/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/tether/ |
H A D | config.go | 31 type ExecutorConfig struct { struct 34 sync.Mutex 37 Name string `vic:"0.1" scope:"read-only" key:"common/name"` 40 ID string `vic:"0.1" scope:"read-only" key:"common/id"` 43 DebugLevel int `vic:"0.1" scope:"read-only" key:"diagnostics/debug"` 46 pidMutex sync.Mutex `vic:"0.1" scope:"read-only" recurse:"depth=0"` 49 pids map[int]*SessionConfig `vic:"0.1" scope:"read-only" recurse:"depth=0"` 67 Key []byte `vic:"0.1" scope:"read-only" key:"key"` 70 AsymmetricRouting bool `vic:"0.1" scope:"read-only" key:"asymrouting"` 73 Hostname string `vic:"0.1" scope:"read-only" key:"hostname"` [all …]
|
H A D | interfaces.go | 40 SetupFirewall(ctx context.Context, config *ExecutorConfig) error 49 HandleSessionExit(config *ExecutorConfig, session *SessionConfig) func() 89 Reload(config *ExecutorConfig) error
|
H A D | tether_test.go | 245 func StartTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (Tether, extraconfig.D… 266 func RunTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (Tether, extraconfig.Dat…
|
H A D | tether.go | 925 func logConfig(config *ExecutorConfig) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/config/executor/ |
H A D | container_vm.go | 165 type ExecutorConfig struct { struct 166 ExecutorConfigCommon `vic:"0.1" scope:"read-only" key:"common"` 169 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"` 182 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"` 190 Key []byte `vic:"0.1" scope:"read-only" key:"key"` 193 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"` 196 ImageID string `vic:"0.1" scope:"read-only" key:"imageid"` 203 RepoName string `vic:"0.1" scope:"read-only" key:"repo"` 206 Version *version.Build `vic:"0.1" scope:"read-only" key:"version"` 212 Hostname string `vic:"0.1" scope:"read-only" key:"hostname"` [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v1/executor/ |
H A D | container_vm.go | 110 type ExecutorConfig struct { struct 111 Common `vic:"0.1" scope:"read-only" key:"common"` 114 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"` 117 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"` 121 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"` 124 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"` 132 Key []byte `vic:"0.1" scope:"read-only" key:"key"` 135 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"` 138 Annotations map[string]string `vic:"0.1" scope:"hidden" key:"annotations"` 142 RepoName string `vic:"0.1" scope:"read-only" key:"repo"` [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v2/executor/ |
H A D | container_vm.go | 110 type ExecutorConfig struct { struct 111 Common `vic:"0.1" scope:"read-only" key:"common"` 114 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"` 117 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"` 121 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"` 124 Mounts map[string]MountSpec `vic:"0.1" scope:"read-only" key:"mounts"` 132 Key []byte `vic:"0.1" scope:"read-only" key:"key"` 135 LayerID string `vic:"0.1" scope:"read-only" key:"layerid"` 138 Annotations map[string]string `vic:"0.1" scope:"hidden" key:"annotations"` 142 RepoName string `vic:"0.1" scope:"read-only" key:"repo"` [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/drivers/shared/executor/ |
H A D | plugins.go | 11 type ExecutorConfig struct { struct 14 LogFile string 17 LogLevel string 21 FSIsolation bool
|
H A D | utils.go | 29 executorConfig *ExecutorConfig) (Executor, *plugin.Client, error) {
|
/dports/sysutils/nomad/nomad-1.1.0/drivers/shared/executor/ |
H A D | plugins.go | 11 type ExecutorConfig struct { struct 14 LogFile string 17 LogLevel string 21 FSIsolation bool
|
H A D | utils.go | 29 executorConfig *ExecutorConfig) (Executor, *plugin.Client, error) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin7/ |
H A D | vicadminProxyVarRename.go | 54 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember 57 type ExecutorConfig struct { struct 58 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/plugins/plugin1/ |
H A D | stop_signal_rename_sample.go | 50 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember 53 type ExecutorConfig struct { struct 54 Sessions map[string]*SessionConfig `vic:"0.1" scope:"read-only" key:"sessions"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/cmd/vic-init/ |
H A D | config.go | 19 type ExecutorConfig struct { struct 21 Diagnostics Diagnostics `vic:"0.1" scope:"read-only" key:"diagnostics"`
|
H A D | ops_linux.go | 33 func (t *operations) SetupFirewall(ctx context.Context, config *tether.ExecutorConfig) error {
|
H A D | tether_test.go | 209 func StartTether(t *testing.T, cfg *executor.ExecutorConfig) (tether.Tether, extraconfig.DataSource… 230 func RunTether(t *testing.T, cfg *executor.ExecutorConfig) (tether.Tether, extraconfig.DataSource, …
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin9/ |
H A D | container_create_timestamp.go | 47 type ExecutorConfig struct { struct 48 CreateTime int64 `vic:"0.1" scope:"read-write" key:"createtime"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin1/ |
H A D | commonSpecForVCH.go | 48 ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember 51 type ExecutorConfig struct { struct 52 Common `vic:"0.1" scope:"read-only" key:"common"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/pkg/vsphere/extraconfig/ |
H A D | basic_test.go | 52 type ExecutorConfig struct { struct 53 Common `vic:"0.1" scope:"read-only" key:"common"` 55 Sessions map[string]SessionConfig `vic:"0.1" scope:"hidden" key:"sessions"` 57 Key string `json:"string"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/plugins/plugin2/ |
H A D | commonSpecForContainer.go | 47 type ExecutorConfig struct { struct 48 Common `vic:"0.1" scope:"read-only" key:"common"`
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/cmd/tether/ |
H A D | ops.go | 33 func (t *operations) HandleSessionExit(config *tether.ExecutorConfig, session *tether.SessionConfig…
|
H A D | tether_test.go | 215 func StartTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, extrac… 236 func StartAttachTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, …
|
H A D | ops_linux.go | 209 func setupFirewall(ctx context.Context, t *tether.BaseOperations, config *tether.ExecutorConfig) er…
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v1/ |
H A D | virtual_container_host.go | 53 executor.ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/lib/migration/samples/config/v2/ |
H A D | virtual_container_host.go | 53 executor.ExecutorConfig `vic:"0.1" scope:"read-only" key:"init"` anonMember
|