/dports/devel/etcd31/etcd-3.1.20/auth/ |
H A D | store.go | 164 type authStore struct { struct 180 func newDeleterFunc(as *authStore) func(string) { argument 191 func (as *authStore) AuthEnable() error { argument 229 func (as *authStore) AuthDisable() { argument 257 func (as *authStore) Close() error { argument 313 func (as *authStore) Recover(be backend.Backend) { argument 764 func (as *authStore) IsAdminPermitted(authInfo *AuthInfo) error { argument 883 func (as *authStore) isAuthEnabled() bool { argument 905 as := &authStore{ 937 func (as *authStore) commitRevision(tx backend.BatchTx) { argument [all …]
|
H A D | simple_token.go | 93 func (as *authStore) enable() { 110 func (as *authStore) GenSimpleToken() (string, error) { 125 func (as *authStore) assignSimpleTokenToUser(username, token string) { 137 func (as *authStore) invalidateUser(username string) {
|
/dports/devel/etcd32/etcd-3.2.32/auth/ |
H A D | store.go | 180 type authStore struct { struct 193 func (as *authStore) AuthEnable() error { argument 231 func (as *authStore) AuthDisable() { argument 251 func (as *authStore) Close() error { argument 309 func (as *authStore) Recover(be backend.Backend) { argument 897 func (as *authStore) isAuthEnabled() bool { argument 919 as := &authStore{ 950 func (as *authStore) commitRevision(tx backend.BatchTx) { argument 967 func (as *authStore) setRevision(rev uint64) { argument 971 func (as *authStore) Revision() uint64 { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/devel/etcd33/etcd-3.3.23/auth/ |
H A D | store.go | 201 type authStore struct { struct 218 func (as *authStore) AuthEnable() error { argument 256 func (as *authStore) AuthDisable() { argument 277 func (as *authStore) Close() error { argument 335 func (as *authStore) Recover(be backend.Backend) { argument 925 func (as *authStore) isAuthEnabled() bool { argument 947 as := &authStore{ 994 func (as *authStore) setRevision(rev uint64) { argument 998 func (as *authStore) Revision() uint64 { argument 1151 func (as *authStore) HasRole(user, role string) bool { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/devel/etcd33/etcd-3.3.23/vendor/github.com/coreos/etcd/auth/ |
H A D | store.go | 200 type authStore struct { struct 217 func (as *authStore) AuthEnable() error { argument 255 func (as *authStore) AuthDisable() { argument 276 func (as *authStore) Close() error { argument 334 func (as *authStore) Recover(be backend.Backend) { argument 924 func (as *authStore) isAuthEnabled() bool { argument 946 as := &authStore{ 993 func (as *authStore) setRevision(rev uint64) { argument 997 func (as *authStore) Revision() uint64 { argument 1146 func (as *authStore) HasRole(user, role string) bool { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/google/certificate-transparency-go/certificate-transparency-go-1.0.21/vendor/github.com/coreos/etcd/auth/ |
H A D | store.go | 193 type authStore struct { struct 206 func (as *authStore) AuthEnable() error { argument 244 func (as *authStore) AuthDisable() { argument 264 func (as *authStore) Close() error { argument 322 func (as *authStore) Recover(be backend.Backend) { argument 898 func (as *authStore) isAuthEnabled() bool { argument 920 as := &authStore{ 965 func (as *authStore) setRevision(rev uint64) { argument 969 func (as *authStore) Revision() uint64 { argument 1020 func (as *authStore) GenTokenPrefix() (string, error) { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/coreos/etcd/auth/ |
H A D | store.go | 193 type authStore struct { struct 206 func (as *authStore) AuthEnable() error { argument 244 func (as *authStore) AuthDisable() { argument 264 func (as *authStore) Close() error { argument 322 func (as *authStore) Recover(be backend.Backend) { argument 898 func (as *authStore) isAuthEnabled() bool { argument 920 as := &authStore{ 965 func (as *authStore) setRevision(rev uint64) { argument 969 func (as *authStore) Revision() uint64 { argument 1033 func (as *authStore) GenTokenPrefix() (string, error) { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/sysutils/sensu-go/sensu-go-5.11.1/vendor/github.com/coreos/etcd/auth/ |
H A D | store.go | 193 type authStore struct { struct 206 func (as *authStore) AuthEnable() error { argument 244 func (as *authStore) AuthDisable() { argument 264 func (as *authStore) Close() error { argument 322 func (as *authStore) Recover(be backend.Backend) { argument 898 func (as *authStore) isAuthEnabled() bool { argument 920 as := &authStore{ 965 func (as *authStore) setRevision(rev uint64) { argument 969 func (as *authStore) Revision() uint64 { argument 1033 func (as *authStore) GenTokenPrefix() (string, error) { argument [all …]
|
H A D | range_perm_cache.go | 103 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 122 func (as *authStore) clearCachedPerm() { 126 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/www/gitea/gitea-1.16.5/vendor/go.etcd.io/etcd/server/v3/auth/ |
