Searched +full:persist +full:- +full:credentials (Results 1 – 25 of 88) sorted by relevance
1234
| /external/grpc-grpc/src/php/tests/unit_tests/PersistentChannelTests/ |
| D | PersistentChannelTest.php | 10 * http://www.apache.org/licenses/LICENSE-2.0 33 $plist = $channel_clean_persistent->getPersistentList(); 34 $channel_clean_persistent->cleanPersistentList(); 40 $deadline = $now->add(new Grpc\Timeval(1000)); 41 if ($channel->watchConnectivityState(GRPC\CHANNEL_IDLE, 46 $this->assertTrue(false); 50 $this->assertTrue($state == GRPC\CHANNEL_CONNECTING || 64 $this->channel1 = new Grpc\Channel('localhost:1', ['force_new' => true]); 65 $channel1_info = $this->channel1->getChannelInfo(); 66 $plist_info = $this->channel1->getPersistentList(); [all …]
|
| /external/flatbuffers/.github/workflows/ |
| D | scorecards.yml | 1 name: Scorecards supply-chain security 6 - cron: '21 2 * * 5' 11 permissions: read-all 16 runs-on: ubuntu-latest 18 # Needed to upload the results to code-scanning dashboard. 19 security-events: write 24 - name: "Checkout code" 27 persist-credentials: false 29 - name: "Run analysis" 30 uses: ossf/scorecard-action@c1aec4ac820532bab364f02a81873c555a0ba3a1 # v1.0.4 [all …]
|
| /external/pcre/.github/workflows/ |
| D | scorecards.yml | 1 name: Scorecards supply-chain security 6 - cron: '23 17 * * 1' 11 permissions: read-all 16 runs-on: ubuntu-latest 18 # Needed to upload the results to code-scanning dashboard. 19 security-events: write 24 - name: "Checkout code" 27 persist-credentials: false 29 - name: "Run analysis" 30 uses: ossf/scorecard-action@3e15ea8318eee9b333819ec77a36aca8d39df13e # tag=v1.1.1 [all …]
|
| /external/apache-commons-lang/.github/workflows/ |
| D | coverage.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 26 runs-on: ubuntu-latest 32 - uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c 34 persist-credentials: false 35 - uses: actions/cache@v3.2.5 38 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} 39 restore-keys: | 40 ${{ runner.os }}-maven- 41 - name: Set up JDK ${{ matrix.java }} 42 uses: actions/setup-java@v3.10.0 [all …]
|
| D | maven.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 26 runs-on: ubuntu-latest 27 continue-on-error: ${{ matrix.experimental }} 33 # - java: 18-ea 36 - uses: actions/checkout@ac593985615ec2ede58e132d2e21d2b1cbd6127c 38 persist-credentials: false 39 - uses: actions/cache@v3.2.5 42 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} 43 restore-keys: | 44 ${{ runner.os }}-maven- [all …]
|
| D | scorecards-analysis.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 name: "Scorecards supply-chain security" 21 - cron: "30 1 * * 6" # Weekly on Saturdays 25 permissions: read-all 32 runs-on: ubuntu-latest 34 # Needed to upload the results to the code-scanning dashboard. 35 security-events: write 37 id-token: write # This is required for requesting the JWT 42 - name: "Checkout code" 45 persist-credentials: false [all …]
|
| D | codeql-analysis.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 25 - cron: '33 9 * * 4' 33 runs-on: ubuntu-latest 37 security-events: write 40 fail-fast: false 44 # Learn more about CodeQL language support at https://git.io/codeql-language-support 47 - name: Checkout repository 50 persist-credentials: false 51 - uses: actions/cache@v3.2.5 54 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} [all …]
|
| /external/deqp-deps/SPIRV-Tools/.github/workflows/ |
| D | scorecard.yml | 1 name: Scorecard supply-chain security 3 # For Branch-Protection check. Only the default branch is supported. See 4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 9 - cron: '36 17 * * 5' 14 permissions: read-all 19 runs-on: ubuntu-latest 21 security-events: write # to upload the results to code-scanning dashboard 22 id-token: write # to publish results and get a badge 25 - name: "Checkout code" 28 persist-credentials: false [all …]
|
| /external/swiftshader/third_party/SPIRV-Tools/.github/workflows/ |
| D | scorecard.yml | 1 name: Scorecard supply-chain security 3 # For Branch-Protection check. Only the default branch is supported. See 4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 9 - cron: '36 17 * * 5' 14 permissions: read-all 19 runs-on: ubuntu-latest 21 security-events: write # to upload the results to code-scanning dashboard 22 id-token: write # to publish results and get a badge 25 - name: "Checkout code" 28 persist-credentials: false [all …]
