/dports/net-mgmt/crmsh/crmsh-4.3.1/doc/website-v1/ |
H A D | man-3.adoc | 1418 [[cmdhelp_script_run,Run the script]] 1647 [[cmdhelp_cib,CIB shadow management]] 2293 [[cmdhelp_node,Node management]] 2331 [[cmdhelp_node_delete,delete node]] 2348 [[cmdhelp_node_fence,fence node]] 2417 [[cmdhelp_node_show,show node]] 2528 [[cmdhelp_options,User preferences]] 4233 [[cmdhelp_configure_xml,raw xml]] 4708 [[cmdhelp_history,Cluster history]] 4936 [[cmdhelp_history_log,log content]] [all …]
|
H A D | man-2.0.adoc | 1157 [[cmdhelp_script_run,Run the script]] 1386 [[cmdhelp_cib,CIB shadow management]] 2032 [[cmdhelp_node,Node management]] 2070 [[cmdhelp_node_delete,delete node]] 2087 [[cmdhelp_node_fence,fence node]] 2156 [[cmdhelp_node_show,show node]] 2267 [[cmdhelp_options,User preferences]] 3972 [[cmdhelp_configure_xml,raw xml]] 4447 [[cmdhelp_history,Cluster history]] 4675 [[cmdhelp_history_log,log content]] [all …]
|
/dports/net-mgmt/crmsh/crmsh-4.3.1/doc/ |
H A D | crm.8.adoc | 1214 [[cmdhelp_script_run,Run the script]] 1443 [[cmdhelp_cib,CIB shadow management]] 2072 [[cmdhelp_node,Node management]] 2110 [[cmdhelp_node_delete,delete node]] 2127 [[cmdhelp_node_fence,fence node]] 2196 [[cmdhelp_node_show,show node]] 2295 [[cmdhelp_options,User preferences]] 4080 [[cmdhelp_configure_xml,raw xml]] 4555 [[cmdhelp_history,Cluster history]] 4783 [[cmdhelp_history_log,log content]] [all …]
|
/dports/sysutils/consul/consul-1.10.3/agent/consul/ |
H A D | acl_endpoint.go | 114 type ACL struct { struct 115 srv *Server 116 logger hclog.Logger 135 func (a *ACL) fileBootstrapResetIndex() uint64 { 163 func (a *ACL) removeBootstrapResetFile() { 169 func (a *ACL) aclPreCheck() error { 1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest, 1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error { 2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error { 2416 func (a *ACL) tokenSetFromAuthMethod( [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 114 type ACL struct { struct 115 srv *Server 116 logger hclog.Logger 135 func (a *ACL) fileBootstrapResetIndex() uint64 { 163 func (a *ACL) removeBootstrapResetFile() { 169 func (a *ACL) aclPreCheck() error { 1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest, 1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error { 2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error { 2416 func (a *ACL) tokenSetFromAuthMethod( [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 114 type ACL struct { struct 115 srv *Server 116 logger hclog.Logger 135 func (a *ACL) fileBootstrapResetIndex() uint64 { 163 func (a *ACL) removeBootstrapResetFile() { 169 func (a *ACL) aclPreCheck() error { 1430 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest, 1686 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error { 2349 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error { 2416 func (a *ACL) tokenSetFromAuthMethod( [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 45 type ACL struct { struct 46 srv *Server 47 logger hclog.Logger 66 func (a *ACL) fileBootstrapResetIndex() uint64 { 94 func (a *ACL) removeBootstrapResetFile() { 100 func (a *ACL) aclPreCheck() error { 1383 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest, 1643 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error { 2327 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error { 2394 func (a *ACL) tokenSetFromAuthMethod( [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 41 type ACL struct { struct 42 srv *Server 43 logger hclog.Logger 62 func (a *ACL) fileBootstrapResetIndex() uint64 { 90 func (a *ACL) removeBootstrapResetFile() { 96 func (a *ACL) aclPreCheck() error { 721 func (a *ACL) TokenDelete(args *structs.ACLTokenDeleteRequest, reply *string) error { 1323 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest, 1570 func (a *ACL) RoleDelete(args *structs.ACLRoleDeleteRequest, reply *string) error { 2201 func (a *ACL) Login(args *structs.ACLLoginRequest, reply *structs.ACLToken) error { [all …]
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/consul/ |
