/dports/sysutils/consul/consul-1.10.3/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 775 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 800 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 825 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 703 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 728 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 753 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/agent/structs/ |
H A D | acl_cache.go | 18 type ACLCaches struct { struct 21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 23 roles *lru.TwoQueueCache // role ID -> ACLRole 124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry { 229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) { 237 func (c *ACLCaches) RemoveIdentity(id string) { 243 func (c *ACLCaches) RemovePolicy(policyID string) { 249 func (c *ACLCaches) RemoveRole(roleID string) { [all …]
|
H A D | acl.go | 777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,… 802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) { 827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/structs/ |
H A D | acl_cache.go | 17 type ACLCaches struct { struct 18 identities *lru.TwoQueueCache // identity id -> structs.ACLIdentity 19 parsedPolicies *lru.TwoQueueCache // policy content hash -> acl.Policy 20 policies *lru.TwoQueueCache // policy ID -> ACLPolicy 21 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer 104 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry { 117 func (c *ACLCaches) GetPolicy(policyID string) *PolicyCacheEntry { 156 func (c *ACLCaches) PutIdentity(id string, ident ACLIdentity) { 196 func (c *ACLCaches) RemoveIdentity(id string) { 202 func (c *ACLCaches) RemovePolicy(policyID string) { [all …]
|
H A D | acl.go | 423 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, sentinel sentinel.Evaluator) ([]*acl… 448 func (policies ACLPolicies) Compile(parent acl.Authorizer, cache *ACLCaches, sentinel sentinel.Eval… 473 func (policies ACLPolicies) Merge(cache *ACLCaches, sentinel sentinel.Evaluator) (*acl.Policy, erro…
|