|
| /external/angle/third_party/glslang/src/.github/workflows/ |
| D | scorecard.yml | 1 name: Scorecard supply-chain security 3 # For Branch-Protection check. Only the default branch is supported. See 4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 9 - cron: '36 17 * * 5' 14 permissions: read-all 19 runs-on: ubuntu-latest 21 security-events: write # to upload the results to code-scanning dashboard 22 id-token: write # to publish results and get a badge 25 - name: "Checkout code" 28 persist-credentials: false [all …]
|
| /external/deqp-deps/glslang/.github/workflows/ |
| D | scorecard.yml | 1 name: Scorecard supply-chain security 3 # For Branch-Protection check. Only the default branch is supported. See 4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 9 - cron: '36 17 * * 5' 14 permissions: read-all 19 runs-on: ubuntu-latest 21 security-events: write # to upload the results to code-scanning dashboard 22 id-token: write # to publish results and get a badge 25 - name: "Checkout code" 28 persist-credentials: false [all …]
|
| /external/angle/third_party/spirv-tools/src/.github/workflows/ |
| D | scorecard.yml | 1 name: Scorecard supply-chain security 3 # For Branch-Protection check. Only the default branch is supported. See 4 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 9 - cron: '36 17 * * 5' 14 permissions: read-all 19 runs-on: ubuntu-latest 21 security-events: write # to upload the results to code-scanning dashboard 22 id-token: write # to publish results and get a badge 25 - name: "Checkout code" 28 persist-credentials: false [all …]
|
| /external/apache-commons-io/.github/workflows/ |
| D | coverage.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 26 runs-on: ubuntu-latest 32 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 34 persist-credentials: false 35 - uses: actions/cache@704facf57e6136b1bc63b828d79edcd491f0ee84 # v3.3.2 38 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} 39 restore-keys: | 40 ${{ runner.os }}-maven- 41 - name: Set up JDK ${{ matrix.java }} 42 uses: actions/setup-java@0ab4596768b603586c0de567f2430c30f5b0d2b0 # v3.13.0 [all …]
|
| D | maven.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 26 runs-on: ${{ matrix.os }} 27 continue-on-error: ${{ matrix.experimental }} 30 os: [ubuntu-latest, windows-latest, macos-latest] 34 # - java: 22-ea 35 # os: ubuntu-latest 37 # - java: 22-ea 38 # os: windows-latest 40 # - java: 22-ea 41 # os: macos-latest [all …]
|
| D | scorecards-analysis.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 16 name: "Scorecards supply-chain security" 21 - cron: "30 1 * * 6" # Weekly on Saturdays 25 permissions: read-all 32 runs-on: ubuntu-latest 34 # Needed to upload the results to the code-scanning dashboard. 35 security-events: write 37 id-token: write # This is required for requesting the JWT 42 - name: "Checkout code" 45 persist-credentials: false [all …]
|
| D | codeql-analysis.yml | 8 # http://www.apache.org/licenses/LICENSE-2.0 25 - cron: '33 9 * * 4' 33 runs-on: ubuntu-latest 37 security-events: write 40 fail-fast: false 44 # Learn more about CodeQL language support at https://git.io/codeql-language-support 47 - name: Checkout repository 50 persist-credentials: false 51 - uses: actions/cache@704facf57e6136b1bc63b828d79edcd491f0ee84 # v3.3.2 54 key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }} [all …]
|
| /external/rust/crates/chrono/.github/workflows/ |
| D | lint.yml | 4 # It's really `--all-features`, but not adding the mutually exclusive features from rkyv 5 …ALL_NON_EXCLUSIVE_FEATURES: --features "default unstable-locales rkyv-64 rkyv-validation rustc-ser… 14 runs-on: ubuntu-latest 17 - uses: actions/checkout@v4 18 - uses: dtolnay/rust-toolchain@stable 20 targets: x86_64-unknown-linux-gnu, x86_64-pc-windows-msvc 21 - uses: Swatinem/rust-cache@v2 22 - run: cargo fmt --check -- --color=always 23 - run: cargo fmt --check --manifest-path fuzz/Cargo.toml 24 - run: cargo fmt --check --manifest-path bench/Cargo.toml [all …]
|
| /external/zstd/.github/workflows/ |
