Home
last modified time | relevance | path

Searched +full:persist +full:- +full:credentials (Results 1 – 25 of 88) sorted by relevance

1234

/external/grpc-grpc/src/php/tests/unit_tests/PersistentChannelTests/
DPersistentChannelTest.php10 * http://www.apache.org/licenses/LICENSE-2.0
33 $plist = $channel_clean_persistent->getPersistentList();
34 $channel_clean_persistent->cleanPersistentList();
40 $deadline = $now->add(new Grpc\Timeval(1000));
41 if ($channel->watchConnectivityState(GRPC\CHANNEL_IDLE,
46 $this->assertTrue(false);
50 $this->assertTrue($state == GRPC\CHANNEL_CONNECTING ||
64 $this->channel1 = new Grpc\Channel('localhost:1', ['force_new' => true]);
65 $channel1_info = $this->channel1->getChannelInfo();
66 $plist_info = $this->channel1->getPersistentList();
[all …]
/external/flatbuffers/.github/workflows/
Dscorecards.yml1 name: Scorecards supply-chain security
6 - cron: '21 2 * * 5'
11 permissions: read-all
16 runs-on: ubuntu-latest
18 # Needed to upload the results to code-scanning dashboard.
19 security-events: write
24 - name: "Checkout code"
27 persist-credentials: false
29 - name: "Run analysis"
30 uses: ossf/scorecard-action@c1aec4ac820532bab364f02a81873c555a0ba3a1 # v1.0.4
[all …]
/external/pcre/.github/workflows/
Dscorecards.yml1 name: Scorecards supply-chain security
6 - cron: '23 17 * * 1'
11 permissions: read-all
16 runs-on: ubuntu-latest
18 # Needed to upload the results to code-scanning dashboard.
19 security-events: write
24 - name: "Checkout code"
27 persist-credentials: false
29 - name: "Run analysis"
30 uses: ossf/scorecard-action@3e15ea8318eee9b333819ec77a36aca8d39df13e # tag=v1.1.1
[all …]
/external/apache-commons-lang/.github/workflows/
Dcoverage.yml8 # http://www.apache.org/licenses/LICENSE-2.0
26 runs-on: ubuntu-latest
32 - uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c
34 persist-credentials: false
35 - uses: actions/cache@v3.2.5
38 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
39 restore-keys: |
40 ${{ runner.os }}-maven-
41 - name: Set up JDK ${{ matrix.java }}
42 uses: actions/setup-java@v3.10.0
[all …]
Dmaven.yml8 # http://www.apache.org/licenses/LICENSE-2.0
26 runs-on: ubuntu-latest
27 continue-on-error: ${{ matrix.experimental }}
33 # - java: 18-ea
36 - uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c
38 persist-credentials: false
39 - uses: actions/cache@v3.2.5
42 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
43 restore-keys: |
44 ${{ runner.os }}-maven-
[all …]
Dscorecards-analysis.yml8 # http://www.apache.org/licenses/LICENSE-2.0
16 name: "Scorecards supply-chain security"
21 - cron: "30 1 * * 6" # Weekly on Saturdays
25 permissions: read-all
32 runs-on: ubuntu-latest
34 # Needed to upload the results to the code-scanning dashboard.
