Home
last modified time | relevance | path

Searched defs:ACLCaches (Results 1 – 14 of 14) sorted by relevance

/dports/sysutils/consul/consul-1.10.3/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go775 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
800 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
825 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go703 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
728 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
753 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/agent/structs/
H A Dacl_cache.go18 type ACLCaches struct { struct
21 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
22 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
23 roles *lru.TwoQueueCache // role ID -> ACLRole
124 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
176 func (c *ACLCaches) GetRole(roleID string) *RoleCacheEntry {
229 func (c *ACLCaches) PutRole(roleID string, role *ACLRole) {
237 func (c *ACLCaches) RemoveIdentity(id string) {
243 func (c *ACLCaches) RemovePolicy(policyID string) {
249 func (c *ACLCaches) RemoveRole(roleID string) {
[all …]
H A Dacl.go777 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, entConf *acl.Config) ([]*acl.Policy,…
802 func (policies ACLPolicies) Compile(cache *ACLCaches, entConf *acl.Config) (acl.Authorizer, error) {
827 func (policies ACLPolicies) Merge(cache *ACLCaches, entConf *acl.Config) (*acl.Policy, error) {
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/structs/
H A Dacl_cache.go17 type ACLCaches struct { struct
18 identities *lru.TwoQueueCache // identity id -> structs.ACLIdentity
19 parsedPolicies *lru.TwoQueueCache // policy content hash -> acl.Policy
20 policies *lru.TwoQueueCache // policy ID -> ACLPolicy
21 authorizers *lru.TwoQueueCache // token secret -> acl.Authorizer
104 func (c *ACLCaches) GetIdentity(id string) *IdentityCacheEntry {
117 func (c *ACLCaches) GetPolicy(policyID string) *PolicyCacheEntry {
156 func (c *ACLCaches) PutIdentity(id string, ident ACLIdentity) {
196 func (c *ACLCaches) RemoveIdentity(id string) {
202 func (c *ACLCaches) RemovePolicy(policyID string) {
[all …]
H A Dacl.go423 func (policies ACLPolicies) resolveWithCache(cache *ACLCaches, sentinel sentinel.Evaluator) ([]*acl…
448 func (policies ACLPolicies) Compile(parent acl.Authorizer, cache *ACLCaches, sentinel sentinel.Eval…
473 func (policies ACLPolicies) Merge(cache *ACLCaches, sentinel sentinel.Evaluator) (*acl.Policy, erro…