-
1.
公开(公告)号:US20240143317A1
公开(公告)日:2024-05-02
申请号:US17973827
申请日:2022-10-26
申请人: RED HAT, INC.
发明人: Michael TSIRKIN
CPC分类号: G06F8/71 , G06F16/148
摘要: A computing device can receive, from a version control system, a first set of pre-computed checksums for source files for a software program. The computing device can receive, from the version control system, a second set of pre-computed checksums for a second set of source files for the software program. The computing device can determine a first total checksum by combining the first set of pre-computed checksums. The computing device can also determine a second total checksum by combining the first set of pre-computed checksums. The computing device can determine, by comparing the first total checksum to the second total checksum, that the first set of source files was previously built by the build engine. The computing device can then prevent the build engine from re-building the first set of source files.
-
公开(公告)号:US20240354143A1
公开(公告)日:2024-10-24
申请号:US18305048
申请日:2023-04-21
申请人: Red Hat, Inc.
发明人: Michael TSIRKIN
IPC分类号: G06F9/455
CPC分类号: G06F9/45558 , G06F2009/45595
摘要: A network address is allocated for a guest virtual machine (VM) of a computing device by the host operating system. The network address is externally accessible from an external network coupled to the computing device. An indication is received, from the guest VM, that the guest VM is using the network address. The network address as used by the guest VM matches the network address as exposed by the host operating system on the external network. A network transmission, from the external network, is received that is directed to the network address. Responsive to the indication that the guest VM is using the network address, the network transmission is transferred to the guest VM.
-
公开(公告)号:US20240291803A1
公开(公告)日:2024-08-29
申请号:US18176191
申请日:2023-02-28
申请人: RED HAT, INC.
发明人: Michael TSIRKIN , Amnon ILAN
IPC分类号: H04L9/40
CPC分类号: H04L63/0272 , H04L63/029 , H04L63/0869
摘要: Zero trust support for secure networks can be provided via a modified virtual private network (VPN) server. For example, the VPN server may receive, from a VPN client executing on a client device, a first access request for a first software application in a computing environment that is accessible via the VPN server. The first access request can include authentication credentials for the VPN server. The VPN server can authenticate the first access request based on the authentication credentials. In response, a first connection tunnel can be provided between the client device and the first software application. The client device can access the first software application via the first connection tunnel. The VPN server can also deny a second access request received via the first connection tunnel for a second software application in the computing environment.
-
-