/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | rekey_test.go | 55 newConf := &SealConfig{ 59 err = c.RekeyInit(newConf, recovery) 69 newConf.Nonce = conf.Nonce 109 newConf := &SealConfig{ 151 newConf := &SealConfig{ 184 if newConf.StoredShares > 0 { 220 newConf.Nonce = rkconf.Nonce 251 newConf = &SealConfig{ 318 newConf.Nonce = rkconf.Nonce 335 newConf := &SealConfig{ [all …]
|
/dports/net-mgmt/bosun/bosun-0.9.0-preview/cmd/bosun/conf/rule/ |
H A D | modify.go | 18 newConf, err := NewConf(c.Name, c.backends, c.sysVars, rawConfig) 29 if err = c.SaveConf(newConf); err != nil { 62 newConf := c 68 a := newConf.GetAlert(edit.Name) 73 t := newConf.GetTemplate(edit.Name) 78 n := newConf.GetNotification(edit.Name) 83 look := newConf.GetLookup(edit.Name) 88 m := newConf.GetMacro(edit.Name) 100 rawConf = removeSection(l, newConf.RawText) 102 rawConf = writeSection(l, newConf.RawText, edit.Text) [all …]
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/vault/vault-0.6.0/vault/ |
H A D | rekey_test.go | 57 newConf := &SealConfig{ 61 err = c.RekeyInit(newConf, recovery) 71 newConf.Nonce = conf.Nonce 114 newConf := &SealConfig{ 118 err = c.RekeyInit(newConf, recovery) 150 newConf := &SealConfig{ 216 newConf.Nonce = rkconf.Nonce 239 newConf = &SealConfig{ 304 newConf.Nonce = rkconf.Nonce 327 newConf := &SealConfig{ [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/ |
H A D | rekey_test.go | 64 newConf := &SealConfig{ 68 err = c.RekeyInit(newConf, recovery) 78 newConf.Nonce = conf.Nonce 118 newConf := &SealConfig{ 129 err = c.RekeyInit(newConf, recovery) 160 newConf := &SealConfig{ 222 newConf.Nonce = rkconf.Nonce 253 newConf = &SealConfig{ 320 newConf.Nonce = rkconf.Nonce 350 newConf := &SealConfig{ [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/vault/ |
H A D | rekey_test.go | 63 newConf := &SealConfig{ 67 err = c.RekeyInit(newConf, recovery) 77 newConf.Nonce = conf.Nonce 117 newConf := &SealConfig{ 128 err = c.RekeyInit(newConf, recovery) 159 newConf := &SealConfig{ 221 newConf.Nonce = rkconf.Nonce 252 newConf = &SealConfig{ 319 newConf.Nonce = rkconf.Nonce 349 newConf := &SealConfig{ [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | rekey_test.go | 63 newConf := &SealConfig{ 67 err = c.RekeyInit(newConf, recovery) 77 newConf.Nonce = conf.Nonce 117 newConf := &SealConfig{ 128 err = c.RekeyInit(newConf, recovery) 159 newConf := &SealConfig{ 221 newConf.Nonce = rkconf.Nonce 252 newConf = &SealConfig{ 319 newConf.Nonce = rkconf.Nonce 349 newConf := &SealConfig{ [all …]
|
/dports/security/vault/vault-1.8.2/vault/ |
H A D | rekey_test.go | 64 newConf := &SealConfig{ 68 err = c.RekeyInit(newConf, recovery) 78 newConf.Nonce = conf.Nonce 118 newConf := &SealConfig{ 129 err = c.RekeyInit(newConf, recovery) 160 newConf := &SealConfig{ 222 newConf.Nonce = rkconf.Nonce 253 newConf = &SealConfig{ 320 newConf.Nonce = rkconf.Nonce 350 newConf := &SealConfig{ [all …]
|
/dports/devel/spark/spark-2.1.1/core/src/test/scala/org/apache/spark/ |
H A D | MapOutputTrackerSuite.scala | 170 val newConf = new SparkConf constant 171 newConf.set("spark.rpc.message.maxSize", "1") 172 newConf.set("spark.rpc.askTimeout", "1") // Fail fast 175 val masterTracker = newTrackerMaster(newConf) 198 val newConf = new SparkConf constant 199 newConf.set("spark.rpc.message.maxSize", "1") 200 newConf.set("spark.rpc.askTimeout", "1") // Fail fast 203 intercept[IllegalArgumentException] { newTrackerMaster(newConf) } 242 val newConf = new SparkConf constant 243 newConf.set("spark.rpc.message.maxSize", "1") [all …]
|
/dports/devel/hadoop/hadoop-1.2.1/src/test/org/apache/hadoop/ipc/ |
H A D | TestSaslRPC.java | 259 Configuration newConf = new Configuration(conf); in testGetRemotePrincipal() local 266 UserGroupInformation.setConfiguration(newConf); in testGetRemotePrincipal() 268 TestSaslProtocol.class, null, newConf); in testGetRemotePrincipal() 294 Configuration newConf = new Configuration(conf); in testPerConnectionConf() local 303 TestSaslProtocol.versionID, addr, newConf); in testPerConnectionConf() 309 TestSaslProtocol.versionID, addr, newConf); in testPerConnectionConf() 314 TestSaslProtocol.versionID, addr, newConf); in testPerConnectionConf() 335 newConf.set(SERVER_PRINCIPAL_KEY, principal); in testKerberosRpc() 336 newConf.set(SERVER_KEYTAB_KEY, keytab); in testKerberosRpc() 343 ADDRESS, 0, 5, true, newConf, null); in testKerberosRpc() [all …]
