Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 4640) sorted by relevance

12345678910>>...186

/dports/devel/elfutils/elfutils-0.179/tests/
H A Drun-addrcfi.sh370 privileged reg70 (sr0): undefined
371 privileged reg71 (sr1): undefined
372 privileged reg72 (sr2): undefined
373 privileged reg73 (sr3): undefined
374 privileged reg74 (sr4): undefined
375 privileged reg75 (sr5): undefined
376 privileged reg76 (sr6): undefined
377 privileged reg77 (sr7): undefined
378 privileged reg78 (sr8): undefined
379 privileged reg79 (sr9): undefined
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/dom/apps/
H A DPermissionsTable.jsm38 privileged: PROMPT_ACTION,
43 privileged: DENY_ACTION,
49 privileged: PROMPT_ACTION,
54 privileged: ALLOW_ACTION,
59 privileged: ALLOW_ACTION,
64 privileged: ALLOW_ACTION,
69 privileged: DENY_ACTION,
80 privileged: DENY_ACTION,
86 privileged: DENY_ACTION,
116 privileged: DENY_ACTION,
[all …]
/dports/security/s2n/s2n-tls-1.1.2/codebuild/spec/
H A Dbuildspec_omnibus.yml23 privileged-mode: true
29 privileged-mode: true
35 privileged-mode: true
41 privileged-mode: true
47 privileged-mode: true
54 privileged-mode: true
62 privileged-mode: true
70 privileged-mode: true
78 privileged-mode: true
86 privileged-mode: true
[all …]
/dports/devel/libvirt/libvirt-7.10.0/src/logging/
H A Dlog_daemon.c329 bool privileged = opaque != NULL; in virLogDaemonClientNew() local
346 if (!privileged) { in virLogDaemonClientNew()
401 if (privileged) { in virLogDaemonExecRestartStatePath()
434 bool privileged, in virLogDaemonPostExecRestart() argument
573 if (privileged) { in virLogDaemonUsage()
626 bool privileged = false; in main() local
641 privileged = geteuid() == 0; in main()
734 privileged, in main()
739 virPidFileConstructPath(privileged, in main()
769 if (privileged) { in main()
[all …]
/dports/net/concourse-fly/concourse-6.7.1/worker/runtime/spec/
H A Dspec.go114 if privileged {
174 func OciCgroupsPath(basePath, handle string, privileged bool) string {
175 if privileged {
185 func envWithDefaultPath(env []string, privileged bool) []string {
192 if privileged {
207 namespaces = OciNamespaces(privileged)
208 capabilities = OciCapabilities(privileged)
212 if privileged {
227 UIDMappings: OciIDMappings(privileged, maxUid),
228 GIDMappings: OciIDMappings(privileged, maxGid),
[all …]
/dports/misc/concourse/concourse-6.7.2/worker/runtime/spec/
H A Dspec.go114 if privileged {
174 func OciCgroupsPath(basePath, handle string, privileged bool) string {
175 if privileged {
185 func envWithDefaultPath(env []string, privileged bool) []string {
192 if privileged {
207 namespaces = OciNamespaces(privileged)
208 capabilities = OciCapabilities(privileged)
212 if privileged {
227 UIDMappings: OciIDMappings(privileged, maxUid),
228 GIDMappings: OciIDMappings(privileged, maxGid),
[all …]
/dports/net/concourse-fly/concourse-6.7.1/vendor/github.com/concourse/baggageclaim/volume/
H A Dstream_in_out_linux.go13 func (streamer *tarZstdStreamer) In(tzstInput io.Reader, dest string, privileged bool) (bool, error…
14 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xf", "-")
46 func (streamer *tarZstdStreamer) Out(tzstOutput io.Writer, src string, privileged bool) error {
62 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cf", "-", tarCo…
91 func (streamer *tarGzipStreamer) In(tgzStream io.Reader, dest string, privileged bool) (bool, error…
92 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xz")
115 func (streamer *tarGzipStreamer) Out(w io.Writer, src string, privileged bool) error {
131 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cz", tarCommand…
149 func tarCmd(namespacer uidgid.Namespacer, privileged bool, dir string, args ...string) (*exec.Cmd, …
164 if !privileged {
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/concourse/baggageclaim/volume/
H A Dstream_in_out_linux.go13 func (streamer *tarZstdStreamer) In(tzstInput io.Reader, dest string, privileged bool) (bool, error…
