/external/junit/src/org/junit/ |
Rule.java | 15 * annotated {@link Rule}s on a class, they will be applied in an order 24 * @Rule 45 public @interface Rule {
|
/external/chromium/net/proxy/ |
proxy_bypass_rules.h | 21 // Interface for an individual proxy bypass rule. 22 class Rule { 24 Rule(); 25 virtual ~Rule(); 27 // Returns true if |url| matches the rule. 30 // Returns a string representation of this rule. This is used both for 34 // Creates a copy of this rule. (Caller is responsible for deleting it) 35 virtual Rule* Clone() const = 0; 37 bool Equals(const Rule& rule) const [all...] |
proxy_bypass_rules.cc | 17 class HostnamePatternRule : public ProxyBypassRules::Rule { 49 virtual Rule* Clone() const { 61 class BypassLocalRule : public ProxyBypassRules::Rule { 74 virtual Rule* Clone() const { 79 // Rule for matching a URL that is an IP address, if that IP address falls 80 // within a certain numeric range. For example, you could use this rule to 82 class BypassIPBlockRule : public ProxyBypassRules::Rule { 116 virtual Rule* Clone() const { 143 ProxyBypassRules::Rule::Rule() { [all...] |
init_proxy_resolver_unittest.cc | 29 struct Rule { 30 Rule(const GURL& url, 51 Rule AddSuccessRule(const char* url) { 52 Rule rule(GURL(url), OK /*fetch_error*/, OK /*set_pac_error*/); 53 rules_.push_back(rule); 54 return rule; 58 rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/, 63 rules_.push_back(Rule(GURL(url), OK /*fetch_error*/, 67 const Rule& GetRuleByUrl(const GURL& url) const 100 const Rules::Rule& rule = rules_->GetRuleByUrl(url); local 147 const Rules::Rule& rule = expects_pac_bytes() ? local 181 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local 283 Rules::Rule rule = rules.AddSuccessRule("http:\/\/wpad\/wpad.dat"); local 302 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local 322 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local 424 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local [all...] |
/external/chromium_org/net/proxy/ |
proxy_bypass_rules.h | 21 // Interface for an individual proxy bypass rule. 22 class NET_EXPORT Rule { 24 Rule(); 25 virtual ~Rule(); 27 // Returns true if |url| matches the rule. 30 // Returns a string representation of this rule. This is used both for 34 // Creates a copy of this rule. (Caller is responsible for deleting it) 35 virtual Rule* Clone() const = 0; 37 bool Equals(const Rule& rule) const [all...] |
proxy_bypass_rules.cc | 19 class HostnamePatternRule : public ProxyBypassRules::Rule { 51 virtual Rule* Clone() const OVERRIDE { 63 class BypassLocalRule : public ProxyBypassRules::Rule { 76 virtual Rule* Clone() const OVERRIDE { 81 // Rule for matching a URL that is an IP address, if that IP address falls 82 // within a certain numeric range. For example, you could use this rule to 84 class BypassIPBlockRule : public ProxyBypassRules::Rule { 118 virtual Rule* Clone() const OVERRIDE { 145 ProxyBypassRules::Rule::Rule() { [all...] |
proxy_script_decider_unittest.cc | 34 struct Rule { 35 Rule(const GURL& url, int fetch_error, bool is_valid_script) 54 Rule AddSuccessRule(const char* url) { 55 Rule rule(GURL(url), OK /*fetch_error*/, true); 56 rules_.push_back(rule); 57 return rule; 61 rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/, 66 rules_.push_back(Rule(GURL(url), OK /*fetch_error*/, false)); 69 const Rule& GetRuleByUrl(const GURL& url) const 102 const Rules::Rule& rule = rules_->GetRuleByUrl(url); variable 127 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local 234 Rules::Rule rule = rules.AddSuccessRule("http:\/\/wpad\/wpad.dat"); local 257 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local 282 Rules::Rule rule = rules.AddSuccessRule("http:\/\/custom\/proxy.pac"); local [all...] |
/external/chromium_org/chrome/browser/content_settings/ |
content_settings_rule.cc | 10 Rule::Rule() {} 12 Rule::Rule( 22 Rule::~Rule() {} 32 Rule EmptyRuleIterator::Next() { 34 return Rule(); 58 Rule ConcatenationIterator::Next() { 63 const Rule& to_return = (*current_iterator)->Next() [all...] |
content_settings_rule.h | 20 struct Rule { 21 Rule(); 22 // Rule takes ownership of |value|. 23 Rule(const ContentSettingsPattern& primary_pattern, 26 ~Rule(); 37 virtual Rule Next() = 0; 44 virtual Rule Next() OVERRIDE; 55 virtual Rule Next() OVERRIDE;
|
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
Rule.java | 37 * ANTLR v3 Rule Information. 40 public class Rule extends DefaultListModel { 44 public Rule(String name) {