| D | scorecards.yml | 1 name: Scorecards supply-chain security 6 - cron: '22 21 * * 2' 12 permissions: read-all 18 runs-on: ubuntu-latest 20 # Needed to upload the results to code-scanning dashboard. 21 security-events: write 23 id-token: write 29 - name: "Checkout code" 32 persist-credentials: false 34 - name: "Run analysis" [all …]
|
| /external/harfbuzz_ng/.github/workflows/ |
| D | scorecard.yml | 2 # by a third-party and are governed by separate terms of service, privacy 5 name: Scorecard supply-chain security 7 # For Branch-Protection check. Only the default branch is supported. See 8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 13 - cron: '19 14 * * 6' 18 permissions: read-all 23 runs-on: ubuntu-latest 25 # Needed to upload the results to code-scanning dashboard. 26 security-events: write 28 id-token: write [all …]
|
| /external/fmtlib/.github/workflows/ |
| D | scorecard.yml | 2 # by a third-party and are governed by separate terms of service, privacy 5 name: Scorecard supply-chain security 7 # For Branch-Protection check. Only the default branch is supported. See 8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 13 - cron: '26 14 * * 5' 18 permissions: read-all 23 runs-on: ubuntu-latest 25 # Needed to upload the results to code-scanning dashboard. 26 security-events: write 28 id-token: write [all …]
|
| /external/google-cloud-java/.github/workflows/ |
| D | scorecard.yml | 2 # by a third-party and are governed by separate terms of service, privacy 5 name: Scorecard supply-chain security 7 # For Branch-Protection check. Only the default branch is supported. See 8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 13 - cron: '43 11 * * 5' 18 permissions: read-all 23 runs-on: ubuntu-latest 25 # Needed to upload the results to code-scanning dashboard. 26 security-events: write 28 id-token: write [all …]
|
| /external/guava/.github/workflows/ |
| D | scorecard.yml | 2 # by a third-party and are governed by separate terms of service, privacy 5 name: Scorecard supply-chain security 7 # For Branch-Protection check. Only the default branch is supported. See 8 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 13 - cron: '45 9 * * 0' 18 permissions: read-all 23 runs-on: ubuntu-latest 25 # Needed to upload the results to code-scanning dashboard. 26 security-events: write 28 id-token: write [all …]
|
| /external/tink/docs/ |
| D | GOLANG-HOWTO.md | 1 # Tink for Go HOW-TO 69 ----------------- | ------------------------------------------------ 89 activities Tink provides a command-line tool, [Tinkey](TINKEY.md), which can be 94 After generating key material, you might want to persist it to a storage system. 113 keyURI = "gcp-kms://projects/tink-examples/locations/global/keyRings/foo/cryptoKeys/bar" 114 credentialsPath = "credentials.json" 162 [AEAD examples](https://pkg.go.dev/github.com/google/tink/go/aead#example-package). 176 [Deterministic AEAD examples](https://pkg.go.dev/github.com/google/tink/go/daead#example-package). 186 [MAC examples](https://pkg.go.dev/github.com/google/tink/go/mac#example-package). 198 [digital signature examples](https://pkg.go.dev/github.com/google/tink/go/signature#example-package… [all …]
|
| /external/openthread/.github/workflows/ |
| D | scorecards.yml | 30 # by a third-party and are governed by separate terms of service, privacy 33 name: Scorecards supply-chain security 35 # For Branch-Protection check. Only the default branch is supported. See 36 # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection 41 - cron: '33 12 * * 0' 46 permissions: read-all 51 runs-on: ubuntu-latest 53 # Needed to upload the results to code-scanning dashboard. 54 security-events: write 56 id-token: write [all …]
|
| /external/grpc-grpc/src/php/ext/grpc/ |
| D | channel.c | 9 * http://www.apache.org/licenses/LICENSE-2.0 49 if (free_channel && channel->wrapped) { in free_grpc_channel_wrapper() 50 grpc_channel_destroy(channel->wrapped); in free_grpc_channel_wrapper() 51 channel->wrapped = NULL; in free_grpc_channel_wrapper() 53 free(channel->target); in free_grpc_channel_wrapper() 54 free(channel->args_hashstr); in free_grpc_channel_wrapper() 55 free(channel->creds_hashstr); in free_grpc_channel_wrapper() 56 free(channel->key); in free_grpc_channel_wrapper() 57 channel->target = NULL; in free_grpc_channel_wrapper() 58 channel->args_hashstr = NULL; in free_grpc_channel_wrapper() [all …]
|
1234