| /base/request/request/services/src/task/ |
| H A D | files.rs | 77 open_file_readonly(uid, &bundle_and_account, &fs.path), in open_task_files() 107 open_file_readwrite(uid, &bundle_and_account, &fs.path), in open_task_files() 131 for (idx, path) in config.body_file_paths.iter().enumerate() { in open_body_files() 133 open_file_readwrite(uid, &bundle_and_account, path), in open_body_files() 143 fn open_file_readwrite(uid: u64, bundle: &str, path: &str) -> io::Result<File> { in open_file_readwrite() 148 .open(convert_path(uid, bundle, path)), in open_file_readwrite() 153 fn open_file_readonly(uid: u64, bundle_and_account: &str, path: &str) -> io::Result<File> { in open_file_readonly() 157 .open(convert_path(uid, bundle_and_account, path)), in open_file_readonly() 174 pub(crate) fn convert_path(uid: u64, bundle_and_account: &str, path: &str) -> String { 177 let real_path = path [all...] |
| /base/security/asset/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/certificate_framework/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/certificate_manager/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/code_signature/ |
| H A D | OAT.xml | 24 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 25 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 27 "compatibility" is used to check license compatibility in the specified path; 28 "license" is used to check source license header in the specified path; 29 "copyright" is used to check source copyright header in the specified path; 30 "import" is used to check source dependency in the specified path, such as import ... ,include ... 31 "filetype" is used to check file type in the specified path, supported file types: archive, binary 32 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 34 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 38 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/device_auth/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/huks/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /base/security/security_guard/oem_property/hos/ |
| H A D | security_guard_model.cfg | 4 "path": "/system/lib64/libsg_system_risk_detection.z.so",
126 "path": "/system/lib64/libsg_system_risk_detection.z.so",
188 "path": "/system/lib64/libsg_system_risk_detection.z.so",
220 "path": "/system/lib64/libaudit_model.z.so",
248 "path": "/system/lib64/libsg_threat_detection.z.so",
263 "path": "/system/lib64/libsg_oem_mode_detection.z.so",
275 "path": "/system/lib64/libsg_app_risk_detection.z.so",
291 "path": "/system/lib64/libsg_app_risk_detection.z.so",
307 "path": "/system/lib64/libsg_time_event_related_analysis.z.so",
319 "path" [all...] |
| /base/security/selinux_adapter/sepolicy/ohos_policy/tee/tee_client/system/ |
| H A D | tlogcat.te | 18 #avc: denied { ioctl } for pid=677 comm="tlogcat" path="/data/log/tee/teeOS_log-0" dev="sdd80" ino=125 ioctlcmd=0x5413 scontext=u:r:tlogcat:s0 tcontext=u:object_r:data_log:s0 tclass=file permissive=1 23 #avc: denied { open } for pid=654 comm="tlogcat" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=74 scontext=u:r:tlogcat:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1 24 #avc: denied { map } for pid=654 comm="tlogcat" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=74 scontext=u:r:tlogcat:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1 31 #avc: denied { open } for pid=677 comm="tlogcat" path="/dev/__parameters__/u:object_r:hilog_param:s0" dev="tmpfs" ino=63 scontext=u:r:tlogcat:s0 tcontext=u:object_r:hilog_param:s0 tclass=file permissive=1 32 #avc: denied { map } for pid=677 comm="tlogcat" path="/dev/__parameters__/u:object_r:hilog_param:s0" dev="tmpfs" ino=63 scontext=u:r:tlogcat:s0 tcontext=u:object_r:hilog_param:s0 tclass=file permissive=1 35 #avc: denied { open } for pid=677 comm="tlogcat" path="/proc/sys/vm/overcommit_memory" dev="proc" ino=3092 scontext=u:r:tlogcat:s0 tcontext=u:object_r:proc_file:s0 tclass=file permissive=1 37 #avc: denied { entrypoint } for pid=677 comm="init" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1 38 #avc: denied { map } for pid=677 comm="tlogcat" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1 39 #avc: denied { read } for pid=677 comm="tlogcat" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1 40 #avc: denied { execute } for pid=677 comm="tlogcat" path [all...] |
| /base/security/selinux_adapter/sepolicy/ohos_policy/update/updater/system/ |
