/aosp_15_r20/external/aws-sdk-java-v2/.github/workflows/ |
H A D | codebuild-ci.yml | 4 paths-ignore: 5 - '**.md' 6 - '.all-contributorsrc' 7 - 'docs/**' 10 - master 11 paths-ignore: 12 - '**.md' 13 - '.all-contributorsrc' 14 - 'docs/**' 17 id-token: write [all …]
|
/aosp_15_r20/external/pytorch/.github/workflows/ |
H A D | _docs.yml | 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image: 19 run-doxygen: 24 sync-tag: 30 job with the same `sync-tag` is identical. 31 s3-bucket: 35 default: "gha-artifacts" 36 aws-role-to-assume: 37 description: role to assume for downloading artifacts [all …]
|
H A D | _linux-build.yml | 1 name: linux-build 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 30 job with the same `sync-tag` is identical. 31 cuda-arch-list: 43 test-matrix: [all …]
|
H A D | _linux-test-rg.yml | 1 name: linux-test-label 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 test-matrix: 14 docker-image: 18 sync-tag: 24 job with the same `sync-tag` is identical. 25 timeout-minutes: 31 use-gha: 36 dashboard-tag: [all …]
|
H A D | _linux-test-label.yml | 1 name: linux-test-rg 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 test-matrix: 14 docker-image: 18 sync-tag: 24 job with the same `sync-tag` is identical. 25 timeout-minutes: 31 use-gha: 36 dashboard-tag: [all …]
|
H A D | _linux-build-rg.yml | 1 name: linux-build-rg 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 30 job with the same `sync-tag` is identical. 31 cuda-arch-list: 37 runner-group: [all …]
|
H A D | _linux-build-label.yml | 1 name: linux-build 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 docker-image-name: 14 build-generates-artifacts: 19 build-with-debug: 24 sync-tag: 30 job with the same `sync-tag` is identical. 31 cuda-arch-list: 42 test-matrix: [all …]
|
H A D | _linux-test.yml | 1 name: linux-test 6 build-environment: 9 description: Top-level label for what's being built/tested. 10 test-matrix: 14 docker-image: 18 sync-tag: 24 job with the same `sync-tag` is identical. 25 timeout-minutes: 31 use-gha: 36 dashboard-tag: [all …]
|
/aosp_15_r20/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/java/com/google/cloud/bigquery/connection/v1/ |
H A D | AwsProperties.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 121 * Authentication using Google owned AWS IAM user's access key to assume 122 * into customer's AWS IAM Role. 143 * Authentication using Google owned AWS IAM user's access key to assume 144 * into customer's AWS IAM Role. 168 * Authentication using Google owned AWS IAM user's access key to assume 169 * into customer's AWS IAM Role. 192 * Authentication using Google owned service account to assume into 193 * customer's AWS IAM Role. 208 * Authentication using Google owned service account to assume into [all …]
|
H A D | AwsPropertiesOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 * Authentication using Google owned AWS IAM user's access key to assume 31 * into customer's AWS IAM Role. 49 * Authentication using Google owned AWS IAM user's access key to assume 50 * into customer's AWS IAM Role. 68 * Authentication using Google owned AWS IAM user's access key to assume 69 * into customer's AWS IAM Role. 85 * Authentication using Google owned service account to assume into 86 * customer's AWS IAM Role. 98 * Authentication using Google owned service account to assume into [all …]
|
/aosp_15_r20/external/aws-sdk-java-v2/services/kinesisanalytics/src/main/resources/codegen-resources/ |
