Home
last modified time | relevance | path

Searched refs:AccessPolicies (Results 1 – 25 of 501) sorted by relevance

12345678910>>...21

/dports/security/vuls/vuls-0.13.7/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go513 perms.AccessPolicies = append(perms.AccessPolicies, capd)
565 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
579 for i := range perms.AccessPolicies {
580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/www/grafana8/azure-sdk-for-go-sdk-azcore-v0.19.0/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go513 perms.AccessPolicies = append(perms.AccessPolicies, capd)
565 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
579 for i := range perms.AccessPolicies {
580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/security/lego/lego-4.5.3/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/sysutils/restic/restic-0.12.1/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go513 perms.AccessPolicies = append(perms.AccessPolicies, capd)
565 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
579 for i := range perms.AccessPolicies {
580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/sysutils/docker-registry/distribution-2.7.1/vendor/github.com/Azure/azure-sdk-for-go/azure-sdk-for-go-16.2.1/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go513 perms.AccessPolicies = append(perms.AccessPolicies, capd)
565 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
579 for i := range perms.AccessPolicies {
580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
H A Dcontainer_test.go524 perms.AccessPolicies = append(perms.AccessPolicies, capd)
576 c.Assert(perms.AccessPolicies, chk.HasLen, 2)
588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2)
590 for i := range perms.AccessPolicies {
591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID)
596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123),
597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123))
602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead)
603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite)
604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete)
[all …]
/dports/www/grafana8/azure-sdk-for-go-sdk-internal-v0.7.0/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
/dports/net-mgmt/bosun/bosun-0.9.0-preview/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
/dports/www/grafana8/azure-sdk-for-go-sdk-azidentity-v0.10.0/storage/
H A Dqueue_test.go174 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
198 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
225 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
249 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
275 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
311 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
349 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/Azure/azure-sdk-for-go/storage/
H A Dqueue_test.go185 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
209 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
236 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
260 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
286 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true)
322 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1)
360 perms.AccessPolicies = append(perms.AccessPolicies, qapd)
[all …]
/dports/sysutils/py-salt/salt-3004.1/salt/states/
H A Dboto_elasticsearch_domain.py107 AccessPolicies=None, argument
220 if AccessPolicies is not None and isinstance(AccessPolicies, str):
222 AccessPolicies = salt.utils.json.loads(AccessPolicies)
245 AccessPolicies=AccessPolicies,
301 "AccessPolicies": AccessPolicies,

12345678910>>...21