| H A D | faultloggerd.te | 19 #avc: denied { entrypoint } for pid=238 comm="init" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 20 #avc: denied { map } for pid=238 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 21 #avc: denied { read } for pid=238 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 22 #avc: denied { execute } for pid=233 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17095 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 23 #avc: denied { open } for pid=233 comm="faultloggerd" path="/etc/ld-musl-namespace-arm.ini" dev="rootfs" ino=16765 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 24 #avc: denied { getattr } for pid=233 comm="faultloggerd" path="/etc/ld-musl-namespace-arm.ini" dev="rootfs" ino=16765 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 27 #avc: denied { read write } for pid=238 comm="faultloggerd" path="/dev/console" dev="rootfs" ino=17411 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=chr_file permissive=1 32 #avc: denied { read write } for pid=238 comm="faultloggerd" path="socket:[18134]" dev="sockfs" ino=18134 scontext=u:r:faultloggerd:s0 tcontext=u:r:ueventd:s0 tclass=netlink_kobject_uevent_socket permissive=1 36 #avc: denied { open } for pid=233 comm="faultloggerd" path="/dev/__parameters__/u:object_r:musl_param:s0" dev="tmpfs" ino=40 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:musl_param:s0 tclass=file permissive=1 37 #avc: denied { map } for pid=229 comm="faultloggerd" path [all...] |
| /base/security/selinux_adapter/sepolicy/ohos_policy/startup/appspawn/system/ |
| H A D | pid_ns_init.te | 16 # avc_audit_slow:260] avc: denied { open } for pid=1, comm="/system/bin/pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="" ino=223 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1 17 # avc_audit_slow:260] avc: denied { read } for pid=1, comm="/system/bin/pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="" ino=223 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1 22 # avc: denied { getattr } for pid=268 comm="plat_shared" path="/proc/708/comm" dev="proc" ino=33421 scontext=u:r:hiview:s0 tcontext=u:r:pid_ns_init:s0 tclass=file permissive=1 23 # avc: denied { open } for pid=268 comm="plat_shared" path="/proc/708/comm" dev="proc" ino=33421 scontext=u:r:hiview:s0 tcontext=u:r:pid_ns_init:s0 tclass=file permissive=1 27 # avc: denied { map } for pid=768 comm="pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=73 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1 29 # avc: denied { map } for pid=768 comm="pid_ns_init" path="/system/bin/pid_ns_init" dev="mmcblk0p7" ino=335 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:pid_ns_init_exec:s0 tclass=file permissive=1 33 # avc: denied { getattr } for pid=1654 comm="ls" path="/proc/708/ns" dev="proc" ino=33493 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=dir permissive=1 34 # avc: denied { open } for pid=1654 comm="ls" path="/proc/708/ns" dev="proc" ino=33493 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=dir permissive=1 40 # avc: denied { getattr } for pid=1654 comm="ls" path="/proc/708/ns/net" dev="proc" ino=33494 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=lnk_file permissive=1 43 # avc: denied { open } for pid=1761 comm="ps" path [all...] |
| /base/telephony/ril_adapter/services/hril_hdf/src/ |
| H A D | hril_hdf.c | 29 #define RIL_VENDOR_LIB_PATH "const.sys.radio.vendorlib.path" 47 static int32_t GetVendorLibPath(char *path) in GetVendorLibPath() argument 50 code = GetParameter(RIL_VENDOR_LIB_PATH, "", path, PARAMETER_SIZE); in GetVendorLibPath() 57 if (strcpy_s(path, PARAMETER_SIZE, "libril_msgtransfer.z.so") == EOK) { in GetVendorLibPath() 58 TELEPHONY_LOGI("virtualModemSwitch on set path libril_msgtransfer.z.so"); in GetVendorLibPath() 65 TELEPHONY_LOGE("Failed to get vendor library path through system properties. err:%{public}d", code); in GetVendorLibPath() 114 const char *path = udev_list_entry_get_name(devListEntry); in GetUsbDeviceInfo() local 115 if (path == NULL) { in GetUsbDeviceInfo() 118 dev = udev_device_new_from_syspath(udev, path); in GetUsbDeviceInfo() 160 TELEPHONY_LOGE("dynamic library path i in LoadVendor() [all...] |
| /base/update/sys_installer/frameworks/ipc_server/src/ |
| H A D | module_update_service.cpp | 65 LOG(ERROR) << "Invalid package path " << pkgPath; in InstallModulePackage() 106 int32_t ModuleUpdateService::StartUpdateHmpPackage(const std::string &path, in StartUpdateHmpPackage() argument 112 ModuleUpdateMain::GetInstance().SaveInstallerResult(path, ret, std::to_string(ret), timer); in StartUpdateHmpPackage() 118 LOG(INFO) << "StartUpdateHmpPackage " << path; in StartUpdateHmpPackage() 126 if (VerifyModulePackageSign(path) != 0) { in StartUpdateHmpPackage() 127 LOG(ERROR) << "Verify sign failed " << path; in StartUpdateHmpPackage() 132 ret = InstallModulePackage(path); in StartUpdateHmpPackage() 156 tmpUpdateInfo.path = signalResult[0]; in GetHmpUpdateResult() 161 if (iter.path.find(tmpUpdateInfo.path) ! in GetHmpUpdateResult() [all...] |
