/dports/sysutils/consul_exporter/consul_exporter-0.3.0/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl.go | 100 ServiceRead(string) bool methodSpec 193 func (s *StaticACL) ServiceRead(string) bool { func 603 func (p *PolicyACL) ServiceRead(name string) bool { func 617 return p.parent.ServiceRead(name)
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl.go | 108 ServiceRead(string) bool methodSpec 205 func (s *StaticACL) ServiceRead(string) bool { func 664 func (p *PolicyACL) ServiceRead(name string) bool { func 678 return p.parent.ServiceRead(name)
|
H A D | acl_test.go | 86 if !all.ServiceRead("foobar") { 156 if none.ServiceRead("foobar") { 220 if !manage.ServiceRead("foobar") { 363 if c.read != acl.ServiceRead(c.inp) { 529 if c.read != acl.ServiceRead(c.inp) {
|
/dports/sysutils/consul/consul-1.10.3/agent/consul/ |
H A D | filter.go | 54 return t.authorizer.ServiceRead(result.Service.Service, &authzContext) != acl.Allow 58 return t.authorizer.ServiceRead(result.Check.ServiceName, &authzContext) != acl.Allow
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | filter.go | 54 return t.authorizer.ServiceRead(result.Service.Service, &authzContext) != acl.Allow 58 return t.authorizer.ServiceRead(result.Check.ServiceName, &authzContext) != acl.Allow
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | filter.go | 54 return t.authorizer.ServiceRead(result.Service.Service, &authzContext) != acl.Allow 58 return t.authorizer.ServiceRead(result.Check.ServiceName, &authzContext) != acl.Allow
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | filter.go | 54 return t.authorizer.ServiceRead(result.Service.Service, &authzContext) != acl.Allow 58 return t.authorizer.ServiceRead(result.Check.ServiceName, &authzContext) != acl.Allow
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/consul/ |
H A D | filter.go | 70 return !t.authorizer.ServiceRead(result.Service.Service) 73 return !t.authorizer.ServiceRead(result.Check.ServiceName)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/agent/consul/ |
H A D | filter.go | 54 return t.authorizer.ServiceRead(result.Service.Service, &authzContext) != acl.Allow 58 return t.authorizer.ServiceRead(result.Check.ServiceName, &authzContext) != acl.Allow
|
/dports/sysutils/consul/consul-1.10.3/acl/ |
H A D | authorizer.go | 134 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 231 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 202 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 204 return authz.ServiceRead(name, entCtx)
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/acl/ |
H A D | authorizer.go | 131 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 225 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 196 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 198 return authz.ServiceRead(name, entCtx)
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/acl/ |
H A D | authorizer.go | 134 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 231 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 202 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 204 return authz.ServiceRead(name, entCtx)
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/acl/ |
H A D | authorizer.go | 134 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 231 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 202 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 204 return authz.ServiceRead(name, entCtx)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/acl/ |
H A D | authorizer.go | 131 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 225 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 196 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 198 return authz.ServiceRead(name, entCtx)
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/acl/ |
H A D | authorizer.go | 134 ServiceRead(string, *AuthorizerContext) EnforcementDecision methodSpec 231 return authz.ServiceRead(segment, ctx), nil
|
H A D | chained_authorizer.go | 202 func (c *ChainedAuthorizer) ServiceRead(name string, entCtx *AuthorizerContext) EnforcementDecision… func 204 return authz.ServiceRead(name, entCtx)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/agent/ |
H A D | acl.go | 248 if rule.ServiceRead(service.Service) { 271 if rule.ServiceRead(check.ServiceName) {
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl.go | 119 ServiceRead(string) bool methodSpec 228 func (s *StaticACL) ServiceRead(string) bool { func 733 func (p *PolicyACL) ServiceRead(name string) bool { func 743 return p.parent.ServiceRead(name)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/acl/ |
H A D | acl.go | 119 ServiceRead(string) bool methodSpec 228 func (s *StaticACL) ServiceRead(string) bool { func 733 func (p *PolicyACL) ServiceRead(name string) bool { func 743 return p.parent.ServiceRead(name)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/acl/ |
H A D | acl.go | 119 ServiceRead(string) bool methodSpec 228 func (s *StaticAuthorizer) ServiceRead(string) bool { func 891 func (p *PolicyAuthorizer) ServiceRead(name string) bool { func 901 return p.parent.ServiceRead(name)
|