/dports/devel/elfutils/elfutils-0.179/tests/ |
H A D | run-addrcfi.sh | 370 privileged reg70 (sr0): undefined 371 privileged reg71 (sr1): undefined 372 privileged reg72 (sr2): undefined 373 privileged reg73 (sr3): undefined 374 privileged reg74 (sr4): undefined 375 privileged reg75 (sr5): undefined 376 privileged reg76 (sr6): undefined 377 privileged reg77 (sr7): undefined 378 privileged reg78 (sr8): undefined 379 privileged reg79 (sr9): undefined [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/dom/apps/ |
H A D | PermissionsTable.jsm | 38 privileged: PROMPT_ACTION, 43 privileged: DENY_ACTION, 49 privileged: PROMPT_ACTION, 54 privileged: ALLOW_ACTION, 59 privileged: ALLOW_ACTION, 64 privileged: ALLOW_ACTION, 69 privileged: DENY_ACTION, 80 privileged: DENY_ACTION, 86 privileged: DENY_ACTION, 116 privileged: DENY_ACTION, [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/codebuild/spec/ |
H A D | buildspec_omnibus.yml | 23 privileged-mode: true 29 privileged-mode: true 35 privileged-mode: true 41 privileged-mode: true 47 privileged-mode: true 54 privileged-mode: true 62 privileged-mode: true 70 privileged-mode: true 78 privileged-mode: true 86 privileged-mode: true [all …]
|
/dports/devel/libvirt/libvirt-7.10.0/src/logging/ |
H A D | log_daemon.c | 329 bool privileged = opaque != NULL; in virLogDaemonClientNew() local 346 if (!privileged) { in virLogDaemonClientNew() 401 if (privileged) { in virLogDaemonExecRestartStatePath() 434 bool privileged, in virLogDaemonPostExecRestart() argument 573 if (privileged) { in virLogDaemonUsage() 626 bool privileged = false; in main() local 641 privileged = geteuid() == 0; in main() 734 privileged, in main() 739 virPidFileConstructPath(privileged, in main() 769 if (privileged) { in main() [all …]
|
/dports/net/concourse-fly/concourse-6.7.1/worker/runtime/spec/ |
H A D | spec.go | 114 if privileged { 174 func OciCgroupsPath(basePath, handle string, privileged bool) string { 175 if privileged { 185 func envWithDefaultPath(env []string, privileged bool) []string { 192 if privileged { 207 namespaces = OciNamespaces(privileged) 208 capabilities = OciCapabilities(privileged) 212 if privileged { 227 UIDMappings: OciIDMappings(privileged, maxUid), 228 GIDMappings: OciIDMappings(privileged, maxGid), [all …]
|
/dports/misc/concourse/concourse-6.7.2/worker/runtime/spec/ |
H A D | spec.go | 114 if privileged { 174 func OciCgroupsPath(basePath, handle string, privileged bool) string { 175 if privileged { 185 func envWithDefaultPath(env []string, privileged bool) []string { 192 if privileged { 207 namespaces = OciNamespaces(privileged) 208 capabilities = OciCapabilities(privileged) 212 if privileged { 227 UIDMappings: OciIDMappings(privileged, maxUid), 228 GIDMappings: OciIDMappings(privileged, maxGid), [all …]
|
/dports/net/concourse-fly/concourse-6.7.1/vendor/github.com/concourse/baggageclaim/volume/ |
H A D | stream_in_out_linux.go | 13 func (streamer *tarZstdStreamer) In(tzstInput io.Reader, dest string, privileged bool) (bool, error… 14 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xf", "-") 46 func (streamer *tarZstdStreamer) Out(tzstOutput io.Writer, src string, privileged bool) error { 62 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cf", "-", tarCo… 91 func (streamer *tarGzipStreamer) In(tgzStream io.Reader, dest string, privileged bool) (bool, error… 92 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xz") 115 func (streamer *tarGzipStreamer) Out(w io.Writer, src string, privileged bool) error { 131 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cz", tarCommand… 149 func tarCmd(namespacer uidgid.Namespacer, privileged bool, dir string, args ...string) (*exec.Cmd, … 164 if !privileged {
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/concourse/baggageclaim/volume/ |