35 security-events: write
37 id-token: write # This is required for requesting the JWT
42 - name: "Checkout code"
45 persist-credentials: false
[all …]
Dcodeql-analysis.yml8 # http://www.apache.org/licenses/LICENSE-2.0
25 - cron: '33 9 * * 4'
33 runs-on: ubuntu-latest
37 security-events: write
40 fail-fast: false
44 # Learn more about CodeQL language support at https://git.io/codeql-language-support
47 - name: Checkout repository
50 persist-credentials: false
51 - uses: actions/cache@v3.2.5
54 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
[all …]
/external/deqp-deps/SPIRV-Tools/.github/workflows/
Dscorecard.yml1 name: Scorecard supply-chain security
3 # For Branch-Protection check. Only the default branch is supported. See
4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9 - cron: '36 17 * * 5'
14 permissions: read-all
19 runs-on: ubuntu-latest
21 security-events: write # to upload the results to code-scanning dashboard
22 id-token: write # to publish results and get a badge
25 - name: "Checkout code"
28 persist-credentials: false
[all …]
/external/swiftshader/third_party/SPIRV-Tools/.github/workflows/
Dscorecard.yml1 name: Scorecard supply-chain security
3 # For Branch-Protection check. Only the default branch is supported. See
4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9 - cron: '36 17 * * 5'
14 permissions: read-all
19 runs-on: ubuntu-latest
21 security-events: write # to upload the results to code-scanning dashboard
22 id-token: write # to publish results and get a badge
25 - name: "Checkout code"
28 persist-credentials: false
[all …]
/external/angle/third_party/glslang/src/.github/workflows/
Dscorecard.yml1 name: Scorecard supply-chain security
3 # For Branch-Protection check. Only the default branch is supported. See
4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9 - cron: '36 17 * * 5'
14 permissions: read-all
19 runs-on: ubuntu-latest
21 security-events: write # to upload the results to code-scanning dashboard
22 id-token: write # to publish results and get a badge
25 - name: "Checkout code"
28 persist-credentials: false
[all …]
/external/deqp-deps/glslang/.github/workflows/
Dscorecard.yml1 name: Scorecard supply-chain security
3 # For Branch-Protection check. Only the default branch is supported. See
4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9 - cron: '36 17 * * 5'
14 permissions: read-all
19 runs-on: ubuntu-latest
21 security-events: write # to upload the results to code-scanning dashboard
22 id-token: write # to publish results and get a badge
25 - name: "Checkout code"
28 persist-credentials: false
[all …]
/external/angle/third_party/spirv-tools/src/.github/workflows/
Dscorecard.yml1 name: Scorecard supply-chain security
3 # For Branch-Protection check. Only the default branch is supported. See
4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
9 - cron: '36 17 * * 5'
14 permissions: read-all
19 runs-on: ubuntu-latest
21 security-events: write # to upload the results to code-scanning dashboard
22 id-token: write # to publish results and get a badge
25 - name: "Checkout code"
28 persist-credentials: false
[all …]
/external/apache-commons-io/.github/workflows/
Dcoverage.yml8 # http://www.apache.org/licenses/LICENSE-2.0
26 runs-on: ubuntu-latest
32 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
34 persist-credentials: false
35 - uses: actions/cache@704facf57e6136b1bc63b828d79edcd491f0ee84 # v3.3.2
38 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
39 restore-keys: |
40 ${{ runner.os }}-maven-
41 - name: Set up JDK ${{ matrix.java }}
42 uses: actions/setup-java@0ab4596768b603586c0de567f2430c30f5b0d2b0 # v3.13.0
[all …]
Dmaven.yml8 # http://www.apache.org/licenses/LICENSE-2.0
26 runs-on: ${{ matrix.os }}
27 continue-on-error: ${{ matrix.experimental }}
30 os: [ubuntu-latest, windows-latest, macos-latest]
34 # - java: 22-ea
35 # os: ubuntu-latest
37 # - java: 22-ea
38 # os: windows-latest
40 # - java: 22-ea
41 # os: macos-latest
[all …]
Dscorecards-analysis.yml8 # http://www.apache.org/licenses/LICENSE-2.0
16 name: "Scorecards supply-chain security"
21 - cron: "30 1 * * 6" # Weekly on Saturdays
25 permissions: read-all
32 runs-on: ubuntu-latest
34 # Needed to upload the results to the code-scanning dashboard.
35 security-events: write
37 id-token: write # This is required for requesting the JWT
42 - name: "Checkout code"
45 persist-credentials: false
[all …]
Dcodeql-analysis.yml8 # http://www.apache.org/licenses/LICENSE-2.0
25 - cron: '33 9 * * 4'
33 runs-on: ubuntu-latest
37 security-events: write
40 fail-fast: false
44 # Learn more about CodeQL language support at https://git.io/codeql-language-support
47 - name: Checkout repository
50 persist-credentials: false
51 - uses: actions/cache@704facf57e6136b1bc63b828d79edcd491f0ee84 # v3.3.2
54 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
[all …]
/external/rust/crates/chrono/.github/workflows/
Dlint.yml4 # It's really `--all-features`, but not adding the mutually exclusive features from rkyv
5 …ALL_NON_EXCLUSIVE_FEATURES: --features "default unstable-locales rkyv-64 rkyv-validation rustc-ser…
14 runs-on: ubuntu-latest
17 - uses: actions/checkout@v4
18 - uses: dtolnay/rust-toolchain@stable
20 targets: x86_64-unknown-linux-gnu, x86_64-pc-windows-msvc
21 - uses: Swatinem/rust-cache@v2
22 - run: cargo fmt --check -- --color=always
23 - run: cargo fmt --check --manifest-path fuzz/Cargo.toml
24 - run: cargo fmt --check --manifest-path bench/Cargo.toml
[all …]
/external/zstd/.github/workflows/
Dscorecards.yml1 name: Scorecards supply-chain security
6 - cron: '22 21 * * 2'
12 permissions: read-all
18 runs-on: ubuntu-latest
20 # Needed to upload the results to code-scanning dashboard.