H A D | acl_endpoint.go | 30 type ACL struct { struct 31 srv *Server 50 func (a *ACL) fileBootstrapResetIndex() uint64 { 75 func (a *ACL) removeBootstrapResetFile() { 81 func (a *ACL) aclPreCheck() error { 95 func (a *ACL) BootstrapTokens(args *structs.DCSpecificRequest, reply *structs.ACLToken) error { 230 func (a *ACL) TokenClone(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error { 285 func (a *ACL) TokenSet(args *structs.ACLTokenSetRequest, reply *structs.ACLToken) error { 449 func (a *ACL) TokenDelete(args *structs.ACLTokenDeleteRequest, reply *string) error { 768 func (a *ACL) PolicyDelete(args *structs.ACLPolicyDeleteRequest, reply *string) error { [all …]
|
/dports/sysutils/nomad/nomad-1.1.0/nomad/ |
H A D | acl_endpoint.go | 32 type ACL struct { struct 33 srv *Server 34 logger log.Logger 38 … *ACL) UpsertPolicies(args *structs.ACLPolicyUpsertRequest, reply *structs.GenericResponse) error { 82 … *ACL) DeletePolicies(args *structs.ACLPolicyDeleteRequest, reply *structs.GenericResponse) error { 118 …ACL) ListPolicies(args *structs.ACLPolicyListRequest, reply *structs.ACLPolicyListResponse) error { 279 func (a *ACL) requestACLToken(secretID string) (*structs.ACLToken, error) { 293 …a *ACL) GetPolicies(args *structs.ACLPolicySetRequest, reply *structs.ACLPolicySetResponse) error { 423 func (a *ACL) fileBootstrapResetIndex() uint64 { 558 … (a *ACL) DeleteTokens(args *structs.ACLTokenDeleteRequest, reply *structs.GenericResponse) error { [all …]
|
/dports/sysutils/nomad/nomad-1.1.0/acl/ |
H A D | acl.go | 43 type ACL struct { struct 45 management bool 48 namespaces *iradix.Tree 52 wildcardNamespaces *iradix.Tree 55 hostVolumes *iradix.Tree 59 wildcardHostVolumes *iradix.Tree 61 agent string 62 node string 63 operator string 64 quota string [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/ |
H A D | acl_endpoint.go | 32 type ACL struct { struct 33 srv *Server 34 logger log.Logger 38 … *ACL) UpsertPolicies(args *structs.ACLPolicyUpsertRequest, reply *structs.GenericResponse) error { 82 … *ACL) DeletePolicies(args *structs.ACLPolicyDeleteRequest, reply *structs.GenericResponse) error { 118 …ACL) ListPolicies(args *structs.ACLPolicyListRequest, reply *structs.ACLPolicyListResponse) error { 279 func (a *ACL) requestACLToken(secretID string) (*structs.ACLToken, error) { 293 …a *ACL) GetPolicies(args *structs.ACLPolicySetRequest, reply *structs.ACLPolicySetResponse) error { 423 func (a *ACL) fileBootstrapResetIndex() uint64 { 558 … (a *ACL) DeleteTokens(args *structs.ACLTokenDeleteRequest, reply *structs.GenericResponse) error { [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/acl/ |
H A D | acl.go | 43 type ACL struct { struct 45 management bool 48 namespaces *iradix.Tree 52 wildcardNamespaces *iradix.Tree 55 hostVolumes *iradix.Tree 59 wildcardHostVolumes *iradix.Tree 61 agent string 62 node string 63 operator string 64 quota string [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/nomad/acl/ |
H A D | acl.go | 40 type ACL struct { struct 42 management bool 45 namespaces *iradix.Tree 47 agent string 48 node string 49 operator string 50 quota string 175 func (a *ACL) AllowAgentRead() bool { 201 func (a *ACL) AllowNodeRead() bool { 215 func (a *ACL) AllowNodeWrite() bool { [all …]
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl_test.go | 16 func checkAllowACLList(t *testing.T, acl ACL, prefix string) { 20 func checkAllowACLModify(t *testing.T, acl ACL, prefix string) { 24 func checkAllowAgentRead(t *testing.T, acl ACL, prefix string) { 28 func checkAllowAgentWrite(t *testing.T, acl ACL, prefix string) { 32 func checkAllowEventRead(t *testing.T, acl ACL, prefix string) { 36 func checkAllowEventWrite(t *testing.T, acl ACL, prefix string) { 52 func checkAllowKeyRead(t *testing.T, acl ACL, prefix string) { 56 func checkAllowKeyList(t *testing.T, acl ACL, prefix string) { 68 func checkAllowKeyWrite(t *testing.T, acl ACL, prefix string) { 120 func checkDenyACLList(t *testing.T, acl ACL, prefix string) { [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl_test.go | 16 func checkAllowACLList(t *testing.T, acl ACL, prefix string) { 20 func checkAllowACLModify(t *testing.T, acl ACL, prefix string) { 24 func checkAllowAgentRead(t *testing.T, acl ACL, prefix string) { 28 func checkAllowAgentWrite(t *testing.T, acl ACL, prefix string) { 32 func checkAllowEventRead(t *testing.T, acl ACL, prefix string) { 36 func checkAllowEventWrite(t *testing.T, acl ACL, prefix string) { 52 func checkAllowKeyRead(t *testing.T, acl ACL, prefix string) { 56 func checkAllowKeyList(t *testing.T, acl ACL, prefix string) { 68 func checkAllowKeyWrite(t *testing.T, acl ACL, prefix string) { 120 func checkDenyACLList(t *testing.T, acl ACL, prefix string) { [all …]