| /base/update/updater/test/unittest/utils/ |
| H A D | utils_unittest.cpp | 81 string path = "/data/updater/log";
in HWTEST_F() local 84 EXPECT_NE(Utils::GetFilesFromDirectory(path, files, true), -1);
in HWTEST_F() 89 string path = "";
in HWTEST_F() local 90 EXPECT_EQ(Utils::RemoveDir(path), false);
in HWTEST_F() 91 path = TEST_PATH_FROM + "../utils/nonExistDir";
in HWTEST_F() 92 EXPECT_EQ(Utils::RemoveDir(path), false);
in HWTEST_F() 93 path = "/data/updater/rmDir";
in HWTEST_F() 94 int ret = mkdir(path.c_str(), S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH);
in HWTEST_F() 97 string filePath = path + "/tmpFile";
in HWTEST_F() 101 EXPECT_EQ(Utils::RemoveDir(path), tru in HWTEST_F() [all...] |
| /foundation/ability/ability_lite/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/text_drag/ |
| H A D | text_drag_overlay_modifier.cpp | 45 void TextDragOverlayModifier::PaintShadow(const RSPath& path, const Shadow& shadow, RSCanvas& canvas) in PaintShadow() argument 51 rsPath.AddPath(path); in PaintShadow() 66 void TextDragOverlayModifier::PaintBackground(const RSPath& path, RSCanvas& canvas, in PaintBackground() argument 70 PaintShadow(path, shadow, canvas); in PaintBackground() 78 canvas.DrawPath(path); in PaintBackground() 84 canvas.ClipPath(path, RSClipOp::INTERSECT, true); in PaintBackground() 104 std::shared_ptr<RSPath> path; in onDraw() local 106 path = pattern->GetBackgroundPath(); in onDraw() 108 path = pattern->GenerateBackgroundPath(backgroundOffset_->Get(), 1 - selectedBackgroundOpacity_->Get()); in onDraw() 110 PaintBackground(*path, canva in onDraw() [all...] |
| /foundation/bundlemanager/bundle_framework/services/bundlemgr/include/ |
| H A D | pre_install_bundle_info.h | 75 * @brief Get bundle path. 76 * @return Return bundle path 83 * @brief Add bundle path. 84 * @param bundlePath bundle path. 95 * @brief Delete bundle path. 96 * @param bundlePath bundle path. 106 * @brief clear bundle path. 107 * @param bundlePath bundle path. 114 * @brief Has bundle path. 115 * @param bundlePath bundle path [all...] |
| /foundation/arkui/ace_engine_lite/frameworks/src/core/context/ |
| H A D | js_app_context.h | 57 * @param: fullPath js file full path 69 * @brief set the ability path, bundle name and token info for current ability 71 * @param: ability's path, bundle name and token info 75 * @brief return ability path 82 * @brief set the js path and uuid info for current ability 84 * @param: js's path 88 * @brief return js path 96 * @brief set the js path and uuid info for current ability 191 * @param: fullPath js file full path 208 // record current running ability's uuid && ability path, wil [all...] |
| /foundation/multimedia/media_library/frameworks/innerkitsimpl/medialibrary_data_extension/include/ |
| H A D | medialibrary_object_utils.h | 43 std::string &path, int32_t &mediaType); 45 EXPORT static int32_t CreateDirWithPath(const std::string &path); 56 static void ScanFileAsync(const std::string &path, const std::string &id, MediaLibraryApi api); 57 static void ScanFileSyncWithoutAlbumUpdate(const std::string &path, const std::string &id, MediaLibraryApi api); 58 EXPORT static int32_t GetIdByPathFromDb(const std::string &path); 73 EXPORT static bool IsFileExistInDb(const std::string &path); 85 const string &path = ""); 91 EXPORT static int32_t ModifyInfoByPathInDb(MediaLibraryCommand &cmd, const std::string &path); 92 EXPORT static int32_t DeleteInfoByPathInDb(MediaLibraryCommand &cmd, const std::string &path); 97 EXPORT static int32_t DeleteInvalidRowInDb(const std::string &path); [all...] |
| /foundation/resourceschedule/qos_manager/ |
| H A D | OAT.xml | 26 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 27 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 29 "compatibility" is used to check license compatibility in the specified path; 30 "license" is used to check source license header in the specified path; 31 "copyright" is used to check source copyright header in the specified path; 32 "import" is used to check source dependency in the specified path, such as import ... ,include ... 33 "filetype" is used to check file type in the specified path, supported file types: archive, binary 34 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 36 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 40 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /foundation/distributeddatamgr/data_share/ |