H A D | store.go | 205 type authStore struct { struct 221 func (as *authStore) AuthEnable() error { argument 258 func (as *authStore) AuthDisable() { argument 279 func (as *authStore) Close() error { argument 358 func (as *authStore) Recover(be backend.Backend) { argument 1017 func (as *authStore) IsAuthEnabled() bool { argument 1055 as := &authStore{ 1104 func (as *authStore) setRevision(rev uint64) { argument 1108 func (as *authStore) Revision() uint64 { argument 1316 func (as *authStore) BcryptCost() int { argument [all …]
|
H A D | range_perm_cache.go | 108 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 130 func (as *authStore) clearCachedPerm() { 134 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/security/vault/vault-1.8.2/vendor/go.etcd.io/etcd/auth/ |
H A D | store.go | 200 type authStore struct { struct 216 func (as *authStore) AuthEnable() error { argument 253 func (as *authStore) AuthDisable() { argument 274 func (as *authStore) Close() error { argument 353 func (as *authStore) Recover(be backend.Backend) { argument 1012 func (as *authStore) IsAuthEnabled() bool { argument 1050 as := &authStore{ 1099 func (as *authStore) setRevision(rev uint64) { argument 1103 func (as *authStore) Revision() uint64 { argument 1310 func (as *authStore) BcryptCost() int { argument [all …]
|
H A D | range_perm_cache.go | 108 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 130 func (as *authStore) clearCachedPerm() { 134 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/sysutils/kubectl/kubernetes-1.22.2/vendor/go.etcd.io/etcd/server/v3/auth/ |
H A D | store.go | 202 type authStore struct { struct 217 func (as *authStore) AuthEnable() error { argument 254 func (as *authStore) AuthDisable() { argument 274 func (as *authStore) Close() error { argument 353 func (as *authStore) Recover(be backend.Backend) { argument 1007 func (as *authStore) IsAuthEnabled() bool { argument 1045 as := &authStore{ 1093 func (as *authStore) setRevision(rev uint64) { argument 1097 func (as *authStore) Revision() uint64 { argument 1305 func (as *authStore) BcryptCost() int { argument [all …]
|
H A D | range_perm_cache.go | 108 func (as *authStore) isRangeOpPermitted(tx backend.BatchTx, userName string, key, rangeEnd []byte, … 130 func (as *authStore) clearCachedPerm() { 134 func (as *authStore) invalidateCachedPerm(userName string) {
|
/dports/www/minio-client/etcd-3.5.0/server/auth/ |
H A D | store.go | 202 type authStore struct { struct 217 func (as *authStore) AuthEnable() error { argument 254 func (as *authStore) AuthDisable() { argument 274 func (as *authStore) Close() error { argument 353 func (as *authStore) Recover(be backend.Backend) { argument 1007 func (as *authStore) IsAuthEnabled() bool { argument 1045 as := &authStore{ 1093 func (as *authStore) setRevision(rev uint64) { argument 1097 func (as *authStore) Revision() uint64 { argument 1305 func (as *authStore) BcryptCost() int { argument [all …]
|
/dports/net-im/nextcloud-spreed-signaling/nextcloud-spreed-signaling-0.2.0/vendor/src/go.etcd.io/etcd/auth/ |
H A D | store.go | 209 type authStore struct { struct 228 func (as *authStore) AuthEnable() error { argument 273 func (as *authStore) AuthDisable() { argument 298 func (as *authStore) Close() error { argument 385 func (as *authStore) Recover(be backend.Backend) { argument 1136 func (as *authStore) IsAuthEnabled() bool { argument 1175 as := &authStore{ 1223 func (as *authStore) setRevision(rev uint64) { argument 1227 func (as *authStore) Revision() uint64 { argument 1467 func (as *authStore) BcryptCost() int { argument [all …]
|
/dports/devel/etcd34/etcd-3.4.18/auth/ |
H A D | store.go | 209 type authStore struct { struct 228 func (as *authStore) AuthEnable() error { argument 273 func (as *authStore) AuthDisable() { argument 298 func (as *authStore) Close() error { argument 385 func (as *authStore) Recover(be backend.Backend) { argument 1136 func (as *authStore) IsAuthEnabled() bool { argument 1175 as := &authStore{ 1223 func (as *authStore) setRevision(rev uint64) { argument 1227 func (as *authStore) Revision() uint64 { argument 1467 func (as *authStore) BcryptCost() int { argument [all …]
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/go.etcd.io/etcd/auth/ |
H A D | store.go | 209 type authStore struct { struct 228 func (as *authStore) AuthEnable() error { argument 273 func (as *authStore) AuthDisable() { argument 298 func (as *authStore) Close() error { argument 385 func (as *authStore) Recover(be backend.Backend) { argument 1136 func (as *authStore) IsAuthEnabled() bool { argument 1175 as := &authStore{ 1223 func (as *authStore) setRevision(rev uint64) { argument 1227 func (as *authStore) Revision() uint64 { argument 1467 func (as *authStore) BcryptCost() int { argument [all …]
|
/dports/devel/etcd/etcd-2.3.8/auth/ |
H A D | store.go | 38 type authStore struct { struct 42 func (as *authStore) AuthEnable() { argument 55 func NewAuthStore(bgetter backendGetter) *authStore { 63 return &authStore{
|