/external/openthread/.github/workflows/ |
D | build.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 49 runs-on: ubuntu-24.04 51 - name: Harden Runner 52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 54 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 56 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 [all …]
|
D | toranj.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 toranj-ncp: 49 name: toranj-ncp-${{ matrix.TORANJ_RADIO }} 50 runs-on: ubuntu-22.04 52 fail-fast: false 61 - name: Harden Runner [all …]
|
D | simulation-1.1.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 packet-verification: 49 runs-on: ubuntu-24.04 57 - name: Harden Runner 58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
D | posix.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 expects-linux: 49 runs-on: ubuntu-22.04 51 CFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15 52 CXXFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15 54 - name: Harden Runner [all …]
|
D | simulation-1.4.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 48 thread-1-4: 49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }} 50 runs-on: ubuntu-22.04 52 CFLAGS: -${{ matrix.arch }} [all …]
|
D | unit.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 48 tcplp-buffering: 49 runs-on: ubuntu-24.04 51 - name: Harden Runner 52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 [all …]
|
D | otns.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 51 permissions: # added using https://github.com/step-security/secure-workflows 58 runs-on: ubuntu-24.04 60 - name: Harden Runner 61 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 63 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
D | docker.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 52 fail-fast: false 55 - platform: linux/amd64 56 runner: ubuntu-24.04 57 - platform: linux/arm64 [all …]
|
D | makefile-check.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 47 makefile-check: 48 runs-on: ubuntu-24.04 50 - name: Harden Runner 51 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 [all …]
|
D | version.yml | 34 - 'main' 37 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 38 cancel-in-progress: true 40 permissions: # added using https://github.com/step-security/secure-workflows 44 api-version: 45 runs-on: ubuntu-24.04 47 - name: Harden Runner 48 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 50 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 52 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 [all …]
|
D | size.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 size-report: 49 runs-on: ubuntu-24.04 51 - name: Harden Runner 52 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 54 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
D | fuzz.yml | 34 - 'main' 37 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 38 cancel-in-progress: true 40 permissions: # added using https://github.com/step-security/secure-workflows 45 runs-on: ubuntu-24.04 47 - name: Harden Runner 48 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 50 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 52 - name: Build Fuzzers 53 …uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@c0e4bb8d15a68b7f8cc731ea75523e48a2301bcf … [all …]
|
D | codeql.yml | 37 permissions: # added using https://github.com/step-security/secure-workflows 43 runs-on: ubuntu-latest 47 security-events: write 50 fail-fast: false 53 # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support 56 - name: Harden Runner 57 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 59 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs 61 - name: Checkout repository 64 - name: Bootstrap [all …]
|
D | otci.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 48 cli-sim: 49 name: cli-sim VIRTUAL_TIME=${{ matrix.virtual_time }} 50 runs-on: ubuntu-24.04 52 fail-fast: false [all …]
|
/external/linux-kselftest/tools/testing/selftests/drivers/net/ocelot/ |
D | tc_flower_chains.sh | 2 # SPDX-License-Identifier: GPL-2.0 19 # Helpers to map a VCAP IS1 and VCAP IS2 lookup and policy to a chain number 24 # VCAP IS2 lookup 0 policy 0: 20000 25 # VCAP IS2 lookup 0 policy 1: 20001 26 # VCAP IS2 lookup 0 policy 255: 20255 27 # VCAP IS2 lookup 1 policy 0: 21000 28 # VCAP IS2 lookup 1 policy 1: 21001 29 # VCAP IS2 lookup 1 policy 255: 21255 52 # +----------------------------------------------+ +-----------------------------------------+ 55 # | +----------+ +----------+ +----------+ | | +----------+ +----------+ | [all …]
|
/external/iproute2/doc/actions/ |
D | mirred-usage | 14 DIRECTION := <ingress | egress> 16 INDEX is the specific policy instance id 20 - Ingress is not supported at the moment. It will be in the 24 - Mirror takes a copy of the packet and sends it to specified 26 - redirect 30 ------------------------------------------------------ 33 Loops are not hard to create in the egress qdiscs. 47 2) eth0->eth1-> eth0 48 3) eth0->lo-> eth1-> eth0 54 Redirecting from ifbX->ifbY will actually not crash your machine but your [all …]
|
/external/iproute2/tc/ |
