/dports/security/vuls/vuls-0.13.7/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 513 perms.AccessPolicies = append(perms.AccessPolicies, capd) 565 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 579 for i := range perms.AccessPolicies { 580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/www/grafana8/azure-sdk-for-go-sdk-azcore-v0.19.0/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 513 perms.AccessPolicies = append(perms.AccessPolicies, capd) 565 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 579 for i := range perms.AccessPolicies { 580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/security/lego/lego-4.5.3/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/sysutils/restic/restic-0.12.1/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 513 perms.AccessPolicies = append(perms.AccessPolicies, capd) 565 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 579 for i := range perms.AccessPolicies { 580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/sysutils/docker-registry/distribution-2.7.1/vendor/github.com/Azure/azure-sdk-for-go/azure-sdk-for-go-16.2.1/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 513 perms.AccessPolicies = append(perms.AccessPolicies, capd) 565 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 577 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 579 for i := range perms.AccessPolicies { 580 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 585 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 586 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 591 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 592 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 593 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
H A D | container_test.go | 524 perms.AccessPolicies = append(perms.AccessPolicies, capd) 576 c.Assert(perms.AccessPolicies, chk.HasLen, 2) 588 c.Assert(newPerms.AccessPolicies, chk.HasLen, 2) 590 for i := range perms.AccessPolicies { 591 c.Assert(newPerms.AccessPolicies[i].ID, chk.Equals, perms.AccessPolicies[i].ID) 596 c.Assert(newPerms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123), 597 chk.Equals, perms.AccessPolicies[i].StartTime.UTC().Round(time.Second).Format(time.RFC1123)) 602 c.Assert(newPerms.AccessPolicies[i].CanRead, chk.Equals, perms.AccessPolicies[i].CanRead) 603 c.Assert(newPerms.AccessPolicies[i].CanWrite, chk.Equals, perms.AccessPolicies[i].CanWrite) 604 c.Assert(newPerms.AccessPolicies[i].CanDelete, chk.Equals, perms.AccessPolicies[i].CanDelete) [all …]
|
/dports/www/grafana8/azure-sdk-for-go-sdk-internal-v0.7.0/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
/dports/net-mgmt/bosun/bosun-0.9.0-preview/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
/dports/www/grafana8/azure-sdk-for-go-sdk-azidentity-v0.10.0/storage/ |
H A D | queue_test.go | 174 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 198 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 225 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 249 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 275 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 281 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 284 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 311 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 318 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 349 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/Azure/azure-sdk-for-go/storage/ |
H A D | queue_test.go | 185 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 209 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 236 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 260 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 286 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 292 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 295 c.Assert(returnedPerms.AccessPolicies[0].CanAdd, chk.Equals, true) 322 perms.AccessPolicies = append(perms.AccessPolicies, qapd) 329 c.Assert(returnedPerms.AccessPolicies, chk.HasLen, 1) 360 perms.AccessPolicies = append(perms.AccessPolicies, qapd) [all …]
|
/dports/sysutils/py-salt/salt-3004.1/salt/states/ |
H A D | boto_elasticsearch_domain.py | 107 AccessPolicies=None, argument 220 if AccessPolicies is not None and isinstance(AccessPolicies, str): 222 AccessPolicies = salt.utils.json.loads(AccessPolicies) 245 AccessPolicies=AccessPolicies, 301 "AccessPolicies": AccessPolicies,
|