Home
last modified time | relevance | path

Searched defs:ExecutorConfig (Results 1 – 25 of 26) sorted by relevance

12

/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/tether/
H A Dconfig.go31 type ExecutorConfig struct { struct
34 sync.Mutex
37 Name string `vic:"0.1" scope:"read-only" key:"common/name"`
40 ID string `vic:"0.1" scope:"read-only" key:"common/id"`
43 DebugLevel int `vic:"0.1" scope:"read-only" key:"diagnostics/debug"`
46 pidMutex sync.Mutex `vic:"0.1" scope:"read-only" recurse:"depth=0"`
49 pids map[int]*SessionConfig `vic:"0.1" scope:"read-only" recurse:"depth=0"`
67 Key []byte `vic:"0.1" scope:"read-only" key:"key"`
70 AsymmetricRouting bool `vic:"0.1" scope:"read-only" key:"asymrouting"`
73 Hostname string `vic:"0.1" scope:"read-only" key:"hostname"`
[all …]
H A Dinterfaces.go40 SetupFirewall(ctx context.Context, config *ExecutorConfig) error
49 HandleSessionExit(config *ExecutorConfig, session *SessionConfig) func()
89 Reload(config *ExecutorConfig) error
H A Dtether_test.go245 func StartTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (Tether, extraconfig.D…
266 func RunTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (Tether, extraconfig.Dat…
H A Dtether.go925 func logConfig(config *ExecutorConfig) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/config/executor/
H A Dcontainer_vm.go165 type ExecutorConfig struct { struct
166 ExecutorConfigCommon `vic:"0.1" scope:"read-only" key:"common"`
169 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"`
182 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"`
190 Key []byte `vic:"0.1" scope:"read-only" key:"key"`
193 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"`
196 ImageID string `vic:"0.1" scope:"read-only" key:"imageid"`
203 RepoName string `vic:"0.1" scope:"read-only" key:"repo"`
206 Version *version.Build `vic:"0.1" scope:"read-only" key:"version"`
212 Hostname string `vic:"0.1" scope:"read-only" key:"hostname"`
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v1/executor/
H A Dcontainer_vm.go110 type ExecutorConfig struct { struct
111 Common `vic:"0.1" scope:"read-only" key:"common"`
114 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"`
117 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"`
121 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
124 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"`
132 Key []byte `vic:"0.1" scope:"read-only" key:"key"`
135 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"`
138 Annotations map[string]string `vic:"0.1" scope:"hidden" key:"annotations"`
142 RepoName string `vic:"0.1" scope:"read-only" key:"repo"`
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v2/executor/
H A Dcontainer_vm.go110 type ExecutorConfig struct { struct
111 Common `vic:"0.1" scope:"read-only" key:"common"`
114 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"`
117 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"`
121 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
124 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"`
132 Key []byte `vic:"0.1" scope:"read-only" key:"key"`
135 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"`
138 Annotations map[string]string `vic:"0.1" scope:"hidden" key:"annotations"`
142 RepoName string `vic:"0.1" scope:"read-only" key:"repo"`
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/drivers/shared/executor/
H A Dplugins.go11 type ExecutorConfig struct { struct
14 LogFile string
17 LogLevel string
21 FSIsolation bool
H A Dutils.go29 executorConfig *ExecutorConfig) (Executor, *plugin.Client, error) {
/dports/sysutils/nomad/nomad-1.1.0/drivers/shared/executor/
H A Dplugins.go11 type ExecutorConfig struct { struct
14 LogFile string
17 LogLevel string
21 FSIsolation bool
H A Dutils.go29 executorConfig *ExecutorConfig) (Executor, *plugin.Client, error) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin7/
H A DvicadminProxyVarRename.go54 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
57 type ExecutorConfig struct { struct
58 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/plugins/plugin1/
H A Dstop_signal_rename_sample.go50 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
53 type ExecutorConfig struct { struct
54 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/cmd/vic-init/
H A Dconfig.go19 type ExecutorConfig struct { struct
21 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"`
H A Dops_linux.go33 func (t *operations) SetupFirewall(ctx context.Context, config *tether.ExecutorConfig) error {
H A Dtether_test.go209 func StartTether(t *testing.T, cfg *executor.ExecutorConfig) (tether.Tether, extraconfig.DataSource…
230 func RunTether(t *testing.T, cfg *executor.ExecutorConfig) (tether.Tether, extraconfig.DataSource, …
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin9/
H A Dcontainer_create_timestamp.go47 type ExecutorConfig struct { struct
48 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin1/
H A DcommonSpecForVCH.go48 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
51 type ExecutorConfig struct { struct
52 Common `vic:"0.1" scope:"read-only" key:"common"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/pkg/vsphere/extraconfig/
H A Dbasic_test.go52 type ExecutorConfig struct { struct
53 Common `vic:"0.1" scope:"read-only" key:"common"`
55 Sessions map[string]SessionConfig `vic:"0.1" scope:"hidden" key:"sessions"`
57 Key string `json:"string"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin2/
H A DcommonSpecForContainer.go47 type ExecutorConfig struct { struct
48 Common `vic:"0.1" scope:"read-only" key:"common"`
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/cmd/tether/
H A Dops.go33 func (t *operations) HandleSessionExit(config *tether.ExecutorConfig, session *tether.SessionConfig…
H A Dtether_test.go215 func StartTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, extrac…
236 func StartAttachTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, …
H A Dops_linux.go209 func setupFirewall(ctx context.Context, t *tether.BaseOperations, config *tether.ExecutorConfig) er…
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v1/
H A Dvirtual_container_host.go53 executor.ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v2/
H A Dvirtual_container_host.go53 executor.ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember

12