/dports/net/rclone/rclone-1.57.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net/drive/drive-0.4.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/gohugo/hugo-0.91.2/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net/cloudquery/cloudquery-0.16.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/security/xray-core/Xray-core-1.5.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/workhorse/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/gitlab-pages/gitlab-pages-f8512edbec4ec83b426c8ca2dda467de424685e4/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/devel/gitlab-shell/gitlab-shell-65b8ec55bebd0aea64ac52b9878bafcc2ad992d3/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net/v2ray/v2ray-core-4.36.2/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/minio-client/mc-RELEASE.2021-12-10T00-14-28Z/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/sysutils/restic/restic-0.12.1/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/google.golang.org/grpc/grpc-go-1.34.0/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/textproc/gitlab-elasticsearch-indexer/gitlab-elasticsearch-indexer-ef1440548effec15831eda2d246dacc43233cefb/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/tusd/tusd-1.8.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/databases/litestream/litestream-0.3.6/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/sysutils/terraform-docs/terraform-docs-0.16.0/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 138 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 143 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 147 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/net/grpcurl/grpcurl-1.8.5/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 136 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 141 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 145 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ 381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{ [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/google.golang.org/grpc/security/authorization/engine/ |
H A D | engine_test.go | 82 denyFailEngine = &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{ 87 denyUnknownEngine = &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{ 116 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 122 deny: &pb.RBAC{Action: pb.RBAC_DENY}, 127 allow: &pb.RBAC{Action: pb.RBAC_DENY}, 164 engine: &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{}}, 169 engine: &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{}},
|
/dports/net/cloudquery/cloudquery-0.16.0/vendor/google.golang.org/grpc/internal/xds/rbac/ |
H A D | rbac_engine.go | 84 case engine.action == v3rbacpb.RBAC_DENY && ok: 107 if a != v3rbacpb.RBAC_ALLOW && a != v3rbacpb.RBAC_DENY {
|
/dports/www/minio-client/mc-RELEASE.2021-12-10T00-14-28Z/vendor/google.golang.org/grpc/internal/xds/rbac/ |
H A D | rbac_engine.go | 84 case engine.action == v3rbacpb.RBAC_DENY && ok: 107 if a != v3rbacpb.RBAC_ALLOW && a != v3rbacpb.RBAC_DENY {
|