H A D | stream_in_out_linux.go | 13 func (streamer *tarZstdStreamer) In(tzstInput io.Reader, dest string, privileged bool) (bool, error… 14 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xf", "-") 46 func (streamer *tarZstdStreamer) Out(tzstOutput io.Writer, src string, privileged bool) error { 62 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cf", "-", tarCo… 91 func (streamer *tarGzipStreamer) In(tgzStream io.Reader, dest string, privileged bool) (bool, error… 92 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xz") 115 func (streamer *tarGzipStreamer) Out(w io.Writer, src string, privileged bool) error { 131 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cz", tarCommand… 149 func tarCmd(namespacer uidgid.Namespacer, privileged bool, dir string, args ...string) (*exec.Cmd, … 164 if !privileged {
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/ |
H A D | Vagrantfile | 24 privileged: false, 44 privileged: false, 69 privileged: true, 124 privileged: true, 128 privileged: true, 132 privileged: true, 136 privileged: true, 140 privileged: true, 144 privileged: true, 148 privileged: true, [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/services/viz/ |
H A D | README.md | 8 Viz has two types of clients: a single privileged client and one or more 11 The privileged client is responsible for starting and restarting Viz after a 13 privileged client is trusted by all other clients, and is expected to be 16 Unprivileged clients request connections to Viz through the privileged client 39 directory if one exists for a given mojom. private and privileged interfaces 71 //services/viz/public/<language> and //services/viz/privileged/<language> 77 //services/viz/privileged/interfaces/{compositing, gl, hit_test, media} 78 //services/viz/privileged/<language>/{compositing, gl, hit_test, media} 86 window server serves as the privileged client to Viz. 135 The privileged client can depend on [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/services/viz/ |
H A D | README.md | 8 Viz has two types of clients: a single privileged client and one or more 11 The privileged client is responsible for starting and restarting Viz after a 13 privileged client is trusted by all other clients, and is expected to be 16 Unprivileged clients request connections to Viz through the privileged client 39 directory if one exists for a given mojom. private and privileged interfaces 71 //services/viz/public/<language> and //services/viz/privileged/<language> 77 //services/viz/privileged/interfaces/{compositing, gl, hit_test, media} 78 //services/viz/privileged/<language>/{compositing, gl, hit_test, media} 86 window server serves as the privileged client to Viz. 135 The privileged client can depend on [all …]
|
/dports/sysutils/nomad/nomad-1.1.0/ |
H A D | Vagrantfile | 24 privileged: false, 44 privileged: false, 69 privileged: true, 124 privileged: true, 128 privileged: true, 132 privileged: true, 136 privileged: true, 140 privileged: true, 144 privileged: true, 148 privileged: true, [all …]
|
/dports/sysutils/consolekit2/ConsoleKit2-520b862/src/ |
H A D | test-method-access-policy | 15 if privileged: 57 if not privileged: 61 if privileged: 456 if not privileged: 460 if privileged: 472 if not privileged: 476 if privileged: 492 if not privileged: 496 if privileged: 508 if not privileged: [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/kubernetes/client/models/ |
H A D | v1_security_context.py | 57 privileged=None, argument 83 if privileged is not None: 84 self.privileged = privileged 156 def privileged(self): member in V1SecurityContext 167 @privileged.setter 168 def privileged(self, privileged): member in V1SecurityContext 178 self._privileged = privileged
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_mongos/molecule/default/ |
H A D | molecule.yml | 16 # privileged: True 25 privileged: True 34 privileged: True 41 privileged: True 48 privileged: True 55 # privileged: True 62 privileged: True
|
/dports/mail/mailman-postfix/mailman-2.1.39/contrib/ |
