Home
last modified time | relevance | path

Searched defs:ACL (Results 1 – 25 of 1800) sorted by relevance

12345678910>>...72

/dports/net-mgmt/crmsh/crmsh-4.3.1/doc/website-v1/
H A Dman-3.adoc1418 [[cmdhelp_script_run,Run the script]]
1647 [[cmdhelp_cib,CIB shadow management]]
2293 [[cmdhelp_node,Node management]]
2331 [[cmdhelp_node_delete,delete node]]
2348 [[cmdhelp_node_fence,fence node]]
2417 [[cmdhelp_node_show,show node]]
2528 [[cmdhelp_options,User preferences]]
4233 [[cmdhelp_configure_xml,raw xml]]
4708 [[cmdhelp_history,Cluster history]]
4936 [[cmdhelp_history_log,log content]]
[all …]
H A Dman-2.0.adoc1157 [[cmdhelp_script_run,Run the script]]
1386 [[cmdhelp_cib,CIB shadow management]]
2032 [[cmdhelp_node,Node management]]
2070 [[cmdhelp_node_delete,delete node]]
2087 [[cmdhelp_node_fence,fence node]]
2156 [[cmdhelp_node_show,show node]]
2267 [[cmdhelp_options,User preferences]]
3972 [[cmdhelp_configure_xml,raw xml]]
4447 [[cmdhelp_history,Cluster history]]
4675 [[cmdhelp_history_log,log content]]
[all …]
/dports/net-mgmt/crmsh/crmsh-4.3.1/doc/
H A Dcrm.8.adoc1214 [[cmdhelp_script_run,Run the script]]
1443 [[cmdhelp_cib,CIB shadow management]]
2072 [[cmdhelp_node,Node management]]
2110 [[cmdhelp_node_delete,delete node]]
2127 [[cmdhelp_node_fence,fence node]]
2196 [[cmdhelp_node_show,show node]]
2295 [[cmdhelp_options,User preferences]]
4080 [[cmdhelp_configure_xml,raw xml]]
4555 [[cmdhelp_history,Cluster history]]
4783 [[cmdhelp_history_log,log content]]
[all …]
/dports/sysutils/consul/consul-1.10.3/agent/consul/
H A Dacl_endpoint.go114 type ACL struct { struct
115 srv *Server
116 logger hclog.Logger
135 func (a *ACL) fileBootstrapResetIndex() uint64 {
163 func (a *ACL) removeBootstrapResetFile() {
169 func (a *ACL) aclPreCheck() error {
1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
2416 func (a *ACL) tokenSetFromAuthMethod(
[all …]
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go114 type ACL struct { struct
115 srv *Server
116 logger hclog.Logger
135 func (a *ACL) fileBootstrapResetIndex() uint64 {
163 func (a *ACL) removeBootstrapResetFile() {
169 func (a *ACL) aclPreCheck() error {
1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
2416 func (a *ACL) tokenSetFromAuthMethod(
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go114 type ACL struct { struct
115 srv *Server
116 logger hclog.Logger
135 func (a *ACL) fileBootstrapResetIndex() uint64 {
163 func (a *ACL) removeBootstrapResetFile() {
169 func (a *ACL) aclPreCheck() error {
1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
2416 func (a *ACL) tokenSetFromAuthMethod(
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go45 type ACL struct { struct
46 srv *Server
47 logger hclog.Logger
66 func (a *ACL) fileBootstrapResetIndex() uint64 {
94 func (a *ACL) removeBootstrapResetFile() {
100 func (a *ACL) aclPreCheck() error {
1383 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
1643 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
2327 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
2394 func (a *ACL) tokenSetFromAuthMethod(
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go41 type ACL struct { struct
42 srv *Server
43 logger hclog.Logger
62 func (a *ACL) fileBootstrapResetIndex() uint64 {
90 func (a *ACL) removeBootstrapResetFile() {
96 func (a *ACL) aclPreCheck() error {
721 func (a *ACL) TokenDelete(args *structs.ACLTokenDeleteRequest, reply *string) error {
1323 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
1570 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error {
2201 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error {
[all …]
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/consul/
H A Dacl_endpoint.go30 type ACL struct { struct
31 srv *Server
50 func (a *ACL) fileBootstrapResetIndex() uint64 {
75 func (a *ACL) removeBootstrapResetFile() {
81 func (a *ACL) aclPreCheck() error {
95 func (a *ACL) BootstrapTokens(args *structs.DCSpecificRequest, reply *structs.ACLToken) error {
230 func (a *ACL) TokenClone(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error {
285 func (a *ACL) TokenSet(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error {
