commit | 0d7446cdb288d665832f3ac68d83d2d97d415a28 | [log] [tgz] |
---|---|---|
author | Googler <shahan@google.com> | Thu Oct 10 08:05:09 2024 -0700 |
committer | Copybara-Service <copybara-worker@google.com> | Thu Oct 10 08:06:26 2024 -0700 |
tree | 4b1874cfc6345b8ad3360a52f248364182976986 | |
parent | de66620d71c0ab422dfd24cb0a36c0490ec26084 [diff] |
Drop FileInvalidationData.type. It's not the case that if we have DirectoryListingInvalidationData that we will have all the corresponding FileInvalidationData for the contents of that directory. We'll use an overly-conservative approach ond invalidate the DirectoryListingValue if any of its contents change. It's suboptimal but still correct. We could at a later point persist the dirent types from the DirectoryListingValue if this approximation is problematic. PiperOrigin-RevId: 684446572 Change-Id: I97eeaf73f0c2f2fd2519bfde696bf06fa7161ba7
{Fast, Correct} - Choose two
Build and test software of any size, quickly and reliably.
Speed up your builds and tests: Bazel rebuilds only what is necessary. With advanced local and distributed caching, optimized dependency analysis and parallel execution, you get fast and incremental builds.
One tool, multiple languages: Build and test Java, C++, Android, iOS, Go, and a wide variety of other language platforms. Bazel runs on Windows, macOS, and Linux.
Scalable: Bazel helps you scale your organization, codebase, and continuous integration solution. It handles codebases of any size, in multiple repositories or a huge monorepo.
Extensible to your needs: Easily add support for new languages and platforms with Bazel's familiar extension language. Share and re-use language rules written by the growing Bazel community.
Follow our tutorials:
To report a security issue, please email security@bazel.build with a description of the issue, the steps you took to create the issue, affected versions, and, if known, mitigations for the issue. Our vulnerability management team will respond within 3 working days of your email. If the issue is confirmed as a vulnerability, we will open a Security Advisory. This project follows a 90 day disclosure timeline.
See CONTRIBUTING.md