14 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xf", "-")
46 func (streamer *tarZstdStreamer) Out(tzstOutput io.Writer, src string, privileged bool) error {
62 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cf", "-", tarCo…
91 func (streamer *tarGzipStreamer) In(tgzStream io.Reader, dest string, privileged bool) (bool, error…
92 tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, dest, "-xz")
115 func (streamer *tarGzipStreamer) Out(w io.Writer, src string, privileged bool) error {
131 …tarCommand, dirFd, err := tarCmd(streamer.namespacer, privileged, tarCommandDir, "-cz", tarCommand…
149 func tarCmd(namespacer uidgid.Namespacer, privileged bool, dir string, args ...string) (*exec.Cmd, …
164 if !privileged {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/
H A DVagrantfile24 privileged: false,
44 privileged: false,
69 privileged: true,
124 privileged: true,
128 privileged: true,
132 privileged: true,
136 privileged: true,
140 privileged: true,
144 privileged: true,
148 privileged: true,
[all …]
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/services/viz/
H A DREADME.md8 Viz has two types of clients: a single privileged client and one or more
11 The privileged client is responsible for starting and restarting Viz after a
13 privileged client is trusted by all other clients, and is expected to be
16 Unprivileged clients request connections to Viz through the privileged client
39 directory if one exists for a given mojom. private and privileged interfaces
71 //services/viz/public/<language> and //services/viz/privileged/<language>
77 //services/viz/privileged/interfaces/{compositing, gl, hit_test, media}
78 //services/viz/privileged/<language>/{compositing, gl, hit_test, media}
86 window server serves as the privileged client to Viz.
135 The privileged client can depend on
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/services/viz/
H A DREADME.md8 Viz has two types of clients: a single privileged client and one or more
11 The privileged client is responsible for starting and restarting Viz after a
13 privileged client is trusted by all other clients, and is expected to be
16 Unprivileged clients request connections to Viz through the privileged client
39 directory if one exists for a given mojom. private and privileged interfaces
71 //services/viz/public/<language> and //services/viz/privileged/<language>
77 //services/viz/privileged/interfaces/{compositing, gl, hit_test, media}
78 //services/viz/privileged/<language>/{compositing, gl, hit_test, media}
86 window server serves as the privileged client to Viz.
135 The privileged client can depend on
[all …]
/dports/sysutils/nomad/nomad-1.1.0/
H A DVagrantfile24 privileged: false,
44 privileged: false,
69 privileged: true,
124 privileged: true,
128 privileged: true,
132 privileged: true,
136 privileged: true,
140 privileged: true,
144 privileged: true,
148 privileged: true,
[all …]
/dports/sysutils/consolekit2/ConsoleKit2-520b862/src/
H A Dtest-method-access-policy15 if privileged:
57 if not privileged:
61 if privileged:
456 if not privileged:
460 if privileged:
472 if not privileged:
476 if privileged:
492 if not privileged:
496 if privileged:
508 if not privileged:
[all …]
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/kubernetes/client/models/
H A Dv1_security_context.py57 privileged=None, argument
83 if privileged is not None:
84 self.privileged = privileged
156 def privileged(self): member in V1SecurityContext
167 @privileged.setter
168 def privileged(self, privileged): member in V1SecurityContext
178 self._privileged = privileged
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_mongos/molecule/default/
H A Dmolecule.yml16 # privileged: True
25 privileged: True
34 privileged: True
41 privileged: True
48 privileged: True
55 # privileged: True
62 privileged: True