449 func (a *ACL) TokenDelete(args *structs.ACLTokenDeleteRequest, reply *string) error {
768 func (a *ACL) PolicyDelete(args *structs.ACLPolicyDeleteRequest, reply *string) error {
[all …]
/dports/sysutils/nomad/nomad-1.1.0/nomad/
H A Dacl_endpoint.go32 type ACL struct { struct
33 srv *Server
34 logger log.Logger
38 … *ACL) UpsertPolicies(args *structs.ACLPolicyUpsertRequest, reply *structs.GenericResponse) error {
82 … *ACL) DeletePolicies(args *structs.ACLPolicyDeleteRequest, reply *structs.GenericResponse) error {
118 …ACL) ListPolicies(args *structs.ACLPolicyListRequest, reply *structs.ACLPolicyListResponse) error {
279 func (a *ACL) requestACLToken(secretID string) (*structs.ACLToken, error) {
293 …a *ACL) GetPolicies(args *structs.ACLPolicySetRequest, reply *structs.ACLPolicySetResponse) error {
423 func (a *ACL) fileBootstrapResetIndex() uint64 {
558 … (a *ACL) DeleteTokens(args *structs.ACLTokenDeleteRequest, reply *structs.GenericResponse) error {
[all …]
/dports/sysutils/nomad/nomad-1.1.0/acl/
H A Dacl.go43 type ACL struct { struct
45 management bool
48 namespaces *iradix.Tree
52 wildcardNamespaces *iradix.Tree
55 hostVolumes *iradix.Tree
59 wildcardHostVolumes *iradix.Tree
61 agent string
62 node string
63 operator string
64 quota string
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/
H A Dacl_endpoint.go32 type ACL struct { struct
33 srv *Server
34 logger log.Logger
38 … *ACL) UpsertPolicies(args *structs.ACLPolicyUpsertRequest, reply *structs.GenericResponse) error {
82 … *ACL) DeletePolicies(args *structs.ACLPolicyDeleteRequest, reply *structs.GenericResponse) error {
118 …ACL) ListPolicies(args *structs.ACLPolicyListRequest, reply *structs.ACLPolicyListResponse) error {
279 func (a *ACL) requestACLToken(secretID string) (*structs.ACLToken, error) {
293 …a *ACL) GetPolicies(args *structs.ACLPolicySetRequest, reply *structs.ACLPolicySetResponse) error {
423 func (a *ACL) fileBootstrapResetIndex() uint64 {
558 … (a *ACL) DeleteTokens(args *structs.ACLTokenDeleteRequest, reply *structs.GenericResponse) error {
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/acl/
H A Dacl.go43 type ACL struct { struct
45 management bool
48 namespaces *iradix.Tree
52 wildcardNamespaces *iradix.Tree
55 hostVolumes *iradix.Tree
59 wildcardHostVolumes *iradix.Tree
61 agent string
62 node string
63 operator string
64 quota string
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/nomad/acl/
H A Dacl.go40 type ACL struct { struct
42 management bool
45 namespaces *iradix.Tree
47 agent string
48 node string
49 operator string
50 quota string
175 func (a *ACL) AllowAgentRead() bool {
201 func (a *ACL) AllowNodeRead() bool {
215 func (a *ACL) AllowNodeWrite() bool {
[all …]
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/acl/
H A Dacl_test.go16 func checkAllowACLList(t *testing.T, acl ACL, prefix string) {
20 func checkAllowACLModify(t *testing.T, acl ACL, prefix string) {
24 func checkAllowAgentRead(t *testing.T, acl ACL, prefix string) {
28 func checkAllowAgentWrite(t *testing.T, acl ACL, prefix string) {
32 func checkAllowEventRead(t *testing.T, acl ACL, prefix string) {
36 func checkAllowEventWrite(t *testing.T, acl ACL, prefix string) {
52 func checkAllowKeyRead(t *testing.T, acl ACL, prefix string) {
56 func checkAllowKeyList(t *testing.T, acl ACL, prefix string) {
68 func checkAllowKeyWrite(t *testing.T, acl ACL, prefix string) {
120 func checkDenyACLList(t *testing.T, acl ACL, prefix string) {
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/acl/
H A Dacl_test.go16 func checkAllowACLList(t *testing.T, acl ACL, prefix string) {
20 func checkAllowACLModify(t *testing.T, acl ACL, prefix string) {
24 func checkAllowAgentRead(t *testing.T, acl ACL, prefix string) {
28 func checkAllowAgentWrite(t *testing.T, acl ACL, prefix string) {
32 func checkAllowEventRead(t *testing.T, acl ACL, prefix string) {
36 func checkAllowEventWrite(t *testing.T, acl ACL, prefix string) {
52 func checkAllowKeyRead(t *testing.T, acl ACL, prefix string) {
56 func checkAllowKeyList(t *testing.T, acl ACL, prefix string) {