H A D | service-2.json | 4 "apiVersion":"2015-08-14", 13 "uid":"kinesisanalytics-2015-08-14" 31 …<a href=\"https://docs.aws.amazon.com/kinesisanalytics/latest/dev/cloudwatch-logs.html\">Working w… 49 …e <a href=\"https://docs.aws.amazon.com/kinesisanalytics/latest/dev/how-it-works-input.html\">Conf… 83 …-application stream within your application to an external destination (such as an Amazon Kinesis … 100 …-application table within your application. In the request, you provide the source (S3 bucket name… 118 …-it-works.html\">How it Works</a>. </p> <p>In the input configuration, you map the streaming sourc… 134 …and deletes the application, including any application artifacts (such as in-application streams, … 151 …<a href=\"https://docs.aws.amazon.com/kinesisanalytics/latest/dev/cloudwatch-logs.html\">Working w… 185 …Amazon Kinesis Analytics will no longer write data from the corresponding in-application stream to… [all …]
|
/aosp_15_r20/external/aws-sdk-java-v2/services/sts/src/main/resources/codegen-resources/ |
H A D | service-2.json | 4 "apiVersion":"2011-06-15", 12 "uid":"sts-2011-06-15", 13 "xmlNamespace":"https://sts.amazonaws.com/doc/2011-06-15/" 33 …-account access. For a comparison of <code>AssumeRole</code> with other API operations that produc… 54 …role-based Amazon Web Services access without user-specific credentials or configuration. For a co… 76 …-compatible identity provider such as Google or <a href=\"https://docs.aws.amazon.com/cognito/late… 92 …ws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html#policy-eval-denyallow\… 105 …-keys.html\">Managing Access Keys for IAM Users</a> in the <i>IAM User Guide</i>.</p> <p>When you … 118 …role whose credentials are used to call the operation.</p> <note> <p>No permissions are required t… 136 …-term security credentials of an IAM user. As a result, this call is appropriate in contexts where… [all …]
|
H A D | examples-1.json | 9 …"Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"Stmt1\",\"Effect\":\"Allow\",\"Ac… 10 "RoleArn": "arn:aws:iam::123456789012:role/demo", 15 "Arn": "arn:aws:sts::123456789012:assumed-role/demo/Bob", 20 "Expiration": "2011-07-15T23:28:33.359Z", 33 "id": "to-assume-a-role-1480532402212", 34 "title": "To assume a role" 42 "RoleArn": "arn:aws:iam::123456789012:role/FederatedWebIdentityRole", 44 …m6Ry6_BG7PrtLZtj_dfCTj92xNGed-CrKqjG7nPBjNIL016GGvuS5gSvPRUxWES3VYfm1wl7WTI7jn-Pcb6M-buCgHhFOzTQxo… 48 "Arn": "arn:aws:sts::123456789012:assumed-role/FederatedWebIdentityRole/app1", 54 "Expiration": "2014-10-24T23:00:23Z", [all …]
|
/aosp_15_r20/external/aws-sdk-java-v2/services/sts/src/it/java/software/amazon/awssdk/services/sts/ |
H A D | AssumeRoleIntegrationTest.java | 56 private static final String USER_NAME = "assume-role-integration-test-user"; 63 private static final String ROLE_NAME = "assume-role-integration-test-role"; 64 private static final String ROLE_ARN_FORMAT = "arn:aws:iam::%s:role/" + ROLE_NAME; 79 iam.createUser(r -> r.userName(USER_NAME)); in setup() 81 // Test user already exists - awesome. in setup() 84 // Create a managed policy that allows the user to assume a role in setup() 86 iam.createPolicy(r -> r.policyName("AssumeRoleIntegrationTestPolicy") in setup() 92 // Policy already exists - awesome. in setup() 96 …iam.attachUserPolicy(r -> r.userName(USER_NAME).policyArn(String.format(POLICY_ARN_FORMAT, account… in setup() 98 …// Try to create a role that can be assumed by the user, until the eventual consistency catches up. in setup() [all …]
|
/aosp_15_r20/cts/hostsidetests/securitybulletin/test-apps/CVE-2024-43769/test-app/src/android/security/cts/CVE_2024_43769/ |