H A D | majordomo2mailman.pl | 134 my @privileged; # addresses that are mentioned in restrict_post 225 @privileged = (); 228 push (@privileged, <FH>); 229 chomp @privileged; 235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged); 238 $mlconf{"privileged"} = \@privileged; 300 for $priv (@privileged) { 644 my %privileged = (); 654 if (not exists $privileged{$key}) { 663 my %diff = %privileged; [all …]
|
/dports/mail/mailman-exim4/mailman-2.1.39/contrib/ |
H A D | majordomo2mailman.pl | 134 my @privileged; # addresses that are mentioned in restrict_post 225 @privileged = (); 228 push (@privileged, <FH>); 229 chomp @privileged; 235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged); 238 $mlconf{"privileged"} = \@privileged; 300 for $priv (@privileged) { 644 my %privileged = (); 654 if (not exists $privileged{$key}) { 663 my %diff = %privileged; [all …]
|
/dports/mail/mailman/mailman-2.1.39/contrib/ |
H A D | majordomo2mailman.pl | 134 my @privileged; # addresses that are mentioned in restrict_post 225 @privileged = (); 228 push (@privileged, <FH>); 229 chomp @privileged; 235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged); 238 $mlconf{"privileged"} = \@privileged; 300 for $priv (@privileged) { 644 my %privileged = (); 654 if (not exists $privileged{$key}) { 663 my %diff = %privileged; [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_auth/molecule/default/ |
H A D | molecule.yml | 15 privileged: True 21 privileged: True 27 privileged: True 31 privileged: True 35 privileged: True 39 privileged: True
|
/dports/net/concourse-fly/concourse-6.7.1/testflight/fixtures/ |
H A D | resource-types-privileged.yml | 5 privileged: ((privileged)) 10 # privileged container may warm the cache which can propagate to 11 # pipelines that don't have it marked privileged 40 echo privileged: $(cat my-resource/privileged)
|
/dports/misc/concourse/concourse-6.7.2/testflight/fixtures/ |
H A D | resource-types-privileged.yml | 5 privileged: ((privileged)) 10 # privileged container may warm the cache which can propagate to 11 # pipelines that don't have it marked privileged 40 echo privileged: $(cat my-resource/privileged)
|
/dports/devel/libvirt/libvirt-7.10.0/src/locking/ |
H A D | lock_daemon.c | 449 bool privileged = opaque != NULL; in virLockDaemonClientNew() local 466 if (!privileged) { in virLockDaemonClientNew() 594 if (privileged) { in virLockDaemonExecRestartStatePath() 783 if (privileged) { in virLockDaemonUsage() 836 bool privileged = false; in main() local 851 privileged = geteuid() == 0; in main() 945 privileged, in main() 950 virPidFileConstructPath(privileged, in main() 960 privileged, in main() 980 if (privileged) { in main() [all …]
|
/dports/shells/zsh/zsh-5.8.1/Test/ |
H A D | P01privileged.ztst | 137 re_zsh $ruid $ruid -1 -1 'echo $UID/$EUID $options[privileged]' 156 *?zsh:unsetopt:1: can't change option: privileged 159 re_zsh 0 $euid -1 -1 'unsetopt privileged && echo $UID/$EUID' 163 re_zsh $ruid $euid -1 -1 "unsetopt privileged; UID=$euid" || 164 re_zsh $ruid $euid -1 -1 "unsetopt privileged; EUID=$euid" 167 *?zsh:unsetopt:1: can't change option: privileged 170 *?zsh:unsetopt:1: can't change option: privileged 179 re_zsh $ruid 0 $rgid 0 'unsetopt privileged; GID=0' || 180 re_zsh $ruid 0 $rgid 0 'unsetopt privileged; EGID=0' 194 re_zsh $rruid 0 -1 -1 'unsetopt privileged' [all …]
|
/dports/security/keybase/client-v5.7.1/osx/MPMessagePack/XPC/ |
H A D | MPXPCClient.h | 17 @property (readonly) BOOL privileged; 24 - (instancetype)initWithServiceName:(NSString *)serviceName privileged:(BOOL)privileged; 25 - (instancetype)initWithServiceName:(NSString *)serviceName privileged:(BOOL)privileged readOptions…
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_linux/molecule/default/ |
H A D | molecule.yml | 15 privileged: True 24 privileged: True 33 privileged: True 40 privileged: True 47 privileged: True 54 privileged: True
|