
/external/libxml2/.gitlab-ci/ |
D | test_cmake.sh | 3 set -e 5 CFLAGS="-Werror $CFLAGS" \ 7 -DBUILD_SHARED_LIBS=$BUILD_SHARED_LIBS \ 8 -DCMAKE_INSTALL_PREFIX=libxml2-install \ 9 -DCMAKE_BUILD_TYPE=RelWithDebInfo \ 10 -S . -B libxml2-build 11 cmake --build libxml2-build --target install 13 (cd libxml2-build && ctest -VV) 15 mkdir -p libxml2-install/share/libxml2 16 cp Copyright libxml2-install/share/libxml2 [all …]
|
/external/google-auth-library-java/oauth2_http/testresources/ |
D | service_account_keys.json | 2 …-----BEGIN CERTIFICATE-----\nMIIDPDCCAiSgAwIBAgIIFJsPvyc/ZSUwDQYJKoZIhvcNAQEFBQAwQTE/MD0GA1UE\nAxM… 3 …-----BEGIN CERTIFICATE-----\nMIIC+jCCAeKgAwIBAgIIIwRR4+AftjswDQYJKoZIhvcNAQEFBQAwIDEeMBwGA1UE\nAxM…
|
/external/autotest/client/cros/crash/crasher/ |
D | Makefile | 2 # Use of this source code is governed by a BSD-style license that can be 8 # Use a non-standard extension to avoid the AUTOTEST_MASK that intends to 10 TGZ = crasher.tgz-unmasked 16 tar czf $(TGZ) $^ 17 rm -f $(BINS) 20 $(CXX) $(CXXFLAGS) -o $@ $^ 23 $(CXX) $(CXXFLAGS) -c $< -o $@
|
/external/tpm2-tss/.ci/ |
D | coverity.run | 2 # SPDX-License-Identifier: BSD-3-Clause 4 source $TRAVIS_BUILD_DIR/.ci/docker-prelude.sh 6 export PATH=$PATH:$TRAVIS_BUILD_DIR/cov-analysis/bin 14 echo "coverity.run invoked for non-coverity branch $TRAVIS_BRANCH...exiting!" 19 rm -fr $TRAVIS_BUILD_DIR/cov-int 21 cov-build --dir $TRAVIS_BUILD_DIR/cov-int make -j $(nproc) 24 rm -fr README 25 export AUTHOR="$(git log -1 $TRAVIS_COMMIT --pretty="%aN")" 28 echo "Project: 01org/TPM2.0-TSS" >> README 29 echo "Build-Version: $TRAVIS_COMMIT" >> README [all …]
|
/external/python/google-api-python-client/ |
D | Makefile | 2 find googleapiclient samples -name "*.py" | xargs pep8 --ignore=E111,E202 12 find tests -name "test_*.py" | xargs --max-args=1 coverage run -a runtests.py 19 mkdir -p docs/dyn 24 python samples-index.py > ../google-api-python-client.wiki/SampleApps.wiki 28 -rm -rf dist/ 29 -sudo rm -rf dist/ 30 -rm -rf snapshot/ 31 -sudo rm -rf snapshot/ 34 cd snapshot; python setup.py sdist --formats=gztar,zip bdist_wheel --universal 35 …cd snapshot; tar czf google-api-python-client-samples-$(shell python setup.py --version).tar.gz sa… [all …]
|
/external/nanopb-c/tools/ |
D | make_mac_package.sh | 6 # Requires: protobuf, python-protobuf, pyinstaller 8 set -e 9 set -x 11 VERSION=`git describe --always`-macosx-x86 14 rm -rf $DEST 15 mkdir -p $DEST 18 git archive HEAD | tar x -C $DEST 21 make -BC $DEST/generator/proto 25 mv $DEST/generator/dist/nanopb_generator $DEST/generator-bin 28 rm -rf $DEST/generator/dist $DEST/generator/build $DEST/generator/nanopb_generator.spec [all …]
|
D | make_linux_package.sh | 6 # Requires: protobuf, python-protobuf, pyinstaller 8 set -e 9 set -x 11 VERSION=`git describe --always`-linux-x86 14 rm -rf $DEST 15 mkdir -p $DEST 18 git archive HEAD | tar x -C $DEST 21 make -BC $DEST/generator/proto 25 mv $DEST/generator/dist/nanopb_generator $DEST/generator-bin 28 rm -rf $DEST/generator/dist $DEST/generator/build $DEST/generator/nanopb_generator.spec [all …]
|
/external/googleapis/google/maps/ |
D | postprocessing.bzl | 6 """Target to build a post-processed ads-specific GAPIC assembly package. 8 Explodes a GAPIC assembly package, runs language-specific post-processing, and repackages. 11 produced by a gapic-generator build target. 18 {{language}}_assembly_pkg target produced by gapic-generator 19 language: the programming language to post-process 21 post-processin script of the form `postprocessing_{language}.sh 27 set -eu 31 tar czf $@ %s 51 The first element's target (i.e.- the part after the ":"), else None if empty.
