/external/junit/src/org/junit/ |
Rule.java | 15 * annotated {@link Rule}s on a class, they will be applied in an order 24 * @Rule 45 public @interface Rule {
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/downloads/download_filename_controller/ |
options.js | 5 function Rule(data) { 7 this.node = document.getElementById('rule-template').cloneNode(true); 8 this.node.id = 'rule' + (Rule.next_id++); 9 this.node.rule = this; 32 var rule = this; 34 var sib = rule.node.previousSibling; 35 rule.node.parentNode.removeChild(rule.node); 36 sib.parentNode.insertBefore(rule.node, sib) [all...] |
/external/chromium/net/proxy/ |
proxy_bypass_rules.h | 21 // Interface for an individual proxy bypass rule. 22 class Rule { 24 Rule(); 25 virtual ~Rule(); 27 // Returns true if |url| matches the rule. 30 // Returns a string representation of this rule. This is used both for 34 // Creates a copy of this rule. (Caller is responsible for deleting it) 35 virtual Rule* Clone() const = 0; 37 bool Equals(const Rule& rule) const [all...] |
proxy_bypass_rules.cc | 17 class HostnamePatternRule : public ProxyBypassRules::Rule { 49 virtual Rule* Clone() const { 61 class BypassLocalRule : public ProxyBypassRules::Rule { 74 virtual Rule* Clone() const { 79 // Rule for matching a URL that is an IP address, if that IP address falls 80 // within a certain numeric range. For example, you could use this rule to 82 class BypassIPBlockRule : public ProxyBypassRules::Rule { 116 virtual Rule* Clone() const { 143 ProxyBypassRules::Rule::Rule() { [all...] |
/external/chromium_org/net/proxy/ |
proxy_bypass_rules.h | 21 // Interface for an individual proxy bypass rule. 22 class NET_EXPORT Rule { 24 Rule(); 25 virtual ~Rule(); 27 // Returns true if |url| matches the rule. 30 // Returns a string representation of this rule. This is used both for 34 // Creates a copy of this rule. (Caller is responsible for deleting it) 35 virtual Rule* Clone() const = 0; 37 bool Equals(const Rule& rule) const [all...] |
/external/chromium_org/chrome/browser/content_settings/ |
content_settings_rule.cc | 10 Rule::Rule() {} 12 Rule::Rule( 22 Rule::~Rule() {} 32 Rule EmptyRuleIterator::Next() { 34 return Rule(); 58 Rule ConcatenationIterator::Next() { 63 const Rule& to_return = (*current_iterator)->Next() [all...] |
content_settings_rule.h | 20 struct Rule { 21 Rule(); 22 // Rule takes ownership of |value|. 23 Rule(const ContentSettingsPattern& primary_pattern, 26 ~Rule(); 37 virtual Rule Next() = 0; 44 virtual Rule Next() OVERRIDE; 55 virtual Rule Next() OVERRIDE;
|
/external/chromium_org/third_party/libaddressinput/chromium/cpp/src/ |
rule.cc | 15 #include "rule.h" 103 Rule::Rule() 111 Rule::~Rule() {} 113 void Rule::CopyFrom(const Rule& rule) { 114 format_ = rule.format_; 115 sub_keys_ = rule.sub_keys_ [all...] |
rule.h | 30 // Rule rule; 31 // if (rule.ParseSerializedRule("{\"fmt\": \"%A%n%C%S %Z\"}")) { 32 // Process(rule.GetFormat()); 34 class Rule { 36 Rule(); 37 ~Rule(); 39 // Copies all data from |rule|. 40 void CopyFrom(const Rule& rule); [all...] |
/external/antlr/antlr-3.4/gunit/src/main/java/org/antlr/gunit/swingui/model/ |
Rule.java | 37 * ANTLR v3 Rule Information. 40 public class Rule extends DefaultListModel { 44 public Rule(String name) {
|
/external/chromium/chrome/browser/content_settings/ |
content_settings_provider.h | 52 struct Rule { 53 Rule() {} 54 Rule(const ContentSettingsPattern& requesting_pattern, 66 typedef std::vector<Rule> Rules; 76 // |embedding_url| pair or CONTENT_SETTING_DEFAULT, if no rule applies. For
|
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 39 # Rule to raise all known errors. 54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 58 ' - ' + Rule.ALL + ': enables all following errors.\n' 59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 61 ' - ' + Rule.INDENTATION + ': checks correct ' 63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 42 Rule = error_check.Rule 97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and 189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/external/chromium_org/net/cert/ |