H A D | DeviceTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 29 import static com.google.common.truth.TruthJUnit.assume; 32 import android.app.role.RoleManager; 60 () -> { in testPocCVE_2024_43769() 66 assume().withMessage("Device should not have managed user !!") in testPocCVE_2024_43769() 70 // Bypass role qualification to add 'DEVICE_POLICY_MANAGEMENT' role and assign in testPocCVE_2024_43769() 71 // 'DEVICE_POLICY_MANAGEMENT' role holder to the helper application to make it a in testPocCVE_2024_43769() 83 assume().withMessage("Failed to grant 'DEVICE_POLICY_MANAGEMENT' role!!") in testPocCVE_2024_43769() 106 assume().that(e).isNull(); in testPocCVE_2024_43769() 114 () -> { in withBypassingRoleQualificationTrue() [all …]
|
/aosp_15_r20/external/google-cloud-java/java-gke-multi-cloud/proto-google-cloud-gke-multi-cloud-v1/src/main/java/com/google/cloud/gkemulticloud/v1/ |
H A D | AwsServicesAuthentication.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 79 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 80 * Multi-Cloud API will assume when managing AWS resources on your account. 103 * Required. The Amazon Resource Name (ARN) of the role that the Anthos 104 * Multi-Cloud API will assume when managing AWS resources on your account. 132 * Optional. An identifier for the assumed role session. 133 * When unspecified, it defaults to `multicloud-service-agent`. 156 * Optional. An identifier for the assumed role session. 157 * When unspecified, it defaults to `multicloud-service-agent`. 177 private byte memoizedIsInitialized = -1; [all …]
|
/aosp_15_r20/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/proto/google/cloud/bigquery/connection/v1/ |
H A D | connection.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 47 "https://www.googleapis.com/auth/cloud-platform"; 123 // Note: This operation is designed to be used for building permission-aware 124 // UIs and command-line tools, not for authorization checking. This operation 335 // Optional. Cloud Spanner database role for fine-grained access control. 336 // A database role is a collection of fine-grained access privileges. Example: 338 // INSERT, ..). The user can then specify a predefined role on a connection to 339 // execute their Cloud Spanner query. The role is passthrough here. If the 340 // user is not authorized to use the specified role, they get an error. This 343 // See https://cloud.google.com/spanner/docs/fgac-about for more details. [all …]
|
/aosp_15_r20/external/googleapis/google/cloud/bigquery/connection/v1/ |
H A D | connection.proto | 7 // http://www.apache.org/licenses/LICENSE-2.0 47 "https://www.googleapis.com/auth/cloud-platform"; 123 // Note: This operation is designed to be used for building permission-aware 124 // UIs and command-line tools, not for authorization checking. This operation 359 // Optional. Cloud Spanner database role for fine-grained access control. 360 // The Cloud Spanner admin should have provisioned the database role with 364 // For more details, see [About fine-grained access control] 365 // (https://cloud.google.com/spanner/docs/fgac-about). 367 // REQUIRES: The database role name must start with a letter, and can only 376 // Authentication using Google owned AWS IAM user's access key to assume [all …]
|
/aosp_15_r20/packages/modules/Permission/tests/cts/rolemultiuser/src/android/app/rolemultiuser/cts/ |
D | RoleManagerMultiUserTest.kt | 8 * http://www.apache.org/licenses/LICENSE-2.0 in <lambda>() 18 import android.app.role.RoleManager in <lambda>() 56 import org.junit.Assume.assumeFalse in <lambda>() 248 // Set test default role holder. Ensures fallbacks to a default holder in <lambda>() 258 // Clear test default role holder in <lambda>() 320 // Set test default role holder. Ensures fallbacks to a default holder in <lambda>() 333 // We can assume targetActiveUser is role holder since fallback is enabled in <lambda>() 336 // Clear test default role holder in <lambda>() 348 // Set test default role holder. Ensures fallbacks to a default holder in <lambda>() 363 // We can assume targetActiveUser is role holder since fallback is enabled in <lambda>() [all …]