|
/external/angle/third_party/spirv-tools/src/kokoro/scripts/macos/ |
D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 21 set -x 24 SRC=$PWD/github/SPIRV-Tools 30 git config --global --add safe.directory $SRC 33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip 34 unzip -q ninja-mac.zip 39 python3 utils/git-sync-deps --treeless 44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 47 -GNinja \ [all …]
|
/external/deqp-deps/SPIRV-Tools/kokoro/scripts/macos/ |
D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 21 set -x 24 SRC=$PWD/github/SPIRV-Tools 30 git config --global --add safe.directory $SRC 33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip 34 unzip -q ninja-mac.zip 39 python3 utils/git-sync-deps --treeless 44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 47 -GNinja \ [all …]
|
/external/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/macos/ |
D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 21 set -x 24 SRC=$PWD/github/SPIRV-Tools 30 git config --global --add safe.directory $SRC 33 wget -q https://github.com/ninja-build/ninja/releases/download/v1.8.2/ninja-mac.zip 34 unzip -q ninja-mac.zip 39 python3 utils/git-sync-deps --treeless 44 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 47 -GNinja \ [all …]
|
/external/igt-gpu-tools/tests/ |
D | ddx_intel_after_fbdev | 6 whoami | grep -q root || { 12 find /tmp/ -name .X*lock 2>/dev/null | grep -q X && { 17 TMPDIR=$(mktemp -d /tmp/igt.XXXX) || { 37 dmesg -c > $TMPDIR/dmesg.1.before.fbdev 41 xinit -- /usr/bin/X -config $TMPDIR/xorg.conf.fbdev & 43 if [ -f `which intel_reg` ]; then 49 dmesg -c > $TMPDIR/dmesg.2.after.fbdev.before.intel 55 xinit -- /usr/bin/X -config $TMPDIR/xorg.conf.intel & 57 if [ -f `which intel_reg` ]; then 63 dmesg -c > $TMPDIR/dmesg.3.after.intel [all …]
|
/external/perfetto/tools/ |
D | repackage_llvm_demangler.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -eu 18 # For perfetto maintainers. Pulls out demangling-related sources out of 19 # llvm-project and repackages them as a single tar archive. This works around 20 # the fact that gitiles, when generating an on-demand archive, uses a current 26 # Then upload the tar with "gsutil cp -n -a public-read ... gs://perfetto/...", 27 # and update install-build-deps. 31 WORK_DIR=$(mktemp -d) 34 CC_DIR="llvm-project/llvm/lib/Demangle" 35 H_DIR="llvm-project/llvm/include/llvm/Demangle" [all …]
|
/external/bazelbuild-platforms/distro/ |
D | makerel.sh | 3 if [[ ! -f WORKSPACE ]] ; then 8 if [[ ! -f version.bzl ]] ; then 12 version=$(sed -n -e 's/^version *= *"\(.*\)".*$/\1/p' version.bzl) 21 dist_file="/tmp/platforms-${version}.tar.gz" 22 tar czf "$dist_file" BUILD LICENSE MODULE.bazel WORKSPACE WORKSPACE.bzlmod version.bzl cpu os host 23 sha256=$(shasum -a256 "$dist_file" | cut -d' ' -f1) 25 path="github.com/bazelbuild/platforms/releases/download/$version/platforms-$version.tar.gz" 55 "archive": "platforms-$version.tar.gz", 64 gsutil cp /tmp/platforms-$version.tar.gz "gs://bazel-mirror/${path}" 65 gsutil setmeta -h "Cache-Control: public, max-age=31536000" "gs://bazel-mirror/${path}"
|
/external/rust/android-crates-io/crates/coset/scripts/ |
D | build-gh-pages.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 set -o errexit 17 set -o nounset 18 set -o xtrace 19 set -o pipefail 21 # Update the gh-pages branch. Note that `cargo doc` is **not deterministic** so 23 readonly RUST_BRANCH=${1:-main} 24 readonly RUST_GH_BRANCH=gh-pages 26 if [ -z "${FORCE+x}" ]; then 27 …readonly PREV_COMMIT=$(git log --oneline -n 1 ${RUST_GH_BRANCH} | sed 's/.*branch at \([0-9a-f]*\)… [all …]
|
/external/AFLplusplus/utils/distributed_fuzzing/ |
D | sync_script.sh | 3 # american fuzzy lop++ - fuzzer synchronization tool 4 # -------------------------------------------------- 9 # Copyright 2019-2024 AFLplusplus Project. All rights reserved. 15 # http://www.apache.org/licenses/LICENSE-2.0 19 # - Edit FUZZ_HOSTS, FUZZ_DOMAIN, FUZZ_USER, and SYNC_DIR to reflect your 22 # - Make sure that the system you are running this on can log into FUZZ_HOSTS 25 # - Make sure that every fuzzer is running with -o pointing to SYNC_DIR and -S 27 # by some host-local fuzzer ID. 42 # We only capture -M main nodes, set the name to your chosen naming scheme 50 if [ "$PWD" = "/tmp" -o "$PWD" = "/var/tmp" ]; then [all …]
|