|
/external/chromium/chrome/browser/content_settings/ |
content_settings_provider.h | 52 struct Rule { 53 Rule() {} 54 Rule(const ContentSettingsPattern& requesting_pattern, 66 typedef std::vector<Rule> Rules; 76 // |embedding_url| pair or CONTENT_SETTING_DEFAULT, if no rule applies. For
|
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 39 # Rule to raise all known errors. 54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 58 ' - ' + Rule.ALL + ': enables all following errors.\n' 59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 61 ' - ' + Rule.INDENTATION + ': checks correct ' 63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 42 Rule = error_check.Rule 97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and 189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/external/chromium_org/chrome/browser/extensions/api/declarative/ |
rules_registry.h | 24 // Interface for rule registries. 30 typedef extensions::api::events::Rule Rule; 40 // |rules| is a list of Rule instances following the definition of the 41 // declarative extension APIs. It is guaranteed that each rule in |rules| has 53 const std::vector<linked_ptr<Rule> >& rules) = 0; 82 std::vector<linked_ptr<Rule> >* out) = 0; 86 std::vector<linked_ptr<Rule> >* out) = 0;
|
/external/chromium_org/net/cert/ |
mock_cert_verifier.cc | 16 struct MockCertVerifier::Rule { 17 Rule(X509Certificate* cert, 79 Rule rule(cert, host_pattern, verify_result, rv); 80 rules_.push_back(rule);
|
/external/chromium_org/net/tools/tld_cleanup/ |
tld_cleanup_util.h | 18 struct Rule { 24 typedef std::map<std::string, Rule> RuleMap;
|
/external/chromium_org/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 39 # Rule to raise all known errors. 54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 58 ' - ' + Rule.ALL + ': enables all following errors.\n' 59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 61 ' - ' + Rule.INDENTATION + ': checks correct ' 63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 42 Rule = error_check.Rule 97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and 189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/external/chromium_org/tools/checkdeps/ |
cpp_checker.py | 12 from rules import Rule, MessageRule 41 """Checks the given line with the given rule set. 46 results.DependencyViolation if the line violates a rule, or None 68 rule = rules.RuleApplyingTo(include_path, dependee_path) 69 if (rule.allow == Rule.DISALLOW or 70 (fail_on_temp_allow and rule.allow == Rule.TEMP_ALLOW)): 71 return True, results.DependencyViolation(include_path, rule, rules)
|
java_checker.py | 12 from rules import Rule 99 rule = rules.RuleApplyingTo(include_path, filepath) 100 if rule.allow == Rule.DISALLOW: 102 results.DependencyViolation(include_path, rule, rules))
|
rules.py | 12 class Rule(object): 13 """Specifies a single rule for an include, which can be one of 17 # These are the prefixes used to indicate each type of rule. These 19 # rule this is. 34 of the current rule. For example, the input "foo" would match "foo/bar".""" 38 """Returns true if the input string would be covered by this rule. For 39 example, the input "foo/bar" would match the rule "foo".""" 43 class MessageRule(Rule): 44 """A rule that has a simple message as the reason for failing, 49 super(MessageRule, self).__init__(Rule.DISALLOW, '', '' [all...] |
/external/chromium_org/third_party/WebKit/ |
PRESUBMIT.py | 163 from rules import Rule 184 if rule_type == Rule.DISALLOW:
|
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
CSSPreloadScanner.h | 57 Rule,
|
/external/chromium/net/tools/tld_cleanup/ |
tld_cleanup.cc | 18 // * Strips a single leading and/or trailing dot from each rule, if present. 19 // * Logs a warning if a rule contains '!' or '*.' other than at the beginning 20 // of the rule. (This also catches multiple ! or *. at the start of a rule.) 21 // * Logs a warning if GURL reports a rule as invalid, but keeps the rule. 22 // * Canonicalizes each rule's domain by converting it to a GURL and back. 23 // * Adds explicit rules for true TLDs found in any rule. 43 struct Rule { 48 typedef std::map<std::string, Rule> RuleMap 195 Rule rule; local 230 Rule rule; local [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
firewallsocketserver.h | 39 // This SocketServer shim simulates a rule-based firewall server. 97 struct Rule { 104 std::vector<Rule> rules_;
|