Home
last modified time | relevance | path

Searched refs:ServiceRead (Results 26 – 50 of 154) sorted by relevance

1234567

/dports/sysutils/consul/consul-1.10.3/agent/consul/
H A Ddiscovery_chain_endpoint.go38 if rule != nil && rule.ServiceRead(args.Name, &authzContext) != acl.Allow {
H A Dinternal_endpoint.go164 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
257 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
341 if authz != nil && authz.ServiceRead(args.Match.Entries[0].Name, &authzContext) != acl.Allow {
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/consul/
H A Ddiscovery_chain_endpoint.go38 if rule != nil && rule.ServiceRead(args.Name, &authzContext) != acl.Allow {
H A Dinternal_endpoint.go164 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
257 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
341 if authz != nil && authz.ServiceRead(args.Match.Entries[0].Name, &authzContext) != acl.Allow {
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/consul/
H A Ddiscovery_chain_endpoint.go38 if rule != nil && rule.ServiceRead(args.Name, &authzContext) != acl.Allow {
H A Dinternal_endpoint.go164 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
257 if authz != nil && authz.ServiceRead(args.ServiceName, &authzContext) != acl.Allow {
341 if authz != nil && authz.ServiceRead(args.Match.Entries[0].Name, &authzContext) != acl.Allow {
/dports/sysutils/consul/consul-1.10.3/agent/
H A Dacl.go240 if authz.ServiceRead(service.Service, &authzContext) == acl.Allow {
270 if authz.ServiceRead(check.ServiceName, &authzContext) == acl.Allow {
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go240 if authz.ServiceRead(service.Service, &authzContext) == acl.Allow {
270 if authz.ServiceRead(check.ServiceName, &authzContext) == acl.Allow {
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go240 if authz.ServiceRead(service.Service, &authzContext) == acl.Allow {
270 if authz.ServiceRead(check.ServiceName, &authzContext) == acl.Allow {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go299 if authz.ServiceRead(service.Service, &authzContext) == acl.Allow {
329 if authz.ServiceRead(check.ServiceName, &authzContext) == acl.Allow {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/structs/
H A Dconfig_entry_gateways.go209 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
335 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go425 if rule.ServiceRead(service.Service) {
448 if rule.ServiceRead(check.ServiceName) {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go314 if authz.ServiceRead(service.Service, &authzContext) == acl.Allow {
344 if authz.ServiceRead(check.ServiceName, &authzContext) == acl.Allow {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go425 if rule.ServiceRead(service.Service) {
448 if rule.ServiceRead(check.ServiceName) {
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/agent/
H A Dacl.go406 if rule.ServiceRead(service.Service) {
429 if rule.ServiceRead(check.ServiceName) {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/consul/
H A Ddiscovery_chain_endpoint.go39 if rule != nil && rule.ServiceRead(args.Name, &authzContext) != acl.Allow {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/consul/
H A Ddiscovery_chain_endpoint.go39 if rule != nil && rule.ServiceRead(args.Name, &authzContext) != acl.Allow {
/dports/sysutils/consul/consul-1.10.3/agent/structs/
H A Dconfig_entry_gateways.go264 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
402 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
H A Dacl_test.go627 require.Equal(t, acl.Allow, authz.ServiceRead("foo", nil))
640 require.Equal(t, acl.Allow, authz.ServiceRead("foo", nil))
656 require.Equal(t, acl.Deny, authz.ServiceRead("foo", nil))
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/structs/
H A Dconfig_entry_gateways.go264 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
402 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/structs/
H A Dconfig_entry_gateways.go264 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
402 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/agent/structs/
H A Dconfig_entry_gateways.go264 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
402 return authz.ServiceRead(e.Name, &authzContext) == acl.Allow
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/structs/
H A Dacl_test.go605 require.True(t, authz.ServiceRead("foo"))
618 require.True(t, authz.ServiceRead("foo"))
634 require.False(t, authz.ServiceRead("foo"))
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/acl/
H A Dstatic_authorizer.go180 func (s *staticAuthorizer) ServiceRead(string, *AuthorizerContext) EnforcementDecision { func
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/acl/
H A Dstatic_authorizer.go180 func (s *staticAuthorizer) ServiceRead(string, *AuthorizerContext) EnforcementDecision { func

1234567