/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/security/vault/vault-1.8.2/builtin/credential/okta/ |
H A D | backend.go | 75 if len(cfg.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, cfg.TokenBoundCIDRs) {
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-auth-azure/ |
H A D | path_login.go | 75 if len(role.TokenBoundCIDRs) > 0 { 80 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 83 if len(role.TokenBoundCIDRs) > 0 { 88 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_oidc.go | 109 if len(role.TokenBoundCIDRs) > 0 { 114 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
H A D | path_login.go | 81 if len(role.TokenBoundCIDRs) > 0 { 86 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-auth-kubernetes/ |
H A D | path_login.go | 80 if len(role.TokenBoundCIDRs) > 0 { 85 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-auth-jwt/ |
H A D | path_login.go | 81 if len(role.TokenBoundCIDRs) > 0 { 86 if !cidrutil.RemoteAddrIsOk(req.Connection.RemoteAddr, role.TokenBoundCIDRs) {
|