/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/envelope/testing/ |
H A D | kms_plugin_mock.go | 37 kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1" packageName 55 lastEncryptRequest *kmsapi.EncryptRequest 71 kmsapi.RegisterKeyManagementServiceServer(server, result) 79 _, gRPCErr = plugin.Encrypt(context.Background(), &kmsapi.EncryptRequest{Plain: []byte("foo")}) 137 func (s *Base64Plugin) Version(ctx context.Context, request *kmsapi.VersionRequest) (*kmsapi.Versio… 139 …return &kmsapi.VersionResponse{Version: s.ver, RuntimeName: "testKMS", RuntimeVersion: "0.0.1"}, n… 143 func (s *Base64Plugin) Decrypt(ctx context.Context, request *kmsapi.DecryptRequest) (*kmsapi.Decryp… 158 return &kmsapi.DecryptResponse{Plain: buf[:n]}, nil 162 func (s *Base64Plugin) Encrypt(ctx context.Context, request *kmsapi.EncryptRequest) (*kmsapi.Encryp… 175 return &kmsapi.EncryptResponse{Cipher: buf}, nil
|
/dports/sysutils/helm/helm-3.5.2/vendor/k8s.io/apiserver/pkg/storage/value/encrypt/envelope/testing/ |
H A D | kms_plugin_mock.go | 37 kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1" packageName 55 lastEncryptRequest *kmsapi.EncryptRequest 71 kmsapi.RegisterKeyManagementServiceServer(server, result) 79 _, gRPCErr = plugin.Encrypt(context.Background(), &kmsapi.EncryptRequest{Plain: []byte("foo")}) 137 func (s *Base64Plugin) Version(ctx context.Context, request *kmsapi.VersionRequest) (*kmsapi.Versio… 139 …return &kmsapi.VersionResponse{Version: s.ver, RuntimeName: "testKMS", RuntimeVersion: "0.0.1"}, n… 143 func (s *Base64Plugin) Decrypt(ctx context.Context, request *kmsapi.DecryptRequest) (*kmsapi.Decryp… 158 return &kmsapi.DecryptResponse{Plain: buf[:n]}, nil 162 func (s *Base64Plugin) Encrypt(ctx context.Context, request *kmsapi.EncryptRequest) (*kmsapi.Encryp… 175 return &kmsapi.EncryptResponse{Cipher: buf}, nil
|
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/envelope/ |
H A D | grpc_service.go | 33 kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1" packageName 48 kmsClient kmsapi.KeyManagementServiceClient 87 s.kmsClient = kmsapi.NewKeyManagementServiceClient(s.connection) 125 request := &kmsapi.VersionRequest{Version: kmsapiVersion} 144 request := &kmsapi.DecryptRequest{Cipher: cipher, Version: kmsapiVersion} 157 request := &kmsapi.EncryptRequest{Plain: plain, Version: kmsapiVersion} 174 if !kmsapi.IsVersionCheckMethod(method) {
|
/dports/sysutils/helm/helm-3.5.2/vendor/k8s.io/apiserver/pkg/storage/value/encrypt/envelope/ |
H A D | grpc_service.go | 33 kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1" packageName 48 kmsClient kmsapi.KeyManagementServiceClient 87 s.kmsClient = kmsapi.NewKeyManagementServiceClient(s.connection) 125 request := &kmsapi.VersionRequest{Version: kmsapiVersion} 144 request := &kmsapi.DecryptRequest{Cipher: cipher, Version: kmsapiVersion} 157 request := &kmsapi.EncryptRequest{Plain: plain, Version: kmsapiVersion} 174 if !kmsapi.IsVersionCheckMethod(method) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
H A D | backend_test.go | 21 kmsapi "cloud.google.com/go/kms/apiv1" packageName 67 func testKMSClient(tb testing.TB) *kmsapi.KeyManagementClient { 71 kmsClient, err := kmsapi.NewKeyManagementClient(ctx,
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/ |
H A D | backend.go | 15 kmsapi "cloud.google.com/go/kms/apiv1" packageName 32 kmsClient *kmsapi.KeyManagementClient 128 func (b *backend) KMSClient(s logical.Storage) (*kmsapi.KeyManagementClient, func(), error) { 173 client, err := kmsapi.NewKeyManagementClient(b.ctx,
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/test/cleanup/ |
H A D | main.go | 20 kmsapi "cloud.google.com/go/kms/apiv1" packageName 28 kmsClient, _ = kmsapi.NewKeyManagementClient(context.Background())
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/integration/controlplane/ |
H A D | kms_transformation_test.go | 38 kmsapi "k8s.io/apiserver/pkg/storage/value/encrypt/envelope/v1beta1" packageName 158 …decryptResponse, err := pluginMock.Decrypt(context.Background(), &kmsapi.DecryptRequest{Version: k…
|