Home
last modified time | relevance | path

Searched +full:upload +full:- +full:coverage (Results 1 – 25 of 189) sorted by relevance

12345678

/external/openthread/.github/workflows/
Dsimulation-1.1.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 packet-verification:
49 runs-on: ubuntu-24.04
57 - name: Harden Runner
58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
[all …]
Dsimulation-1.4.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
43 permissions: # added using https://github.com/step-security/secure-workflows
48 thread-1-4:
49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }}
50 runs-on: ubuntu-22.04
52 CFLAGS: -${{ matrix.arch }}
[all …]
Dposix.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 expects-linux:
49 runs-on: ubuntu-22.04
51 CFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15
52 CXXFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15
54 - name: Harden Runner
[all …]
Dotbr.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 backbone-router:
49 runs-on: ubuntu-22.04
56 COVERAGE: 1
65 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
68 - name: Build OTBR Docker
[all …]
Dotns.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
44 COVERAGE: 1
51 permissions: # added using https://github.com/step-security/secure-workflows
58 runs-on: ubuntu-24.04
60 - name: Harden Runner
61 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
[all …]
Dunit.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
43 permissions: # added using https://github.com/step-security/secure-workflows
48 tcplp-buffering:
49 runs-on: ubuntu-24.04
51 - name: Harden Runner
52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
[all …]
Dtoranj.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 toranj-ncp:
49 name: toranj-ncp-${{ matrix.TORANJ_RADIO }}
50 runs-on: ubuntu-22.04
52 fail-fast: false
56 COVERAGE: 1
[all …]
/external/cn-cbor/cmake/
DCoveralls.cmake25 # Param _COVERAGE_SRCS A list of source files that coverage should be collected for.
26 # Param _COVERALLS_UPLOAD Upload the result to coveralls?
51 …# http://cmake.3232098.n2.nabble.com/Passing-a-CMake-list-quot-as-is-quot-to-a-custom-target-td650…
58 #message("Coverage sources: ${COVERAGE_SRCS}")
63 # Zero the coverage counters.
65 -P "${_CMAKE_SCRIPT_PATH}/CoverallsClear.cmake"
68 COMMAND ${CMAKE_CTEST_COMMAND} --output-on-failure
74 -DCOVERAGE_SRCS="${COVERAGE_SRCS}" # TODO: This is passed like: "a b c", not "a;b;c"
75 -DCOVERALLS_OUTPUT_FILE="${COVERALLS_FILE}"
76 -DCOV_PATH="${PROJECT_BINARY_DIR}"
[all …]
/external/python/python-api-core/.github/workflows/
Dunittest.yml6 - main
9 run-unittests:
10 name: unit${{ matrix.option }}-${{ matrix.python }}
11 …# TODO(https://github.com/googleapis/gapic-generator-python/issues/2303): use `ubuntu-latest` once…
12 # Use ubuntu-22.04 until Python 3.7 is removed from the test matrix
13 …en/actions/using-github-hosted-runners/using-github-hosted-runners/about-github-hosted-runners#sta…
14 runs-on: ubuntu-22.04
19 - "3.7"
20 - "3.8"
21 - "3.9"
[all …]
/external/python/google-api-python-client/
DMakefile2 find googleapiclient samples -name "*.py" | xargs pep8 --ignore=E111,E202
9 .PHONY: coverage
10 coverage: target
11 coverage erase
12 find tests -name "test_*.py" | xargs --max-args=1 coverage run -a runtests.py
13 coverage report
14 coverage html
19 mkdir -p docs/dyn
24 python samples-index.py > ../google-api-python-client.wiki/SampleApps.wiki
28 -rm -rf dist/
[all …]
/external/pigweed/pw_presubmit/py/pw_presubmit/
Dpython_checks.py7 # https://www.apache.org/licenses/LICENSE-2.0
68 def _transform_lcov_file_paths(lcov_file: Path, repo_root: Path) -> str:
90 # pylint: disable=no-member
92 repo_root # type: ignore[attr-defined]
94 # pylint: enable=no-member
100 # pylint: disable=no-member
102 repo_root # type: ignore[attr-defined]
104 # pylint: enable=no-member
116 """Run Python tests with coverage and create reports."""
