/external/aws-sdk-java-v2/.github/workflows/ |
D | codebuild-ci.yml | 4 paths-ignore: 5 - '**.md' 6 - '.all-contributorsrc' 7 - 'docs/**' 10 - master 11 paths-ignore: 12 - '**.md' 13 - '.all-contributorsrc' 14 - 'docs/**' 17 id-token: write [all …]
|
/external/pytorch/.github/workflows/ |
D | _docs.yml | 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image: 13 description: Docker image to run in. 18 description: If set, push the docs to the docs website. 19 run-doxygen: 24 sync-tag: 29 If this is set, our linter will use this to make sure that every other 30 job with the same `sync-tag` is identical. 31 s3-bucket: [all …]
|
D | _linux-test-label.yml | 1 name: linux-test-rg 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 test-matrix: 13 description: JSON description of what test configs to run. 14 docker-image: 17 description: Docker image to run in. 18 sync-tag: 23 If this is set, our linter will use this to make sure that every other 24 job with the same `sync-tag` is identical. [all …]
|
D | _linux-test-rg.yml | 1 name: linux-test-label 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 test-matrix: 13 description: JSON description of what test configs to run. 14 docker-image: 17 description: Docker image to run in. 18 sync-tag: 23 If this is set, our linter will use this to make sure that every other 24 job with the same `sync-tag` is identical. [all …]
|
D | _linux-build-rg.yml | 1 name: linux-build-rg 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 13 description: Name of the base docker image to build with. 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 29 If this is set, our linter will use this to make sure that every other 30 job with the same `sync-tag` is identical. [all …]
|
D | _linux-build-label.yml | 1 name: linux-build 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 13 description: Name of the base docker image to build with. 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 29 If this is set, our linter will use this to make sure that every other 30 job with the same `sync-tag` is identical. [all …]
|
D | _linux-build.yml | 1 name: linux-build 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 13 description: Name of the base docker image to build with. 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 29 If this is set, our linter will use this to make sure that every other 30 job with the same `sync-tag` is identical. [all …]
|
D | _binary-upload.yml | 17 …ually needed, but currently passing it in since we pass in the same inputs to the reusable workflo… 21 …ually needed, but currently passing it in since we pass in the same inputs to the reusable workflo… 41 description: Docker image to use 59 github-token: 62 conda-pytorchbot-token: 65 conda-pytorchbot-token-test: 71 runs-on: ubuntu-22.04 72 …refs/heads/nightly' || startsWith(github.event.ref, 'refs/tags/v'))) && 'conda-aws-upload' || '' }} 79 # TODO: This is a legacy variable that we eventually want to get rid of in 92 GITHUB_TOKEN: ${{ secrets.github-token }} [all …]
|
D | update_pytorch_labels.yml | 9 cancel-in-progress: true 12 update-labels-in-S3: 13 runs-on: ubuntu-22.04 16 id-token: write 19 - name: Checkout PyTorch 20 uses: pytorch/pytorch/.github/actions/checkout-pytorch@release/2.4 22 fetch-depth: 1 24 - name: configure aws credentials 26 uses: aws-actions/configure-aws-credentials@v4 28 role-to-assume: arn:aws:iam::308535385114:role/gha_workflow_update_pytorch_labels [all …]
|
/external/aws-sdk-java-v2/services/sts/src/main/resources/codegen-resources/ |
D | examples-1.json | 9 …"Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Ac… 10 "RoleArn": "arn:aws:iam::123456789012:role/demo", 15 "Arn": "arn:aws:sts::123456789012:assumed-role/demo/Bob", 20 "Expiration": "2011-07-15T23:28:33.359Z", 33 "id": "to-assume-a-role-1480532402212", 34 "title": "To assume a role" 42 "RoleArn": "arn:aws:iam::123456789012:role/FederatedWebIdentityRole", 44 …m6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxo… 48 "Arn": "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1", 54 "Expiration": "2014-10-24T23:00:23Z", [all …]
|
