/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/System.ServiceModel/System/ServiceModel/ |
H A D | PeerTransportSecuritySettings.cs | 18 PeerTransportCredentialType credentialType; field in System.ServiceModel.PeerTransportSecuritySettings 22 this.credentialType = DefaultCredentialType; in PeerTransportSecuritySettings() 27 this.credentialType = other.credentialType; in PeerTransportSecuritySettings() 32 credentialType = element.CredentialType; in PeerTransportSecuritySettings() 37 get { return this.credentialType; } 44 this.credentialType = value; 53 PeerTransportCredentialType credentialType = PeerTransportCredentialType.Password; in OnImportPolicy() 59 credentialType = PeerTransportCredentialType.Password; in OnImportPolicy() 62 credentialType = PeerTransportCredentialType.Certificate; in OnImportPolicy() 68 this.CredentialType = credentialType; in OnImportPolicy()
|
/dports/lang/spidermonkey60/firefox-60.9.0/testing/web-platform/meta/webrtc/ |
H A D | RTCConfiguration-iceServers.html.ini | 50 [setConfiguration(config) - with stun server and credentialType password should succeed] 89 [setConfiguration(config) - with empty urls and credentialType password should succeed] 92 [new RTCPeerConnection(config) - with empty urls and credentialType oauth should succeed] 95 [setConfiguration(config) - with empty urls and credentialType oauth should succeed] 98 [setConfiguration(config) - with invalid credentialType should throw TypeError] 101 [new RTCPeerConnection(config) - with credentialType token should throw TypeError] 104 [setConfiguration(config) - with credentialType token should throw TypeError] 137 …[new RTCPeerConnection(config) - with stun server, credentialType oauth, and string credential sho… 140 …[setConfiguration(config) - with stun server, credentialType oauth, and string credential should s… 149 …[new RTCPeerConnection(config) - with empty urls list, credentialType oauth, and string credential… [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/logical/aws/ |
H A D | path_user.go | 85 var credentialType string 88 credentialType = role.CredentialTypes[0] 94 credentialType = iamUserCred 96 credentialType = federationTokenCred 99 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 116 switch credentialType { [all …]
|
/dports/security/vault/vault-1.8.2/builtin/logical/aws/ |
H A D | path_user.go | 89 var credentialType string 92 credentialType = role.CredentialTypes[0] 98 credentialType = iamUserCred 100 credentialType = federationTokenCred 103 if !strutil.StrListContains(role.CredentialTypes, credentialType) { 104 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti… 112 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") { 115 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") { 116 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil 120 switch credentialType { [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/ |
H A D | chained_token_credential.go | 22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 23 logCredentialError(credErr.credentialType, credErr) 28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 29 logCredentialError(credErr.credentialType, credErr) 65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
H A D | environment_credential.go | 53 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 54 logCredentialError(err.credentialType, err) 59 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 60 logCredentialError(err.credentialType, err) 89 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 90 logCredentialError(err.credentialType, err)
|
/dports/sysutils/restic/restic-0.12.1/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/ |
H A D | chained_token_credential.go | 22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 23 logCredentialError(credErr.credentialType, credErr) 28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 29 logCredentialError(credErr.credentialType, credErr) 65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
H A D | environment_credential.go | 53 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 54 logCredentialError(err.credentialType, err) 59 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 60 logCredentialError(err.credentialType, err) 89 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 90 logCredentialError(err.credentialType, err)
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/ |
H A D | chained_token_credential.go | 22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 23 logCredentialError(credErr.credentialType, credErr) 28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 29 logCredentialError(credErr.credentialType, credErr) 65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
/dports/www/grafana8/azure-sdk-for-go-sdk-azidentity-v0.10.0/sdk/azidentity/ |
H A D | environment_credential.go | 56 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 57 logCredentialError(err.credentialType, err) 62 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 63 logCredentialError(err.credentialType, err) 92 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 93 logCredentialError(err.credentialType, err)
|
H A D | chained_token_credential.go | 24 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 25 logCredentialError(credErr.credentialType, credErr) 30 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 31 logCredentialError(credErr.credentialType, credErr) 67 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/ |
H A D | environment_credential.go | 56 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 57 logCredentialError(err.credentialType, err) 62 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 63 logCredentialError(err.credentialType, err) 92 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 93 logCredentialError(err.credentialType, err)
|
H A D | chained_token_credential.go | 24 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 25 logCredentialError(credErr.credentialType, credErr) 30 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 31 logCredentialError(credErr.credentialType, credErr) 67 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
/dports/www/grafana8/azure-sdk-for-go-sdk-azcore-v0.19.0/sdk/azidentity/ |
H A D | environment_credential.go | 54 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 55 logCredentialError(err.credentialType, err) 60 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 61 logCredentialError(err.credentialType, err) 90 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env… 91 logCredentialError(err.credentialType, err)
|
H A D | chained_token_credential.go | 22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 23 logCredentialError(credErr.credentialType, credErr) 28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 29 logCredentialError(credErr.credentialType, credErr) 65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|
/dports/www/grafana8/azure-sdk-for-go-sdk-internal-v0.7.0/sdk/azidentity/ |
H A D | chained_token_credential.go | 22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt… 23 logCredentialError(credErr.credentialType, credErr) 28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc… 29 logCredentialError(credErr.credentialType, credErr) 65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
|