/external/sandboxed-api/.github/workflows/ |
D | generator-tool.yml | 1 name: generator-tool 5 runs-on: ubuntu-latest 8 - uses: actions/checkout@v3 10 - name: Cache dependencies 13 key: debian-10.13-clang16 17 - name: Install build tools 19 apt-get update 21 apt-get install -qy --no-install-recommends \ 22 build-essential \ 23 ca-certificates \ [all …]
|
/external/grpc-grpc/tools/dockerfile/grpc_dist_proto/ |
D | Dockerfile | 7 # http://www.apache.org/licenses/LICENSE-2.0 22 RUN apt-get update && apt-get -y install libgtest-dev 25 RUN mkdir -p /var/local/git 31 ./configure --disable-shared --prefix=/tmp/protoc_static \ 32 LDFLAGS="-lgcc_eh -static-libgcc -static-libstdc++" && \ 33 make -j12 && make check && make install 38 ./configure --prefix=/usr/local && \ 39 make -j12 && make check && make install 44 RUN LDFLAGS=-static make plugins 47 RUN mkdir /tmp/proto-bins_$(cat /version.txt)_linux-$(uname -m) [all …]
|
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/dockerfile/grpc_dist_proto/ |
D | Dockerfile | 7 # http://www.apache.org/licenses/LICENSE-2.0 22 RUN apt-get update && apt-get -y install libgtest-dev 25 RUN mkdir -p /var/local/git 31 ./configure --disable-shared --prefix=/tmp/protoc_static \ 32 LDFLAGS="-lgcc_eh -static-libgcc -static-libstdc++" && \ 33 make -j12 && make check && make install 38 ./configure --prefix=/usr/local && \ 39 make -j12 && make check && make install 44 RUN LDFLAGS=-static make plugins 47 RUN mkdir /tmp/proto-bins_$(cat /version.txt)_linux-$(uname -m) [all …]
|
/external/skia/fuzz/ |
D | coverage | 4 # Use of this source code is governed by a BSD-style license that can be 7 if [ -z "$1" ]; then 8 cat <<-EOM 10 $0 [afl-out-loc] 13 $0 ~/afl-out 14 where afl-out is the directory containing all the output of the afl-fuzzers. 15 You can typically ssh into skia-fuzzer-be-1 and skia-fuzzer-be-2 and run 16 tar -czf afl-out.tar.gz /mnt/ssd0/fuzzes/afl-out/*/fuzzer0/queue 23 set -x 24 set -e [all …]
|
/external/libpcap/ |
D | .ci-coverity-scan-build.sh | 3 set -e 7 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi… 8 #[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must b… 9 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e… 10 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1 13 TOOL_ARCHIVE=/tmp/cov-analysis-${PLATFORM}.tgz 15 TOOL_BASE=/tmp/coverity-scan-analysis 20 AUTH_RES=$(curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN"… 25 …AUTH=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['uplo… 29 …WHEN=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next… [all …]
|
/external/tcpdump/ |
D | .ci-coverity-scan-build.sh | 3 set -e 7 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi… 8 #[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must b… 9 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e… 10 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1 13 TOOL_ARCHIVE=/tmp/cov-analysis-${PLATFORM}.tgz 15 TOOL_BASE=/tmp/coverity-scan-analysis 20 AUTH_RES=$(curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN"… 25 …AUTH=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['uplo… 29 …WHEN=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next… [all …]
|
/external/pytorch/.github/workflows/ |
D | create_release.yml | 6 - main 7 - release/* 10 - v[0-9]+.[0-9]+.[0-9]+ 11 # Release candidate tags look like: v1.11.0-rc1 12 - v[0-9]+.[0-9]+.[0-9]+-rc[0-9]+ 22 runs-on: ubuntu-latest 23 # https://github.com/softprops/action-gh-release?tab=readme-ov-file#permissions 29 - uses: malfet/checkout@silent-checkout 33 - name: Fake name for PRs 35 run: echo "PT_GITHUB_REF=refs/tags/pr-tag" >> "$GITHUB_ENV" [all …]
|
/external/libbpf/scripts/ |
D | coverity.sh | 5 set -e 8 echo -e "\033[33;1mNote: COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN are available on Projec… 9 [ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exi… 10 [ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must be… 11 [ -z "$COVERITY_SCAN_BRANCH_PATTERN" ] && echo "ERROR: COVERITY_SCAN_BRANCH_PATTERN must be set" &&… 12 [ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && e… 13 [ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1 18 TOOL_ARCHIVE=/var//tmp/cov-analysis-${PLATFORM}.tgz 20 TOOL_BASE=/var/tmp/coverity-scan-analysis 26 echo -e "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m" [all …]
|
12