/dports/mail/mailman-postfix/mailman-2.1.39/contrib/
H A Dmajordomo2mailman.pl134 my @privileged; # addresses that are mentioned in restrict_post
225 @privileged = ();
228 push (@privileged, <FH>);
229 chomp @privileged;
235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged);
238 $mlconf{"privileged"} = \@privileged;
300 for $priv (@privileged) {
644 my %privileged = ();
654 if (not exists $privileged{$key}) {
663 my %diff = %privileged;
[all …]
/dports/mail/mailman-exim4/mailman-2.1.39/contrib/
H A Dmajordomo2mailman.pl134 my @privileged; # addresses that are mentioned in restrict_post
225 @privileged = ();
228 push (@privileged, <FH>);
229 chomp @privileged;
235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged);
238 $mlconf{"privileged"} = \@privileged;
300 for $priv (@privileged) {
644 my %privileged = ();
654 if (not exists $privileged{$key}) {
663 my %diff = %privileged;
[all …]
/dports/mail/mailman/mailman-2.1.39/contrib/
H A Dmajordomo2mailman.pl134 my @privileged; # addresses that are mentioned in restrict_post
225 @privileged = ();
228 push (@privileged, <FH>);
229 chomp @privileged;
235 @privileged = grep(!/$susearchuser\@$mydomain/i, @privileged);
238 $mlconf{"privileged"} = \@privileged;
300 for $priv (@privileged) {
644 my %privileged = ();
654 if (not exists $privileged{$key}) {
663 my %diff = %privileged;
[all …]
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_auth/molecule/default/
H A Dmolecule.yml15 privileged: True
21 privileged: True
27 privileged: True
31 privileged: True
35 privileged: True
39 privileged: True
/dports/net/concourse-fly/concourse-6.7.1/testflight/fixtures/
H A Dresource-types-privileged.yml5 privileged: ((privileged))
10 # privileged container may warm the cache which can propagate to
11 # pipelines that don't have it marked privileged
40 echo privileged: $(cat my-resource/privileged)
/dports/misc/concourse/concourse-6.7.2/testflight/fixtures/
H A Dresource-types-privileged.yml5 privileged: ((privileged))
10 # privileged container may warm the cache which can propagate to
11 # pipelines that don't have it marked privileged
40 echo privileged: $(cat my-resource/privileged)
/dports/devel/libvirt/libvirt-7.10.0/src/locking/
H A Dlock_daemon.c449 bool privileged = opaque != NULL; in virLockDaemonClientNew() local
466 if (!privileged) { in virLockDaemonClientNew()
594 if (privileged) { in virLockDaemonExecRestartStatePath()
783 if (privileged) { in virLockDaemonUsage()
836 bool privileged = false; in main() local
851 privileged = geteuid() == 0; in main()
945 privileged, in main()
950 virPidFileConstructPath(privileged, in main()
960 privileged, in main()
980 if (privileged) { in main()
[all …]
/dports/shells/zsh/zsh-5.8.1/Test/
H A DP01privileged.ztst137 re_zsh $ruid $ruid -1 -1 'echo $UID/$EUID $options[privileged]'
156 *?zsh:unsetopt:1: can't change option: privileged
159 re_zsh 0 $euid -1 -1 'unsetopt privileged && echo $UID/$EUID'
163 re_zsh $ruid $euid -1 -1 "unsetopt privileged; UID=$euid" ||
164 re_zsh $ruid $euid -1 -1 "unsetopt privileged; EUID=$euid"
167 *?zsh:unsetopt:1: can't change option: privileged
170 *?zsh:unsetopt:1: can't change option: privileged
179 re_zsh $ruid 0 $rgid 0 'unsetopt privileged; GID=0' ||
180 re_zsh $ruid 0 $rgid 0 'unsetopt privileged; EGID=0'
194 re_zsh $rruid 0 -1 -1 'unsetopt privileged'
[all …]
/dports/security/keybase/client-v5.7.1/osx/MPMessagePack/XPC/
H A DMPXPCClient.h17 @property (readonly) BOOL privileged;
24 - (instancetype)initWithServiceName:(NSString *)serviceName privileged:(BOOL)privileged;
25 - (instancetype)initWithServiceName:(NSString *)serviceName privileged:(BOOL)privileged readOptions…
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/mongodb/roles/mongodb_linux/molecule/default/
H A Dmolecule.yml15 privileged: True
24 privileged: True
33 privileged: True
40 privileged: True
47 privileged: True
54 privileged: True

12345678910>>...186