D | service-2.json | 4 "apiVersion":"2011-06-15", 12 "uid":"sts-2011-06-15", 13 "xmlNamespace":"https://sts.amazonaws.com/doc/2011-06-15/" 33 …to access Amazon Web Services resources. These temporary credentials consist of an access key ID, … 54 …to role-based Amazon Web Services access without user-specific credentials or configuration. For a… 76 …-compatible identity provider such as Google or <a href=\"https://docs.aws.amazon.com/cognito/late… 92 …to an Amazon Web Services request.</p> <p>For example, if a user is not authorized to perform an o… 105 …-keys.html\">Managing Access Keys for IAM Users</a> in the <i>IAM User Guide</i>.</p> <p>When you … 118 …role whose credentials are used to call the operation.</p> <note> <p>No permissions are required t… 136 …-term security credentials of an IAM user. As a result, this call is appropriate in contexts where… [all …]
|
/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/java/com/google/cloud/bigquery/connection/v1/ |
D | AwsPropertiesOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 30 * Authentication using Google owned AWS IAM user's access key to assume 31 * into customer's AWS IAM Role. 49 * Authentication using Google owned AWS IAM user's access key to assume 50 * into customer's AWS IAM Role. 68 * Authentication using Google owned AWS IAM user's access key to assume 69 * into customer's AWS IAM Role. 85 * Authentication using Google owned service account to assume into 86 * customer's AWS IAM Role. [all …]
|
D | AwsProperties.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 25 * Connection properties specific to Amazon Web Services (AWS). 35 // Use AwsProperties.newBuilder() to construct. 85 * @param value The number of the enum to look for. 121 * Authentication using Google owned AWS IAM user's access key to assume 122 * into customer's AWS IAM Role. 143 * Authentication using Google owned AWS IAM user's access key to assume 144 * into customer's AWS IAM Role. 168 * Authentication using Google owned AWS IAM user's access key to assume [all …]
|
/external/aws-sdk-java-v2/services/sts/src/it/java/software/amazon/awssdk/services/sts/ |
D | AssumeRoleIntegrationTest.java | 51 //TODO This could be useful to cleanup and present as a customer sample 56 private static final String USER_NAME = "assume-role-integration-test-user"; 63 private static final String ROLE_NAME = "assume-role-integration-test-role"; 64 private static final String ROLE_ARN_FORMAT = "arn:aws:iam::%s:role/" + ROLE_NAME; 79 iam.createUser(r -> r.userName(USER_NAME)); in setup() 81 // Test user already exists - awesome. in setup() 84 // Create a managed policy that allows the user to assume a role in setup() 86 iam.createPolicy(r -> r.policyName("AssumeRoleIntegrationTestPolicy") in setup() 92 // Policy already exists - awesome. in setup() 95 // Attach the policy to the user (if it isn't already attached) in setup() [all …]
|
/external/aws-sdk-java-v2/services/kinesisanalytics/src/main/resources/codegen-resources/ |
D | service-2.json | 4 "apiVersion":"2015-08-14", 13 "uid":"kinesisanalytics-2015-08-14" 31 …to monitor application configuration errors. For more information about using CloudWatch log strea… 49 …to your Amazon Kinesis application. For conceptual information, see <a href=\"https://docs.aws.ama… 66 …v/API_InputProcessingConfiguration.html\">InputProcessingConfiguration</a> to an application. An i… 83 …to your Amazon Kinesis Analytics application.</p> <p>If you want Amazon Kinesis Analytics to deliv… 100 …to an existing application.</p> <p>Amazon Kinesis Analytics reads reference data (that is, an Amaz… 118 …to process the input, and up to three destinations where you want Amazon Kinesis Analytics to writ… 134 …n artifacts (such as in-application streams, reference table, and application code).</p> <p>This o… 151 …<a href=\"https://docs.aws.amazon.com/kinesisanalytics/latest/dev/cloudwatch-logs.html\">Working w… [all …]
|
/external/google-cloud-java/java-gke-multi-cloud/proto-google-cloud-gke-multi-cloud-v1/src/main/java/com/google/cloud/gkemulticloud/v1/ |
D | AwsServicesAuthenticationOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 30 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 31 * Multi-Cloud API will assume when managing AWS resources on your account. 43 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 44 * Multi-Cloud API will assume when managing AWS resources on your account. 57 * Optional. An identifier for the assumed role session. 58 * When unspecified, it defaults to `multicloud-service-agent`. 70 * Optional. An identifier for the assumed role session. 71 * When unspecified, it defaults to `multicloud-service-agent`.
