Searched refs:allowed (Results 1 – 25 of 49) sorted by relevance
12
/build/make/core/ |
D | artifact_path_requirements.mk | 34 $(eval allowed := $(PRODUCTS.$(makefile).ARTIFACT_PATH_ALLOWED_LIST)) \ 36 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \ 44 …$(call maybe-print-list-and-error,$(unused_allowed),$(makefile) includes redundant allowed entries… 50 $(eval allowed := $(PRODUCT_ARTIFACT_PATH_REQUIREMENT_ALLOWED_LIST)) \ 51 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \ 60 …_allowed),$(INTERNAL_PRODUCT) includes redundant artifact path requirement allowed list entries.) \
|
D | phony_package.mk | 3 $(error LOCAL_SRC_FILES are not allowed for phony packages)
|
D | dynamic_binary.mk | 122 $(call pretty-error,Invalid strip value $(my_strip_module), only one of $(valid_strip) allowed)
|
/build/soong/android/ |
D | neverallow_test.go | 84 regexp.QuoteMeta(`module "libother": violates neverallow requirements. Not allowed: 251 name: `"sdk_variant_only" outside allowed list`, 265 name: `"sdk_variant_only: false" outside allowed list`, 279 name: `"platform" outside allowed list`, 333 name: `"implementation_installable" outside allowed list`, 349 name: `"exclude_static_libs" outside allowed directory`, 361 …`exclude_static_libs property is only allowed for java modules defined in build/soong, libcore, an…
|
D | neverallow.go | 360 allowed []string member 364 return !InList(value, m.allowed) 368 return ".not-in-list(" + strings.Join(m.allowed, ",") + ")" 624 func NotInList(allowed []string) ValueMatcher { 625 return ¬InListMatcher{allowed}
|
/build/make/tools/compliance/cmd/testdata/proprietary/ |
D | METADATA | 1 # comments are allowed
|
/build/make/tools/compliance/cmd/testdata/reciprocal/ |
D | METADATA | 1 # Comments are allowed
|
/build/make/tools/compliance/cmd/testdata/notice/ |
D | METADATA | 1 # Comments are allowed
|
/build/make/tools/compliance/cmd/testdata/restricted/ |
D | METADATA.android | 1 # Comments are allowed
|
/build/make/tools/compliance/cmd/testdata/firstparty/ |
D | METADATA | 1 # Comments are allowed
|
/build/bazel/scripts/incremental_build/ |
D | go_allowlists.py | 23 allowed: bool 100 return self.dir_defaults[d].allowed 104 return v.allowed and v.recurse
|
/build/blueprint/ |
D | context_test.go | 1208 allowed bool 1228 allowed: true, 1233 allowed: true, 1238 allowed: true, 1243 allowed: true, 1248 allowed: false, 1253 allowed: false, 1258 allowed: true, 1263 allowed: false, 1281 allowed: false, [all …]
|
/build/make/ |
D | envsetup.sh | 1057 allowed= 1059 if [ -n "$allowed" ]; then 1061 echo " $allowed" 1065 allowed="$T/$f" 1069 [ -n "$allowed" ] && allowed_files=$(cat "$allowed") 1074 if [[ -z "$allowed" || "$allowed_files" =~ $f ]]; then 1077 echo "ignoring $f, not in $allowed"
|
/build/ |
D | envsetup.sh | 1057 allowed= 1059 if [ -n "$allowed" ]; then 1061 echo " $allowed" 1065 allowed="$T/$f" 1069 [ -n "$allowed" ] && allowed_files=$(cat "$allowed") 1074 if [[ -z "$allowed" || "$allowed_files" =~ $f ]]; then 1077 echo "ignoring $f, not in $allowed"
|
/build/soong/scripts/ |
D | check_do_not_merge.sh | 20 and are not allowed to be used in this project.
|
/build/soong/testing/code_metadata_internal_proto/ |
D | code_metadata_internal.proto | 34 // OPTIONAL: Specify if multiple ownerships of the source files are allowed.
|
/build/bazel/rules/java/ |
D | host_for_device.bzl | 27 This is rarely necessary and restricted to a few allowed projects.
|
/build/soong/cmd/path_interposer/ |
D | main_test.go | 141 …err: fmt.Errorf(`"path_interposer_test_not_allowed" is not allowed to be used. See https://an…
|
D | main.go | 88 If a tool isn't in the allowed list, a log will be posted to the unix domain
|
/build/soong/cmd/javac_wrapper/ |
D | javac_wrapper_test.go | 74 javadoc: option --boot-class-path not allowed with target 1.9
|
D | javac_wrapper.go | 217 regexp.MustCompile(`javadoc: option --boot-class-path not allowed with target 1.9`),
|
/build/bazel/rules/cc/ |
D | clang_tidy.bzl | 53 …fail("Flag `%s` is not allowed, since it could cause multiple writes to the same source file" % fl… 55 fail("Flag `%s` is not allowed, use `tidy_checks` property instead" % flag) 57 fail("Flag `%s` is not allowed, use `tidy_checks_as_errors` property instead" % flag) 59 …fail("Bad flag: `%s` is not an allowed multi-word flag. Should it be split into multiple flags?" %…
|
/build/bazel/rules/apex/ |
D | apex_deps_validation.bzl | 229 echo "ERROR: go/apex-allowed-deps-error contains more information"; 231 echo "Detected changes to allowed dependencies in updatable modules."; 235 echo -e "$ (croot && packages/modules/common/build/update-apex-allowed-deps.sh)\n";
|
/build/make/common/ |
D | math.mk | 392 $(if $(filter 0,$(2)),$(call math-error,division by zero is not allowed!),$(strip \ 401 $(call math-expect-error,(call int_divide,0,0),division by zero is not allowed!) 402 $(call math-expect-error,(call int_divide,1,0),division by zero is not allowed!)
|
/build/bazel_common_rules/dist/ |
D | dist.bzl | 110 … allow_duplicate_filenames: If true, duplicate filenames from different sources will be allowed to 143 See `dist.py` for allowed values and the default value.
|
12