| H A D | OAT.xml | 23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is: 24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/> 26 "compatibility" is used to check license compatibility in the specified path; 27 "license" is used to check source license header in the specified path; 28 "copyright" is used to check source copyright header in the specified path; 29 "import" is used to check source dependency in the specified path, such as import ... ,include ... 30 "filetype" is used to check file type in the specified path, supported file types: archive, binary 31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource 33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem. 37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path [all...] |
| /foundation/distributeddatamgr/relational_store/interfaces/ndk/src/ |
| H A D | relational_asset.cpp | 44 int OH_Data_Asset_SetPath(Data_Asset *asset, const char *path) in OH_Data_Asset_SetPath() argument 46 if (asset == nullptr || path == nullptr) { in OH_Data_Asset_SetPath() 50 asset->asset_.path = path; in OH_Data_Asset_SetPath() 135 int OH_Data_Asset_GetPath(Data_Asset *asset, char *path, size_t *length) in OH_Data_Asset_GetPath() argument 138 LOG_ERROR("Asset get path error: asset is NULL ? %{public}d.", (asset == nullptr)); in OH_Data_Asset_GetPath() 141 size_t pathLength = asset->asset_.path.size(); in OH_Data_Asset_GetPath() 143 LOG_ERROR("Asset get path error: length is too small ? %{public}d.", (pathLength >= *length)); in OH_Data_Asset_GetPath() 146 errno_t result = strcpy_s(path, *length, asset->asset_.path in OH_Data_Asset_GetPath() [all...] |
| /foundation/filemanagement/app_file_service/utils/src/b_tarball/ |
| H A D | b_tarball_factory.cpp | 44 * An absolute path is required. 53 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "The root must be an existing canonicalized path"); in UntarFort() 62 * An absolute path is required. 63 * @param includes Path to be packed in the root directory. 64 * The relative path is required. If this parameter is not specified, all packages are packed by default. 65 * @param excludes The part that does not need to be packed in the path to be packed 66 * Requires a relative path. Can be used to exclude some subdirectories 76 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "The root must be an existing canonicalized path"); in TarFilter() 131 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "Tarball path differed after canonicalizing"); in GetTarballDirAndName() 136 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "Tarball path did in GetTarballDirAndName() [all...] |
| /foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fileio/properties/ |
| H A D | read_text.cpp | 77 auto [resGetFirstArg, path, unused] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Sync() 79 UniError(EINVAL).ThrowErr(env, "Invalid path"); in Sync() 91 sfd.SetFD(open(path.get(), O_RDONLY)); in Sync() 127 static UniError AsyncExec(const std::string &path, std::shared_ptr<AsyncReadTextArg> arg, int64_t position, in AsyncExec() argument 136 sfd.SetFD(open(path.c_str(), O_RDONLY)); in AsyncExec() 176 auto [resGetFirstArg, path, unused] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Async() 178 UniError(EINVAL).ThrowErr(env, "Invalid path"); in Async() 194 [path = string(path.get()), arg, position = position, hasLen = hasLen, len = len](napi_env env) -> UniError { in Async() 195 return AsyncExec(path, ar in Async() [all...] |
| /foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fs/properties/ |
| H A D | read_lines.cpp | 46 static int GetFileSize(const string &path, int64_t &offset) in GetFileSize() argument 55 int ret = uv_fs_stat(nullptr, stat_req.get(), path.c_str(), nullptr); in GetFileSize() 57 HILOGE("Failed to get file stat by path"); in GetFileSize() 122 auto [succPath, path, ignore] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Async() 124 HILOGE("Invalid path from JS first argument"); in Async() 144 auto cbExec = [arg, pathStr = string(path.get())]() -> NError { in Async() 174 auto [succPath, path, ignore] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Sync() 176 HILOGE("Invalid path from JS first argument"); in Sync() 190 auto iterator = ::ReaderIterator(path.get()); in Sync() 198 int ret = GetFileSize(path in Sync() [all...] |