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 16 type ACL struct { struct 17 srv *Server 22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error { 144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error { 201 func (a *ACL) Get(args *structs.ACLSpecificRequest, 237 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error { 271 func (a *ACL) List(args *structs.DCSpecificRequest, 303 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 16 type ACL struct { struct 17 srv *Server 22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error { 144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error { 201 func (a *ACL) Get(args *structs.ACLSpecificRequest, 237 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error { 271 func (a *ACL) List(args *structs.DCSpecificRequest, 303 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | acl_endpoint.go | 16 type ACL struct { struct 17 srv *Server 22 func (a *ACL) Bootstrap(args *structs.DCSpecificRequest, reply *structs.ACL) error { 144 func (a *ACL) Apply(args *structs.ACLRequest, reply *string) error { 202 func (a *ACL) Get(args *structs.ACLSpecificRequest, 238 func (a *ACL) GetPolicy(args *structs.ACLPolicyRequest, reply *structs.ACLPolicy) error { 272 func (a *ACL) List(args *structs.DCSpecificRequest, 304 func (a *ACL) ReplicationStatus(args *structs.DCSpecificRequest,
|
/dports/net-im/matterbridge/matterbridge-1.22.3/vendor/github.com/yaegashi/msgraph.go/beta/ |
H A D | ModelACL.go | 6 type ACL struct { struct 8 Object 10 Type *ACLType `json:"type,omitempty"` 12 Value *string `json:"value,omitempty"` 14 AccessType *AccessType `json:"accessType,omitempty"` 16 IdentitySource *string `json:"identitySource,omitempty"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/ |
H A D | acl.go | 22 type ACL struct { struct 23 c *Client 27 func (c *Client) ACL() *ACL { func 32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) { 51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) { 66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) { 80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) { 98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) { 122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/ |
H A D | acl.go | 22 type ACL struct { struct 23 c *Client 27 func (c *Client) ACL() *ACL { func 32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) { 51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) { 66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) { 80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) { 98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) { 122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/hashicorp/consul/api/ |
H A D | acl.go | 22 type ACL struct { struct 23 c *Client 27 func (c *Client) ACL() *ACL { func 32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) { 51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) { 66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) { 80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) { 98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) { 122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/hashicorp/consul/api/ |
H A D | acl.go | 22 type ACL struct { struct 23 c *Client 27 func (c *Client) ACL() *ACL { func 32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) { 51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) { 66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) { 80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) { 98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) { 122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/go-swagger/go-swagger/vendor/github.com/armon/consul-api/ |
H A D | acl.go | 22 type ACL struct { struct 23 c *Client 27 func (c *Client) ACL() *ACL { func 32 func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) { 51 func (a *ACL) Update(acl *ACLEntry, q *WriteOptions) (*WriteMeta, error) { 66 func (a *ACL) Destroy(id string, q *WriteOptions) (*WriteMeta, error) { 80 func (a *ACL) Clone(id string, q *WriteOptions) (string, *WriteMeta, error) { 98 func (a *ACL) Info(id string, q *QueryOptions) (*ACLEntry, *QueryMeta, error) { 122 func (a *ACL) List(q *QueryOptions) ([]*ACLEntry, *QueryMeta, error) {
|