120 # Find coverage data files
[all …]
/external/cronet/tot/testing/libfuzzer/
Defficient_fuzzing.md3 This relates to fuzzers created using [libfuzzer] not [FuzzTests] - none of this
40 * [Simplifying initialization/cleanup](#Simplifying-initialization-cleanup)
41 * [Minimizing memory usage](#Minimizing-memory-usage)
47 use-cases or fail to account for unexpected scenarios.
55 allocated within the `LLVMFuzzerTestOneInput` function should be de-allocated,
63 works faster for stack-based and static objects than for heap-allocated ones.
70 ### Code coverage
75 * Review aggregated Chrome coverage from recent runs by checking the [fuzzing
76 coverage] report. This report can provide insight on how to improve code
77 coverage.
[all …]
DlibFuzzer_integration.md10 * [Buildbot] - status of all libFuzzer builds.
11 * [ClusterFuzz Fuzzer Stats] - fuzzing metrics.
12 * [Code Coverage] - code coverage of libFuzzer targets in Chrome.
13 * [ClusterFuzz libFuzzer Logs] - individual fuzz target run logs.
14 * [Corpus GCS Bucket] - current corpus for each fuzz target. Can be used to
15 upload bootstrapped corpus.
29 effect of parasitic coverage.
31 provides links to crashes and coverage reports.
41 gsutil -m cp -r gs://clusterfuzz-corpus/libfuzzer/<fuzz_target> local_corpus_dir
45 [Code Coverage]: https://analysis.chromium.org/coverage/p/chromium?platform=fuzz&test_suite_type=an…
[all …]
Dgetting_started_with_libfuzzer.md7 Chrome, but it still works well - read on.
23 a case-insensitive pattern that matches file names containing the
135 that you run the meta-builder tool using [GN config] that corresponds to the
141 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer
143 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/libfuzzer
145 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer
147 python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\libfuzzer
155 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Linux ASan' out/libfuzzer
157 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Chrome OS ASan' out/libfuzzer
159 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Mac ASan' out/libfuzzer
[all …]
/external/cronet/stable/testing/libfuzzer/
Defficient_fuzzing.md3 This relates to fuzzers created using [libfuzzer] not [FuzzTests] - none of this
40 * [Simplifying initialization/cleanup](#Simplifying-initialization-cleanup)
41 * [Minimizing memory usage](#Minimizing-memory-usage)
47 use-cases or fail to account for unexpected scenarios.
55 allocated within the `LLVMFuzzerTestOneInput` function should be de-allocated,
63 works faster for stack-based and static objects than for heap-allocated ones.
70 ### Code coverage
75 * Review aggregated Chrome coverage from recent runs by checking the [fuzzing
76 coverage] report. This report can provide insight on how to improve code
77 coverage.
[all …]
DlibFuzzer_integration.md10 * [Buildbot] - status of all libFuzzer builds.
11 * [ClusterFuzz Fuzzer Stats] - fuzzing metrics.
12 * [Code Coverage] - code coverage of libFuzzer targets in Chrome.
13 * [ClusterFuzz libFuzzer Logs] - individual fuzz target run logs.
14 * [Corpus GCS Bucket] - current corpus for each fuzz target. Can be used to
15 upload bootstrapped corpus.
29 effect of parasitic coverage.
31 provides links to crashes and coverage reports.
41 gsutil -m cp -r gs://clusterfuzz-corpus/libfuzzer/<fuzz_target> local_corpus_dir
45 [Code Coverage]: https://analysis.chromium.org/coverage/p/chromium?platform=fuzz&test_suite_type=an…
[all …]
Dgetting_started_with_libfuzzer.md7 Chrome, but it still works well - read on.