D | m_mirred.c | 2 * m_egress.c ingress/egress packet mirror/redir actions module 34 fprintf(stderr, "\tDIRECTION := <ingress | egress>\n"); in explain() 36 fprintf(stderr, "\tINDEX is the specific policy instance id\n"); in explain() 45 exit(-1); in usage() 52 return "Egress Redirect"; in mirred_n2a() 56 return "Egress Mirror"; in mirred_n2a() 71 int ok = 0, iok = 0, mirror = 0, redir = 0, ingress = 0, egress = 0; in parse_direction() local 80 } else if (!egress && matches(*argv, "egress") == 0) { in parse_direction() 81 egress = 1; in parse_direction() 83 fprintf(stderr, "Can't have both egress and ingress\n"); in parse_direction() [all …]
|
/external/googleapis/google/cloud/run/v2/ |
D | vendor_settings.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 27 // network, visit https://cloud.google.com/run/docs/configuring/connecting-vpc. 29 // Egress options for VPC access. 41 // Direct VPC egress settings. 65 // visit https://cloud.google.com/run/docs/configuring/vpc-connectors. 70 // Traffic VPC egress settings. If not provided, it defaults to 72 VpcEgress egress = 2; field 74 // Direct VPC egress settings. Currently only single network interface is 83 // policy. If False, binary authorization will be disabled. 90 // https://cloud.google.com/binary-authorization/docs/using-breakglass [all …]
|
/external/google-cloud-java/java-network-management/proto-google-cloud-network-management-v1beta1/src/main/java/com/google/cloud/networkmanagement/v1beta1/ |
D | FirewallInfoOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 31 * to hierarchical firewall policy rules. 44 * to hierarchical firewall policy rules. 58 * implied firewall rules or hierarchical firewall policy rules. 71 * implied firewall rules or hierarchical firewall policy rules. 84 * Possible values: INGRESS, EGRESS 96 * Possible values: INGRESS, EGRESS 148 * This field is not applicable to hierarchical firewall policy rules. 161 * This field is not applicable to hierarchical firewall policy rules. 175 * applicable to hierarchical firewall policy rules. [all …]
|
/external/google-cloud-java/java-network-management/proto-google-cloud-network-management-v1/src/main/java/com/google/cloud/networkmanagement/v1/ |
D | FirewallInfoOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 31 * to hierarchical firewall policy rules. 44 * to hierarchical firewall policy rules. 58 * implied firewall rules or hierarchical firewall policy rules. 71 * implied firewall rules or hierarchical firewall policy rules. 84 * Possible values: INGRESS, EGRESS 96 * Possible values: INGRESS, EGRESS 148 * This field is not applicable to hierarchical firewall policy rules. 161 * This field is not applicable to hierarchical firewall policy rules. 175 * applicable to hierarchical firewall policy rules. [all …]
|
/external/google-cloud-java/java-run/proto-google-cloud-run-v2/src/main/proto/google/cloud/run/v2/ |
D | vendor_settings.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 27 // https://cloud.google.com/vpc/docs/configure-serverless-vpc-access For 29 // visit https://cloud.google.com/run/docs/configuring/connecting-vpc 31 // Egress options for VPC access. 50 // Traffic VPC egress settings. 51 VpcEgress egress = 2; field 58 // policy. If False, binary authorization will be disabled. 65 // https://cloud.google.com/binary-authorization/docs/using-breakglass 69 // Settings for revision-level scaling settings.
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_tunnel.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # End-to-end eBPF tunnel test suite 8 # --------- 11 # ----------- | ----------- 13 # ----------- | ----------- 14 # metadata-mode | native-mode 17 # ---------- | ---------- 18 # | veth1 | --------- | veth0 | (underlay network) 19 # ---------- peer ---------- 23 # -------------------- [all …]
|
/external/libnl/lib/route/act/ |
D | mirred.c | 1 /* SPDX-License-Identifier: LGPL-2.1-only */ 13 #include "nl-default.h" 20 #include "tc-api.h" 41 return -NLE_MISSING_ATTR; in mirred_msg_parser() 43 nla_memcpy(&u->m_parm, tb[TCA_MIRRED_PARMS], sizeof(u->m_parm)); in mirred_msg_parser() 58 nl_dump(p, " index %u", u->m_parm.ifindex); in mirred_dump_line() 60 if (u->m_parm.eaction == TCA_EGRESS_MIRROR) in mirred_dump_line() 61 nl_dump(p, " egress mirror"); in mirred_dump_line() 62 else if (u->m_parm.eaction == TCA_EGRESS_REDIR) in mirred_dump_line() 63 nl_dump(p, " egress redirect"); in mirred_dump_line() [all …]
|
/external/google-cloud-java/java-beyondcorp-clientconnectorservices/google-cloud-beyondcorp-clientconnectorservices/src/test/java/com/google/cloud/beyondcorp/clientconnectorservices/v1/ |
D | ClientConnectorServicesServiceClientTest.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 39 import com.google.iam.v1.Policy; 66 @Generated("by gapic-generator-java") 166 String parent = "parent-995424086"; in listClientConnectorServicesTest2() 194 String parent = "parent-995424086"; in listClientConnectorServicesExceptionTest2() 214 .setEgress(ClientConnectorService.Egress.newBuilder().build()) in getClientConnectorServiceTest() 263 .setEgress(ClientConnectorService.Egress.newBuilder().build()) in getClientConnectorServiceTest2() 310 .setEgress(ClientConnectorService.Egress.newBuilder().build()) in createClientConnectorServiceTest() 378 .setEgress(ClientConnectorService.Egress.newBuilder().build()) in createClientConnectorServiceTest2() 388 String parent = "parent-995424086"; in createClientConnectorServiceTest2() [all …]
|
/external/python/google-api-python-client/docs/dyn/ |
D | accesscontextmanager_v1.accessPolicies.servicePerimeters.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|