This repository has been archived by the owner on Aug 25, 2024. It is now read-only.
ci: pin: downstream: 2nd party: Successful pin #1454
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Resulting pull request from validation: dffml/dffml-model-transformers#3
Related: #1061
Related: #1401
Related: #1113
Related: ietf-scitt/use-cases#18
2022-07-20 Identifying Security Threats WG
cohesive promise, part of that is visuabliity and transparency
into the work that we do.
one slide per project.
know what we're up to.
a single slide, what is it, why are we doing it, what the status is,
what's coming next, and if you need anything
openssl.cnf
and dumps strace logs to a repowhen we upload reviews.
reuse
of contextsictx
,nctx
, etc. with something predeclared, aka at runtime if yourOperation
data structure doesn't allowlist your usage of it you can pass it to a subflow for reuse. This allows us to use the format within our orchrestration and for static analysis because we can use this same format to describe the trust boundry proeprties that other domain sepcific represenatations of architecture have, for instance we could if we were doing and Open Architecture (OA) Intermediate Representation (IR) for and ELF file we might note that the input network context is not reused from the top level system context. Where as if we did an OA IR for Python code we would say that the input network is reused from the top level system context (it has access to that memory region, whereas when you launch and ELF you look access to the parents memory region, typically).