|
D | AwsServicesAuthentication.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 35 // Use AwsServicesAuthentication.newBuilder() to construct. 79 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 80 * Multi-Cloud API will assume when managing AWS resources on your account. 103 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 104 * Multi-Cloud API will assume when managing AWS resources on your account. 132 * Optional. An identifier for the assumed role session. 133 * When unspecified, it defaults to `multicloud-service-agent`. 156 * Optional. An identifier for the assumed role session. [all …]
|
/external/aws-sdk-java-v2/core/profiles/src/main/java/software/amazon/awssdk/profiles/ |
D | ProfileProperty.java | 43 * Property name for specifying the IAM role to assume 48 * Property name for specifying the IAM role session name 53 * Property name for specifying how long in seconds to assume the role 58 * Property name for specifying the IAM role external id 63 * Property name for specifying the profile credentials to use when assuming a role 68 * Property name for specifying the credential source to use when assuming a role 73 * AWS Region to use when creating clients. 88 * An external process that should be invoked to load credentials. 95 …* The S3 regional endpoint setting for the {@code us-east-1} region. Setting the value to {@code r… 96 …* the SDK to use the {@code s3.us-east-1.amazonaws.com} endpoint when using the {@code US_EAST_1} … [all …]
|
/external/aws-sdk-java-v2/services/sts/src/main/java/software/amazon/awssdk/services/sts/auth/ |
D | StsAssumeRoleWithSamlCredentialsProvider.java | 34 …ink AwsCredentialsProvider} that periodically sends an {@link AssumeRoleWithSamlRequest} to the AWS 35 …* Security Token Service to maintain short-lived sessions to use for authentication. These session… 38 …* If the credentials are not successfully updated before expiration, calls to {@link #resolveCrede… 57 super(builder, "sts-assume-role-with-saml-credentials-provider"); in StsAssumeRoleWithSamlCredentialsProvider() 58 …Validate.notNull(builder.assumeRoleWithSamlRequestSupplier, "Assume role with SAML request must no… in StsAssumeRoleWithSamlCredentialsProvider() 73 … Validate.notNull(assumeRoleWithSamlRequest, "Assume role with saml request must not be null."); in getUpdatedCredentials() 105 …the {@link AssumeRoleWithSamlRequest} that should be periodically sent to the STS service to update 106 * the session token when it gets close to expiring. 108 …* @param assumeRoleWithSamlRequest The request to send to STS whenever the assumed session expires. 112 return refreshRequest(() -> assumeRoleWithSamlRequest); in refreshRequest() [all …]
|
D | StsAssumeRoleCredentialsProvider.java | 34 …n of {@link AwsCredentialsProvider} that periodically sends an {@link AssumeRoleRequest} to the AWS 35 …* Security Token Service to maintain short-lived sessions to use for authentication. These session… 38 …* If the credentials are not successfully updated before expiration, calls to {@link #resolveCrede… 56 super(builder, "sts-assume-role-credentials-provider"); in StsAssumeRoleCredentialsProvider() 57 … Validate.notNull(builder.assumeRoleRequestSupplier, "Assume role request must not be null."); in StsAssumeRoleCredentialsProvider() 72 Validate.notNull(assumeRoleRequest, "Assume role request must not be null."); in getUpdatedCredentials() 104 …re the {@link AssumeRoleRequest} that should be periodically sent to the STS service to update the… 107 * @param assumeRoleRequest The request to send to STS whenever the assumed session expires. 111 return refreshRequest(() -> assumeRoleRequest); in refreshRequest() 115 …* Similar to {@link #refreshRequest(AssumeRoleRequest)}, but takes a {@link Supplier} to supply th… [all …]
|
/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/proto/google/cloud/bigquery/connection/v1/ |
D | connection.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 9 // Unless required by applicable law or agreed to in writing, software 47 "https://www.googleapis.com/auth/cloud-platform"; 123 // Note: This operation is designed to be used for building permission-aware 124 // UIs and command-line tools, not for authorization checking. This operation 148 // Optional. Connection id that should be assigned to the created connection. 151 // Required. Connection to create. 200 // Required. Name of the connection to update, for example: 212 // Required. Update mask for the connection fields to be updated. 229 // Configuration parameters to establish connection with an external data [all …]
|
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 1 Role Statements 4 role section in Role Statements 5 ---- 7 Declares a role identifier in the current namespace. 12 (role role_id) 24 <td align="left"><p><code>role</code></p></td> 25 <td align="left"><p>The <code>role</code> keyword.</p></td> 29 <td align="left"><p>The <code>role</code> identifier.</p></td> 36 This example declares two roles: `object_r` in the global namespace and `unconfined.role`: 39 (role object_r) [all …]
|
/external/aws-sdk-java-v2/test/test-utils/src/main/java/software/amazon/awssdk/core/auth/policy/ |
D | Principal.java | 19 * A principal is an AWS account or AWS web service, which is being allowed or denied access to a 24 * "A has permission to do B to C where D applies." 26 * In an access control policy statement, you can set the principal to all 28 * is useful when you don't want to restrict access based on the identity of the 37 * This is useful when you don't want to restrict access based on the 63 * is being allowed or denied access to a resource through an access control 109 id.replace("-", "") : id; in Principal() 180 * The services who have the right to do the assume the role 182 * credentials that you can use to access resources that are defined in the 183 * role's policy. The returned credentials consist of an Access Key ID, a [all …]
|
/external/googleapis/google/cloud/bigquery/connection/v1/ |
D | connection.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 9 // Unless required by applicable law or agreed to in writing, software 47 "https://www.googleapis.com/auth/cloud-platform"; 123 // Note: This operation is designed to be used for building permission-aware 124 // UIs and command-line tools, not for authorization checking. This operation 148 // Optional. Connection id that should be assigned to the created connection. 151 // Required. Connection to create. 200 // Required. Name of the connection to update, for example: 212 // Required. Update mask for the connection fields to be updated. 229 // Configuration parameters to establish connection with an external data [all …]
|
/external/pytorch/.github/actions/linux-test/ |
D | action.yml | 1 name: linux-test 4 build-environment: 7 description: Top-level label for what's being built/tested. 8 test-matrix: 11 description: JSON description of what test configs to run. 12 docker-image: 15 description: Docker image to run in. 16 sync-tag: 21 If this is set, our linter will use this to make sure that every other 22 job with the same `sync-tag` is identical. [all …]
|