21 security-events: write
23 id-token: write
29 - name: "Checkout code"
32 persist-credentials: false
34 - name: "Run analysis"
[all …]
/external/harfbuzz_ng/.github/workflows/
Dscorecard.yml2 # by a third-party and are governed by separate terms of service, privacy
5 name: Scorecard supply-chain security
7 # For Branch-Protection check. Only the default branch is supported. See
8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
13 - cron: '19 14 * * 6'
18 permissions: read-all
23 runs-on: ubuntu-latest
25 # Needed to upload the results to code-scanning dashboard.
26 security-events: write
28 id-token: write
[all …]
/external/fmtlib/.github/workflows/
Dscorecard.yml2 # by a third-party and are governed by separate terms of service, privacy
5 name: Scorecard supply-chain security
7 # For Branch-Protection check. Only the default branch is supported. See
8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
13 - cron: '26 14 * * 5'
18 permissions: read-all
23 runs-on: ubuntu-latest
25 # Needed to upload the results to code-scanning dashboard.
26 security-events: write
28 id-token: write
[all …]
/external/google-cloud-java/.github/workflows/
Dscorecard.yml2 # by a third-party and are governed by separate terms of service, privacy
5 name: Scorecard supply-chain security
7 # For Branch-Protection check. Only the default branch is supported. See
8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
13 - cron: '43 11 * * 5'
18 permissions: read-all
23 runs-on: ubuntu-latest
25 # Needed to upload the results to code-scanning dashboard.
26 security-events: write
28 id-token: write
[all …]
/external/guava/.github/workflows/
Dscorecard.yml2 # by a third-party and are governed by separate terms of service, privacy
5 name: Scorecard supply-chain security
7 # For Branch-Protection check. Only the default branch is supported. See
8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
13 - cron: '45 9 * * 0'
18 permissions: read-all
23 runs-on: ubuntu-latest
25 # Needed to upload the results to code-scanning dashboard.
26 security-events: write
28 id-token: write
[all …]
/external/tink/docs/
DGOLANG-HOWTO.md1 # Tink for Go HOW-TO
69 ----------------- | ------------------------------------------------
89 activities Tink provides a command-line tool, [Tinkey](TINKEY.md), which can be
94 After generating key material, you might want to persist it to a storage system.
113 keyURI = "gcp-kms://projects/tink-examples/locations/global/keyRings/foo/cryptoKeys/bar"
114 credentialsPath = "credentials.json"
162 [AEAD examples](https://pkg.go.dev/github.com/google/tink/go/aead#example-package).
176 [Deterministic AEAD examples](https://pkg.go.dev/github.com/google/tink/go/daead#example-package).
186 [MAC examples](https://pkg.go.dev/github.com/google/tink/go/mac#example-package).
198 [digital signature examples](https://pkg.go.dev/github.com/google/tink/go/signature#example-package…
[all …]
/external/openthread/.github/workflows/
Dscorecards.yml30 # by a third-party and are governed by separate terms of service, privacy
33 name: Scorecards supply-chain security
35 # For Branch-Protection check. Only the default branch is supported. See
36 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
41 - cron: '33 12 * * 0'
46 permissions: read-all
51 runs-on: ubuntu-latest
53 # Needed to upload the results to code-scanning dashboard.
54 security-events: write
56 id-token: write
[all …]
/external/grpc-grpc/src/php/ext/grpc/
Dchannel.c9 * http://www.apache.org/licenses/LICENSE-2.0
49 if (free_channel && channel->wrapped) { in free_grpc_channel_wrapper()
50 grpc_channel_destroy(channel->wrapped); in free_grpc_channel_wrapper()
51 channel->wrapped = NULL; in free_grpc_channel_wrapper()
53 free(channel->target); in free_grpc_channel_wrapper()
54 free(channel->args_hashstr); in free_grpc_channel_wrapper()
55 free(channel->creds_hashstr); in free_grpc_channel_wrapper()
56 free(channel->key); in free_grpc_channel_wrapper()
57 channel->target = NULL; in free_grpc_channel_wrapper()
58 channel->args_hashstr = NULL; in free_grpc_channel_wrapper()
[all …]

1234