mock_cert_verifier.cc | 16 struct MockCertVerifier::Rule { 17 Rule(X509Certificate* cert, 79 Rule rule(cert, host_pattern, verify_result, rv); 80 rules_.push_back(rule);
|
/external/chromium_org/net/tools/tld_cleanup/ |
tld_cleanup_util.h | 18 struct Rule { 24 typedef std::map<std::string, Rule> RuleMap;
|
/external/chromium_org/third_party/closure_linter/closure_linter/ |
error_check.py | 27 class Rule(object): 39 # Rule to raise all known errors. 54 'This includes ' + (', '.join(Rule.CLOSURE_RULES)) + '.') 58 ' - ' + Rule.ALL + ': enables all following errors.\n' 59 ' - ' + Rule.BLANK_LINES_AT_TOP_LEVEL + ': validates' 61 ' - ' + Rule.INDENTATION + ': checks correct ' 63 ' - ' + Rule.WELL_FORMED_AUTHOR + ': validates the ' 65 ' - ' + Rule.NO_BRACES_AROUND_INHERIT_DOC + ': ' 67 ' - ' + Rule.BRACES_AROUND_TYPE + ': enforces braces ' 69 ' - ' + Rule.OPTIONAL_TYPE_MARKER + ': checks correct [all...] |
javascriptlintrules.py | 42 Rule = error_check.Rule 97 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS): 135 if (error_check.ShouldCheck(Rule.OPTIONAL_TYPE_MARKER) and 189 if (error_check.ShouldCheck(Rule.BLANK_LINES_AT_TOP_LEVEL) and 467 if error_check.ShouldCheck(Rule.UNUSED_PRIVATE_MEMBERS):
|
/external/chromium_org/tools/checkdeps/ |
cpp_checker.py | 12 from rules import Rule, MessageRule 41 """Checks the given line with the given rule set. 46 results.DependencyViolation if the line violates a rule, or None 68 rule = rules.RuleApplyingTo(include_path, dependee_path) 69 if (rule.allow == Rule.DISALLOW or 70 (fail_on_temp_allow and rule.allow == Rule.TEMP_ALLOW)): 71 return True, results.DependencyViolation(include_path, rule, rules)
|
graphdeps.py | 25 from rules import Rule 58 ignore_temp_rules: Ignore rules that start with Rule.TEMP_ALLOW ("!"). 100 """ Builds a dependency rule table and dumps the corresponding dependency 153 if allow == Rule.TEMP_ALLOW and self.ignore_temp_rules: 180 # Check that this node does not explicitly override a rule from the 182 if ((dst, Rule.ALLOW) not in deps_graph[src]) and \ 183 ((dst, Rule.TEMP_ALLOW) not in deps_graph[src]) and \ 184 ((dst, Rule.DISALLOW) not in deps_graph[src]): 198 if allow == Rule.DISALLOW and self.hide_disallowed_deps: 201 if allow == Rule.ALLOW and src == dst [all...] |
java_checker.py | 12 from rules import Rule 99 rule = rules.RuleApplyingTo(include_path, filepath) 100 if rule.allow == Rule.DISALLOW: 102 results.DependencyViolation(include_path, rule, rules))
|
checkdeps.py | 25 from rules import Rule, Rules 52 ignore_temp_rules: Ignore rules that start with Rule.TEMP_ALLOW ("!"). 121 where rule_type is one of Rule.DISALLOW or Rule.TEMP_ALLOW and 136 if rule_type != Rule.ALLOW:
|
rules.py | 12 class Rule(object): 13 """Specifies a single rule for an include, which can be one of 17 # These are the prefixes used to indicate each type of rule. These 19 # rule this is. 34 """Returns a tuple (allow, dependent dir, dependee dir) for this rule, 42 of the current rule. For example, the input "foo" would match "foo/bar".""" 46 """Returns true if the input string would be covered by this rule. For 47 example, the input "foo/bar" would match the rule "foo".""" 51 class MessageRule(Rule): 52 """A rule that has a simple message as the reason for failing [all...] |
builddeps.py | 7 a dependency rule table to be used by subclasses. 39 # no deps rule for it. 65 There is an implicit rule for the current directory (where the DEPS file lives) 67 allow the current directory everywhere. This implicit rule is applied first, 82 from rules import Rule, Rules 121 ignore_temp_rules: Ignore rules that start with Rule.TEMP_ALLOW ("!"). 150 implicit rule that allows inclusion from this directory. 157 # First apply the implicit "allow" rule for the current directory. 167 'Default rule for ' + source) 174 """Deduces a sensible description for the rule being added, an [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
CSSPreloadScanner.h | 57 Rule,
|
/external/chromium_org/third_party/WebKit/ |
PRESUBMIT.py | 194 from rules import Rule 215 if rule_type == Rule.DISALLOW:
|