23 a case-insensitive pattern that matches file names containing the
135 that you run the meta-builder tool using [GN config] that corresponds to the
141 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer
143 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/libfuzzer
145 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer
147 python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\libfuzzer
155 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Linux ASan' out/libfuzzer
157 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Chrome OS ASan' out/libfuzzer
159 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Mac ASan' out/libfuzzer
[all …]
/external/python/dateutil/
Dtox.ini10 coverage,
17 setenv = COVERAGE_FILE={toxworkdir}/.coverage.{envname}
19 commands = python -m pytest {posargs: "{toxinidir}/dateutil/test" --cov-config="{toxinidir}/tox.ini…
20 deps = -rrequirements-dev.txt
22 [testenv:coverage]
23 description = combine coverage data and create reports argument
24 deps = coverage argument
27 setenv = COVERAGE_FILE=.coverage argument
28 commands = coverage erase argument
29 coverage combine
[all …]
/external/harfbuzz_ng/.github/workflows/
Dmacos-ci.yml1 name: macos-ci
14 runs-on: macos-latest
17 - name: Checkout
19 - name: Setup Ccache
20 uses: hendrikmuhs/ccache-action@ed74d11c0b343532753ecead8a951bb09bb34bc9 # v1.2.14
22 key: ${{ github.job }}-${{ runner.os }}-${{ runner.arch }}
23 - name: Install Dependencies
27 brew rm -f pkg-config@0.29.2
32 gobject-introspection \
38 - name: Setup Python
[all …]
Dlinux-ci.yml1 name: linux-ci
15 runs-on: ubuntu-20.04
18 - name: Checkout
20 - name: Setup Ccache
21 uses: hendrikmuhs/ccache-action@ed74d11c0b343532753ecead8a951bb09bb34bc9 # v1.2.14
23 key: ${{ github.job }}-${{ runner.os }}-${{ runner.arch }}
24 - name: Install Dependencies
26 sudo apt-get update
27 sudo apt-get install \
29 gobject-introspection \
[all …]
/external/fonttools/
Dtox.ini3 envlist = lint, py3{8,9,10,11,12}-cov, htmlcov
10 # We need this to be able to install skia-pathops on Linux, which uses a
12 # https://github.com/tox-dev/tox/issues/791#issuecomment-518713438
14 # building lxml from source takes too long on CI, force it to download pre-compiled
15 # wheel or fail if none is found with --only-binary=lxml
16 install_command = python -m pip install --only-binary=lxml {opts} {packages}
18 cov: coverage>=4.3
20 pytest-randomly
21 # add -noextra to tox -e to skip installing extras and only test the core fonttools
22 !noextra: -rrequirements.txt
[all …]
/external/expat/.github/workflows/
Dcoverage.yml8 # Copyright (c) 2021-2024 Sebastian Pipping <sebastian@pipping.org>
10 # Copyright (c) 2024 Dag-Erling Smørgrav <des@des.dev>
32 name: Collect test coverage
38 - cron: '0 2 * * 5' # Every Friday at 2am
46 name: Collect test coverage
47 runs-on: ubuntu-22.04
49 CFLAGS: -g3 -pipe
51 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
52 - name: Install build dependencies
53 run: |-
[all …]
/external/skia/infra/bots/recipe_modules/builder_name_schema/examples/
Dfull.py2 # Use of this source code is governed by a BSD-style license that can be
14 'Build-Debian10-Clang-x64-Release-Android',
15 'Upload-Test-Debian10-Clang-GCE-CPU-AVX2-x86_64-Debug-Shard_12-Coverage',
50 api.builder_name_schema.DictForBuilderName('Build-')
56 'Build-Debian10-Clang-x64-Release-Android-Bogus')
62 'Bogus-Debian10-Clang-x64-Release-Android')
67 api.builder_name_schema.MakeBuilderName(role='Upload')
73 'role': 'Upload',
74 'sub-role-1': 'fake',
/external/fonttools/.github/workflows/
Dtest.yml14 TOX_OPTIONS: -vv
18 runs-on: ubuntu-latest
19 # https://github.community/t/github-actions-does-not-respect-skip-ci/17325/8
22 - uses: actions/checkout@v4
23 - name: Set up Python 3.x
24 uses: actions/setup-python@v5
26 python-version: "3.x"
27 - name: Install packages
29 - name: Run Tox
30 run: tox $TOX_OPTIONS -e lint,package_readme
[all …]
/external/crosvm/infra/recipes/
Dbuild_linux.proto2 // Use of this source code is governed by a BSD-style license that can be
15 // [deprecated] Whether or not to test the crosvm-direct feature.
21 // [deprecated] Whether or not to generate and upload test coverage.
22 optional bool coverage = 5;

12345678