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/consul/api/ |
H A D | operator_autopilot_test.go | 25 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 26 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 55 newConf := &AutopilotConfiguration{ 59 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 70 newConf := &AutopilotConfiguration{ 74 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/api/ |
H A D | operator_autopilot_test.go | 26 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 27 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 57 newConf := &AutopilotConfiguration{ 61 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 72 newConf := &AutopilotConfiguration{ 76 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/api/ |
H A D | operator_autopilot_test.go | 25 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 26 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 56 newConf := &AutopilotConfiguration{ 60 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 71 newConf := &AutopilotConfiguration{ 75 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/api/ |
H A D | operator_autopilot_test.go | 26 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 27 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 57 newConf := &AutopilotConfiguration{ 61 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 72 newConf := &AutopilotConfiguration{ 76 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/api/ |
H A D | operator_autopilot_test.go | 26 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 27 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 57 newConf := &AutopilotConfiguration{ 61 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 72 newConf := &AutopilotConfiguration{ 76 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/api/ |
H A D | operator_autopilot_test.go | 25 newConf := &AutopilotConfiguration{CleanupDeadServers: false} 26 if err := operator.AutopilotSetConfiguration(newConf, nil); err != nil { 56 newConf := &AutopilotConfiguration{ 60 resp, err := operator.AutopilotCASConfiguration(newConf, nil) 71 newConf := &AutopilotConfiguration{ 75 resp, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/devel/hadoop2/hadoop-2.7.2-src/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/conf/ |
H A D | ReconfigurationUtil.java | 40 getChangedProperties(Configuration newConf, Configuration oldConf) { in getChangedProperties() argument 47 String newVal = newConf.getRaw(prop); in getChangedProperties() 56 for (Map.Entry<String, String> newEntry: newConf) { in getChangedProperties() 68 Configuration newConf, Configuration oldConf) { in parseChangedProperties() argument 69 return getChangedProperties(newConf, oldConf); in parseChangedProperties()
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/internal/testing/apitests/ |
H A D | operator_autopilot_test.go | 30 newConf := &api.AutopilotConfiguration{CleanupDeadServers: false} 31 _, err := operator.AutopilotSetConfiguration(newConf, nil) 56 newConf := &api.AutopilotConfiguration{ 60 resp, _, err := operator.AutopilotCASConfiguration(newConf, nil) 67 newConf := &api.AutopilotConfiguration{ 71 resp, _, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/sysutils/nomad/nomad-1.1.0/internal/testing/apitests/ |
H A D | operator_autopilot_test.go | 30 newConf := &api.AutopilotConfiguration{CleanupDeadServers: false} 31 _, err := operator.AutopilotSetConfiguration(newConf, nil) 56 newConf := &api.AutopilotConfiguration{ 60 resp, _, err := operator.AutopilotCASConfiguration(newConf, nil) 67 newConf := &api.AutopilotConfiguration{ 71 resp, _, err := operator.AutopilotCASConfiguration(newConf, nil)
|
/dports/devel/spark/spark-2.1.1/sql/core/src/test/scala/org/apache/spark/sql/ |
H A D | RuntimeConfigSuite.scala | 24 private def newConf(): RuntimeConfig = new RuntimeConfig method 27 val conf = newConf() 42 val conf = newConf() 49 val conf = newConf()
|