68 func checkAllowKeyWrite(t *testing.T, acl ACL, prefix string) {
120 func checkDenyACLList(t *testing.T, acl ACL, prefix string) {
[all …]
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go16 type ACL struct { struct
17 srv *Server
22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error {
144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error {
201 func (a *ACL) Get(args *structs.ACLSpecificRequest,
237 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error {
271 func (a *ACL) List(args *structs.DCSpecificRequest,
303 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go16 type ACL struct { struct
17 srv *Server
22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error {
144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error {
201 func (a *ACL) Get(args *structs.ACLSpecificRequest,
237 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error {
271 func (a *ACL) List(args *structs.DCSpecificRequest,
303 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/agent/consul/
H A Dacl_endpoint.go16 type ACL struct { struct
17 srv *Server
22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error {
144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error {
202 func (a *ACL) Get(args *structs.ACLSpecificRequest,
238 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error {
272 func (a *ACL) List(args *structs.DCSpecificRequest,
304 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
/dports/net-im/matterbridge/matterbridge-1.22.3/vendor/github.com/yaegashi/msgraph.go/beta/
H A DModelACL.go6 type ACL struct { struct
8 Object
10 Type *ACLType `json:"type,omitempty"`
12 Value *string `json:"value,omitempty"`
14 AccessType *AccessType `json:"accessType,omitempty"`
16 IdentitySource *string `json:"identitySource,omitempty"`
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/
H A Dacl.go22 type ACL struct { struct
23 c *Client
27 func (c *Client) ACL() *ACL { func
32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {
51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) {
66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) {
80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) {
98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) {
122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/
H A Dacl.go22 type ACL struct { struct
23 c *Client
27 func (c *Client) ACL() *ACL { func
32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {
51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) {
66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) {
80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) {
98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) {
122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/hashicorp/consul/api/
H A Dacl.go22 type ACL struct { struct
23 c *Client
27 func (c *Client) ACL() *ACL { func
32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {
51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) {
66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) {
80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) {
98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) {
122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/
H A Dacl.go22 type ACL struct { struct
23 c *Client
27 func (c *Client) ACL() *ACL { func
32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {
51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) {
66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) {
80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) {
98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) {
122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/go-swagger/go-swagger/vendor/github.com/armon/consul-api/
H A Dacl.go22 type ACL struct { struct
23 c *Client
27 func (c *Client) ACL() *ACL { func
32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {
51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) {
66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) {
80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) {
98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) {
122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {

12345678910>>...72