diff options
author | jcater <jcater@google.com> | 2018-05-02 09:08:52 -0700 |
---|---|---|
committer | Copybara-Service <copybara-piper@google.com> | 2018-05-02 09:11:15 -0700 |
commit | 94b8702db5f9a905337aca74bfc2e7c436bf33ec (patch) | |
tree | b675577d0b2c8a7bab1f8169cabcddefed3483fe /src/main/java/com/google/devtools/build/lib/sandbox | |
parent | bb4ffd680cf102d6dc2b32895b7bedde8e0cd695 (diff) |
Clean up code that directly imports nested classes like Builder, Entry, etc.
PiperOrigin-RevId: 195100670
Diffstat (limited to 'src/main/java/com/google/devtools/build/lib/sandbox')
3 files changed, 3 insertions, 6 deletions
diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/AbstractContainerizingSandboxedSpawn.java b/src/main/java/com/google/devtools/build/lib/sandbox/AbstractContainerizingSandboxedSpawn.java index 6ee10f5b3e..234c018386 100644 --- a/src/main/java/com/google/devtools/build/lib/sandbox/AbstractContainerizingSandboxedSpawn.java +++ b/src/main/java/com/google/devtools/build/lib/sandbox/AbstractContainerizingSandboxedSpawn.java @@ -24,7 +24,6 @@ import java.util.Collection; import java.util.LinkedHashSet; import java.util.List; import java.util.Map; -import java.util.Map.Entry; import java.util.Set; /** @@ -114,7 +113,7 @@ public abstract class AbstractContainerizingSandboxedSpawn implements SandboxedS protected void createInputs(Map<PathFragment, Path> inputs) throws IOException { // All input files are relative to the execroot. - for (Entry<PathFragment, Path> entry : inputs.entrySet()) { + for (Map.Entry<PathFragment, Path> entry : inputs.entrySet()) { Path key = sandboxExecRoot.getRelative(entry.getKey()); // A null value means that we're supposed to create an empty file as the input. if (entry.getValue() != null) { diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/DockerCommandLineBuilder.java b/src/main/java/com/google/devtools/build/lib/sandbox/DockerCommandLineBuilder.java index caf7596c16..db8c5c8033 100644 --- a/src/main/java/com/google/devtools/build/lib/sandbox/DockerCommandLineBuilder.java +++ b/src/main/java/com/google/devtools/build/lib/sandbox/DockerCommandLineBuilder.java @@ -22,7 +22,6 @@ import com.google.devtools.build.lib.vfs.PathFragment; import java.time.Duration; import java.util.List; import java.util.Map; -import java.util.Map.Entry; import java.util.UUID; final class DockerCommandLineBuilder { @@ -130,7 +129,7 @@ final class DockerCommandLineBuilder { if (privileged) { dockerCmdLine.add("--privileged"); } - for (Entry<String, String> env : environmentVariables.entrySet()) { + for (Map.Entry<String, String> env : environmentVariables.entrySet()) { dockerCmdLine.add("-e", env.getKey() + "=" + env.getValue()); } PathFragment execRootInsideDocker = diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/SandboxfsSandboxedSpawn.java b/src/main/java/com/google/devtools/build/lib/sandbox/SandboxfsSandboxedSpawn.java index 1c6357ad28..603ad79704 100644 --- a/src/main/java/com/google/devtools/build/lib/sandbox/SandboxfsSandboxedSpawn.java +++ b/src/main/java/com/google/devtools/build/lib/sandbox/SandboxfsSandboxedSpawn.java @@ -26,7 +26,6 @@ import java.util.Collection; import java.util.HashSet; import java.util.List; import java.util.Map; -import java.util.Map.Entry; import java.util.Set; import java.util.concurrent.atomic.AtomicInteger; import java.util.logging.Logger; @@ -182,7 +181,7 @@ class SandboxfsSandboxedSpawn implements SandboxedSpawn { // FUSE file system (which sandboxfs is) requires root privileges. Path emptyFile = null; - for (Entry<PathFragment, Path> entry : inputs.entrySet()) { + for (Map.Entry<PathFragment, Path> entry : inputs.entrySet()) { PathFragment target; if (entry.getValue() == null) { if (emptyFile == null) { |