|
/aosp_15_r20/external/pytorch/.github/actions/linux-test/ |
H A D | action.yml | 1 name: linux-test 4 build-environment: 7 description: Top-level label for what's being built/tested. 8 test-matrix: 12 docker-image: 16 sync-tag: 22 job with the same `sync-tag` is identical. 23 use-gha: 28 dashboard-tag: 32 s3-bucket: [all …]
|
/aosp_15_r20/external/selinux/secilc/docs/ |
H A D | cil_role_statements.md | 1 Role Statements 4 role section in Role Statements 5 ---- 7 Declares a role identifier in the current namespace. 12 (role role_id) 24 <td align="left"><p><code>role</code></p></td> 25 <td align="left"><p>The <code>role</code> keyword.</p></td> 29 <td align="left"><p>The <code>role</code> identifier.</p></td> 36 This example declares two roles: `object_r` in the global namespace and `unconfined.role`: 39 (role object_r) [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | driveactivity_v2.activity.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
/aosp_15_r20/external/aws-sdk-java-v2/core/profiles/src/main/java/software/amazon/awssdk/profiles/ |
H A D | ProfileProperty.java | 43 * Property name for specifying the IAM role to assume 48 * Property name for specifying the IAM role session name 53 * Property name for specifying how long in seconds to assume the role 58 * Property name for specifying the IAM role external id 63 * Property name for specifying the profile credentials to use when assuming a role 68 * Property name for specifying the credential source to use when assuming a role 95 …* The S3 regional endpoint setting for the {@code us-east-1} region. Setting the value to {@code r… 96 …* the SDK to use the {@code s3.us-east-1.amazonaws.com} endpoint when using the {@code US_EAST_1} … 104 …* The "retry mode" to be used for clients created using the currently-configured profile. Values s… 110 …* The "defaults mode" to be used for clients created using the currently-configured profile. Defau… [all …]
|
/aosp_15_r20/cts/tests/tests/companion/uiautomation/src/android/companion/cts/uiautomation/ |
H A D | UiAutomationTestBase.kt | 8 * http://www.apache.org/licenses/LICENSE-2.0 in <lambda>() 23 import android.app.role.RoleManager in <lambda>() 69 import org.junit.Assume in <lambda>() 70 import org.junit.Assume.assumeFalse in <lambda>() 95 Assume.assumeTrue(CompanionActivity.waitUntilGone()) in <lambda>() 101 // Make RoleManager bypass role qualification, which would allow this self-instrumenting in <lambda>() 109 // If the profile (role) is not null: remove the app from the role holders. in <lambda>() 111 profile?.let { roleName -> targetApp.removeFromHoldersOfRole(roleName) } in <lambda>() 113 // Restore disallowing role qualifications. in <lambda>() 155 cancelAction: () -> Unit in <lambda>() [all …]
|
/aosp_15_r20/external/cronet/base/win/ |
H A D | win_util.cc | 2 // Use of this source code is governed by a BSD-style license that can be 79 HRESULT result = property_store->SetValue(property_key, property_value.get()); in SetPropVariantValueForPropertyStore() 81 result = property_store->Commit(); in SetPropVariantValueForPropertyStore() 87 // See third_party/perl/c/i686-w64-mingw32/include/propkey.h for GUID and in SetPropVariantValueForPropertyStore() 100 // Returns the current platform role. We use the PowerDeterminePlatformRoleEx 106 // Enable V2 per-monitor high-DPI support for the process. This will cause 107 // Windows to scale dialogs, comctl32 controls, context menus, and non-client 108 // area owned by this process on a per-monitor basis. If per-monitor V2 is not 110 // https://docs.microsoft.com/en-us/windows/desktop/hidpi/dpi-awareness-context 209 error->code = load_error.code; in PinUser32Internal() [all …]
|