Home
last modified time | relevance | path

Searched refs:RBAC_DENY (Results 1 – 25 of 115) sorted by relevance

12345

/dports/net/rclone/rclone-1.57.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net/drive/drive-0.4.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/gohugo/hugo-0.91.2/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net/cloudquery/cloudquery-0.16.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/security/xray-core/Xray-core-1.5.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/workhorse/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/gitlab-pages/gitlab-pages-f8512edbec4ec83b426c8ca2dda467de424685e4/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/devel/gitlab-shell/gitlab-shell-65b8ec55bebd0aea64ac52b9878bafcc2ad992d3/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net/v2ray/v2ray-core-4.36.2/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/minio-client/mc-RELEASE.2021-12-10T00-14-28Z/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/sysutils/restic/restic-0.12.1/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/google.golang.org/grpc/grpc-go-1.34.0/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/textproc/gitlab-elasticsearch-indexer/gitlab-elasticsearch-indexer-ef1440548effec15831eda2d246dacc43233cefb/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/tusd/tusd-1.8.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/www/grafana8/grafana-8.3.6/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/databases/litestream/litestream-0.3.6/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/sysutils/terraform-docs/terraform-docs-0.16.0/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go138 deny: &pb.RBAC{Action: pb.RBAC_DENY},
143 deny: &pb.RBAC{Action: pb.RBAC_DENY},
147 allow: &pb.RBAC{Action: pb.RBAC_DENY},
324 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
331 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
339 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
350 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
361 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
372 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
383 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/net/grpcurl/grpcurl-1.8.5/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go136 deny: &pb.RBAC{Action: pb.RBAC_DENY},
141 deny: &pb.RBAC{Action: pb.RBAC_DENY},
145 allow: &pb.RBAC{Action: pb.RBAC_DENY},
322 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
329 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
337 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
348 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
359 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
370 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
381 deny: &pb.RBAC{Action: pb.RBAC_DENY, Policies: map[string]*pb.Policy{
[all …]
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/google.golang.org/grpc/security/authorization/engine/
H A Dengine_test.go82 denyFailEngine = &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{
87 denyUnknownEngine = &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{
116 deny: &pb.RBAC{Action: pb.RBAC_DENY},
122 deny: &pb.RBAC{Action: pb.RBAC_DENY},
127 allow: &pb.RBAC{Action: pb.RBAC_DENY},
164 engine: &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{}},
169 engine: &policyEngine{action: pb.RBAC_DENY, programs: map[string]cel.Program{}},
/dports/net/cloudquery/cloudquery-0.16.0/vendor/google.golang.org/grpc/internal/xds/rbac/
H A Drbac_engine.go84 case engine.action == v3rbacpb.RBAC_DENY && ok:
107 if a != v3rbacpb.RBAC_ALLOW && a != v3rbacpb.RBAC_DENY {
/dports/www/minio-client/mc-RELEASE.2021-12-10T00-14-28Z/vendor/google.golang.org/grpc/internal/xds/rbac/
H A Drbac_engine.go84 case engine.action == v3rbacpb.RBAC_DENY && ok:
107 if a != v3rbacpb.RBAC_ALLOW && a != v3rbacpb.RBAC_DENY {

12345