Home
last modified time | relevance | path

Searched refs:credentialType (Results 1 – 25 of 240) sorted by relevance

12345678910

/dports/lang/mono/mono-5.10.1.57/mcs/class/referencesource/System.ServiceModel/System/ServiceModel/
H A DPeerTransportSecuritySettings.cs18 PeerTransportCredentialType credentialType; field in System.ServiceModel.PeerTransportSecuritySettings
22 this.credentialType = DefaultCredentialType; in PeerTransportSecuritySettings()
27 this.credentialType = other.credentialType; in PeerTransportSecuritySettings()
32 credentialType = element.CredentialType; in PeerTransportSecuritySettings()
37 get { return this.credentialType; }
44 this.credentialType = value;
53 PeerTransportCredentialType credentialType = PeerTransportCredentialType.Password; in OnImportPolicy()
59 credentialType = PeerTransportCredentialType.Password; in OnImportPolicy()
62 credentialType = PeerTransportCredentialType.Certificate; in OnImportPolicy()
68 this.CredentialType = credentialType; in OnImportPolicy()
/dports/lang/spidermonkey60/firefox-60.9.0/testing/web-platform/meta/webrtc/
H A DRTCConfiguration-iceServers.html.ini50 [setConfiguration(config) - with stun server and credentialType password should succeed]
89 [setConfiguration(config) - with empty urls and credentialType password should succeed]
92 [new RTCPeerConnection(config) - with empty urls and credentialType oauth should succeed]
95 [setConfiguration(config) - with empty urls and credentialType oauth should succeed]
98 [setConfiguration(config) - with invalid credentialType should throw TypeError]
101 [new RTCPeerConnection(config) - with credentialType token should throw TypeError]
104 [setConfiguration(config) - with credentialType token should throw TypeError]
137 …[new RTCPeerConnection(config) - with stun server, credentialType oauth, and string credential sho…
140 …[setConfiguration(config) - with stun server, credentialType oauth, and string credential should s…
149 …[new RTCPeerConnection(config) - with empty urls list, credentialType oauth, and string credential…
[all …]
/dports/misc/concourse/vault-bdd38fca2cff/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/istio/vault-sdk-v0.1.12/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/logical/aws/
H A Dpath_user.go85 var credentialType string
88 credentialType = role.CredentialTypes[0]
94 credentialType = iamUserCred
96 credentialType = federationTokenCred
99 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
100 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
108 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
111 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
112 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
116 switch credentialType {
[all …]
/dports/security/vault/vault-1.8.2/builtin/logical/aws/
H A Dpath_user.go89 var credentialType string
92 credentialType = role.CredentialTypes[0]
98 credentialType = iamUserCred
100 credentialType = federationTokenCred
103 if !strutil.StrListContains(role.CredentialTypes, credentialType) {
104 …("requested credential type %q not in allowed credential types %#v", credentialType, role.Credenti…
112 if credentialType == iamUserCred && strings.HasPrefix(req.Path, "sts") {
115 if credentialType != iamUserCred && strings.HasPrefix(req.Path, "creds") {
116 …%s credentials through the creds path; this is not allowed for legacy roles", credentialType)), nil
120 switch credentialType {
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/
H A Dchained_token_credential.go22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
23 logCredentialError(credErr.credentialType, credErr)
28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
29 logCredentialError(credErr.credentialType, credErr)
65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
H A Denvironment_credential.go53 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
54 logCredentialError(err.credentialType, err)
59 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
60 logCredentialError(err.credentialType, err)
89 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
90 logCredentialError(err.credentialType, err)
/dports/sysutils/restic/restic-0.12.1/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/
H A Dchained_token_credential.go22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
23 logCredentialError(credErr.credentialType, credErr)
28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
29 logCredentialError(credErr.credentialType, credErr)
65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
H A Denvironment_credential.go53 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
54 logCredentialError(err.credentialType, err)
59 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
60 logCredentialError(err.credentialType, err)
89 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
90 logCredentialError(err.credentialType, err)
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/
H A Dchained_token_credential.go22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
23 logCredentialError(credErr.credentialType, credErr)
28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
29 logCredentialError(credErr.credentialType, credErr)
65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
/dports/www/grafana8/azure-sdk-for-go-sdk-azidentity-v0.10.0/sdk/azidentity/
H A Denvironment_credential.go56 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
57 logCredentialError(err.credentialType, err)
62 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
63 logCredentialError(err.credentialType, err)
92 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
93 logCredentialError(err.credentialType, err)
H A Dchained_token_credential.go24 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
25 logCredentialError(credErr.credentialType, credErr)
30 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
31 logCredentialError(credErr.credentialType, credErr)
67 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/Azure/azure-sdk-for-go/sdk/azidentity/
H A Denvironment_credential.go56 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
57 logCredentialError(err.credentialType, err)
62 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
63 logCredentialError(err.credentialType, err)
92 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
93 logCredentialError(err.credentialType, err)
H A Dchained_token_credential.go24 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
25 logCredentialError(credErr.credentialType, credErr)
30 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
31 logCredentialError(credErr.credentialType, credErr)
67 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
/dports/www/grafana8/azure-sdk-for-go-sdk-azcore-v0.19.0/sdk/azidentity/
H A Denvironment_credential.go54 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
55 logCredentialError(err.credentialType, err)
60 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
61 logCredentialError(err.credentialType, err)
90 …err := &CredentialUnavailableError{credentialType: "Environment Credential", message: "Missing env…
91 logCredentialError(err.credentialType, err)
H A Dchained_token_credential.go22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
23 logCredentialError(credErr.credentialType, credErr)
28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
29 logCredentialError(credErr.credentialType, credErr)
65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…
/dports/www/grafana8/azure-sdk-for-go-sdk-internal-v0.7.0/sdk/azidentity/
H A Dchained_token_credential.go22 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Lengt…
23 logCredentialError(credErr.credentialType, credErr)
28 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: "Sourc…
29 logCredentialError(credErr.credentialType, credErr)
65 …credErr := &CredentialUnavailableError{credentialType: "Chained Token Credential", message: create…

12345678910