Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 49) sorted by relevance

12

/build/make/core/
Dartifact_path_requirements.mk34 $(eval allowed := $(PRODUCTS.$(makefile).ARTIFACT_PATH_ALLOWED_LIST)) \
36 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \
44 …$(call maybe-print-list-and-error,$(unused_allowed),$(makefile) includes redundant allowed entries…
50 $(eval allowed := $(PRODUCT_ARTIFACT_PATH_REQUIREMENT_ALLOWED_LIST)) \
51 $(eval allowed_patterns := $(call resolve-product-relative-paths,$(allowed))) \
60 …_allowed),$(INTERNAL_PRODUCT) includes redundant artifact path requirement allowed list entries.) \
Dphony_package.mk3 $(error LOCAL_SRC_FILES are not allowed for phony packages)
Ddynamic_binary.mk122 $(call pretty-error,Invalid strip value $(my_strip_module), only one of $(valid_strip) allowed)
/build/soong/android/
Dneverallow_test.go84 regexp.QuoteMeta(`module "libother": violates neverallow requirements. Not allowed:
251 name: `"sdk_variant_only" outside allowed list`,
265 name: `"sdk_variant_only: false" outside allowed list`,
279 name: `"platform" outside allowed list`,
333 name: `"implementation_installable" outside allowed list`,
349 name: `"exclude_static_libs" outside allowed directory`,
361 …`exclude_static_libs property is only allowed for java modules defined in build/soong, libcore, an…
Dneverallow.go360 allowed []string member
364 return !InList(value, m.allowed)
368 return ".not-in-list(" + strings.Join(m.allowed, ",") + ")"
624 func NotInList(allowed []string) ValueMatcher {
625 return &notInListMatcher{allowed}
/build/make/tools/compliance/cmd/testdata/proprietary/
DMETADATA1 # comments are allowed
/build/make/tools/compliance/cmd/testdata/reciprocal/
DMETADATA1 # Comments are allowed
/build/make/tools/compliance/cmd/testdata/notice/
DMETADATA1 # Comments are allowed
/build/make/tools/compliance/cmd/testdata/restricted/
DMETADATA.android1 # Comments are allowed
/build/make/tools/compliance/cmd/testdata/firstparty/
DMETADATA1 # Comments are allowed
/build/bazel/scripts/incremental_build/
Dgo_allowlists.py23 allowed: bool
100 return self.dir_defaults[d].allowed
104 return v.allowed and v.recurse
/build/blueprint/
Dcontext_test.go1208 allowed bool
1228 allowed: true,
1233 allowed: true,
1238 allowed: true,
1243 allowed: true,
1248 allowed: false,
1253 allowed: false,
1258 allowed: true,
1263 allowed: false,
1281 allowed: false,
[all …]
/build/make/
Denvsetup.sh1057 allowed=
1059 if [ -n "$allowed" ]; then
1061 echo " $allowed"
1065 allowed="$T/$f"
1069 [ -n "$allowed" ] && allowed_files=$(cat "$allowed")
1074 if [[ -z "$allowed" || "$allowed_files" =~ $f ]]; then
1077 echo "ignoring $f, not in $allowed"
/build/
Denvsetup.sh1057 allowed=
1059 if [ -n "$allowed" ]; then
1061 echo " $allowed"
1065 allowed="$T/$f"
1069 [ -n "$allowed" ] && allowed_files=$(cat "$allowed")
1074 if [[ -z "$allowed" || "$allowed_files" =~ $f ]]; then
1077 echo "ignoring $f, not in $allowed"
/build/soong/scripts/
Dcheck_do_not_merge.sh20 and are not allowed to be used in this project.
/build/soong/testing/code_metadata_internal_proto/
Dcode_metadata_internal.proto34 // OPTIONAL: Specify if multiple ownerships of the source files are allowed.
/build/bazel/rules/java/
Dhost_for_device.bzl27 This is rarely necessary and restricted to a few allowed projects.
/build/soong/cmd/path_interposer/
Dmain_test.go141 …err: fmt.Errorf(`"path_interposer_test_not_allowed" is not allowed to be used. See https://an…
Dmain.go88 If a tool isn't in the allowed list, a log will be posted to the unix domain
/build/soong/cmd/javac_wrapper/
Djavac_wrapper_test.go74 javadoc: option --boot-class-path not allowed with target 1.9
Djavac_wrapper.go217 regexp.MustCompile(`javadoc: option --boot-class-path not allowed with target 1.9`),
/build/bazel/rules/cc/
Dclang_tidy.bzl53 …fail("Flag `%s` is not allowed, since it could cause multiple writes to the same source file" % fl…
55 fail("Flag `%s` is not allowed, use `tidy_checks` property instead" % flag)
57 fail("Flag `%s` is not allowed, use `tidy_checks_as_errors` property instead" % flag)
59 …fail("Bad flag: `%s` is not an allowed multi-word flag. Should it be split into multiple flags?" %…
/build/bazel/rules/apex/
Dapex_deps_validation.bzl229 echo "ERROR: go/apex-allowed-deps-error contains more information";
231 echo "Detected changes to allowed dependencies in updatable modules.";
235 echo -e "$ (croot && packages/modules/common/build/update-apex-allowed-deps.sh)\n";
/build/make/common/
Dmath.mk392 $(if $(filter 0,$(2)),$(call math-error,division by zero is not allowed!),$(strip \
401 $(call math-expect-error,(call int_divide,0,0),division by zero is not allowed!)
402 $(call math-expect-error,(call int_divide,1,0),division by zero is not allowed!)
/build/bazel_common_rules/dist/
Ddist.bzl110 … allow_duplicate_filenames: If true, duplicate filenames from different sources will be allowed to
143 See `dist.py` for allowed values and the default value.

12