Home
last modified time | relevance | path

Searched refs:rsName (Results 1 – 25 of 221) sorted by relevance

123456789

/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dpath_role_set_secrets_test.go14 rsName := "test-gentoken"
15 testGetRoleSetAccessToken(t, rsName, fmt.Sprintf("roleset/%s/token", rsName))
19 rsName := "test-genkey"
20 testGetRoleSetKey(t, rsName, fmt.Sprintf("roleset/%s/key", rsName))
25 rsName := "test-gentoken"
26 testGetRoleSetAccessToken(t, rsName, fmt.Sprintf("token/%s", rsName))
31 rsName := "test-genkey"
32 testGetRoleSetKey(t, rsName, fmt.Sprintf("key/%s", rsName))
134 rsName := "test-genkey"
197 rsName := "test-genkey"
[all …]
H A Dpath_role_set_test.go21 rsName := "test-basicrs"
43 testRoleSetCreate(t, td, rsName,
72 rsName := "test-updatekeyrs"
93 testRoleSetCreate(t, td, rsName,
143 testRoleSetUpdate(t, td, rsName,
176 rsName := "test-rotatekeyrs"
193 testRoleSetCreate(t, td, rsName,
209 testRoleSetRotate(t, td, rsName)
249 testRoleSetCreate(t, td, rsName,
318 rsName := "test-updatetokenrs"
[all …]
H A Dpath_role_set_secrets.go103 rsName := d.Get("roleset").(string)
108 rs, err := getRoleSet(rsName, ctx, req.Storage)
113 return logical.ErrorResponse("role set %q does not exists", rsName), nil
117 …"role set %q cannot generate service account keys (has secret type %s)", rsName, rs.SecretType), n…
134 rsName := d.Get("roleset").(string)
136 rs, err := getRoleSet(rsName, ctx, req.Storage)
141 return logical.ErrorResponse("role set '%s' does not exists", rsName), nil
145 …onse("role set '%s' cannot generate access tokens (has secret type %s)", rsName, rs.SecretType), n…
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/upgrades/apps/
H A Dreplicasets.go35 rsName = "rs" const
56 ginkgo.By(fmt.Sprintf("Creating replicaset %s in namespace %s", rsName, ns))
61 ginkgo.By(fmt.Sprintf("Waiting for replicaset %s to have all of its replicas ready", rsName))
62 framework.ExpectNoError(e2ereplicaset.WaitForReadyReplicaSet(c, ns, rsName))
74 ginkgo.By(fmt.Sprintf("Waiting for upgrade to finish before checking replicaset %s", rsName))
78 ginkgo.By(fmt.Sprintf("Checking UID to verify replicaset %s survives upgrade", rsName))
79 upgradedRS, err := rsClient.Get(context.TODO(), rsName, metav1.GetOptions{})
86 framework.ExpectNoError(e2ereplicaset.WaitForReadyReplicaSet(c, ns, rsName))
89 ginkgo.By(fmt.Sprintf("Scaling up replicaset %s to %d", rsName, scaleNum))
90 _, err = e2ereplicaset.UpdateReplicaSetWithRetries(c, ns, rsName, func(rs *appsv1.ReplicaSet) {
[all …]
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/apps/
H A Dreplica_set.go61 Name: rsName,
414 rsName := "test-rs"
480 rsName := "test-rs"
505 ginkgo.By(fmt.Sprintf("Scaling up %q replicaset ", rsName))
524 "name": rsName,
539 found := rset.ObjectMeta.Name == rsName &&
565 rsName := "test-rs"
584 r, err := rsClient.Get(context.TODO(), rsName, metav1.GetOptions{})
615 rsName := "test-rs"
696 framework.Logf("Replicaset %s has an updated status", rsName)
[all …]
/dports/x11-toolkits/wxgtk30/wxWidgets-3.0.5.1/include/wx/os2/
H A Dcheckbox.h29 ,const wxString& rsName = wxCheckBoxNameStr
39 ,rsName
50 ,const wxString& rsName = wxCheckBoxNameStr
80 ,const wxString& rsName = wxCheckBoxNameStr
90 ,rsName
101 ,const wxString& rsName = wxCheckBoxNameStr
H A Dchoice.h35 ,const wxString& rsName = wxChoiceNameStr
46 ,rsName
57 ,const wxString& rsName = wxChoiceNameStr
67 ,rsName
79 ,const wxString& rsName = wxChoiceNameStr
89 ,const wxString& rsName = wxChoiceNameStr
H A Dcombobox.h36 ,const wxString& rsName = wxComboBoxNameStr
48 ,rsName
60 ,const wxString& rsName = wxComboBoxNameStr
71 ,rsName
84 ,const wxString& rsName = wxComboBoxNameStr
95 ,const wxString& rsName = wxComboBoxNameStr
H A Dlistbox.h47 ,const wxString& rsName = wxListBoxNameStr)
57 ,rsName
67 ,const wxString& rsName = wxListBoxNameStr)
76 ,rsName
88 ,const wxString& rsName = wxListBoxNameStr
97 ,const wxString& rsName = wxListBoxNameStr
H A Dframe.h30 ,const wxString& rsName = wxFrameNameStr
35 Create(pParent, vId, rsTitle, rPos, rSize, lStyle, rsName);
44 ,const wxString& rsName = wxFrameNameStr
70 ,const wxString& rsName = wxToolBarNameStr
75 ,const wxString& rsName
85 ,const wxString& rsName = wxStatusLineNameStr
H A Dradiobox.h32 ,const wxString& rsName = wxRadioBoxNameStr
45 ,rsName
58 ,const wxString& rsName = wxRadioBoxNameStr
70 ,rsName
86 ,const wxString& rsName = wxRadioBoxNameStr
98 ,const wxString& rsName = wxRadioBoxNameStr
/dports/x11-toolkits/py-wxPython40/wxPython-4.0.7/ext/wxWidgets/include/wx/os2/
H A Dcheckbox.h29 ,const wxString& rsName = wxCheckBoxNameStr
39 ,rsName
50 ,const wxString& rsName = wxCheckBoxNameStr
80 ,const wxString& rsName = wxCheckBoxNameStr
90 ,rsName
101 ,const wxString& rsName = wxCheckBoxNameStr
H A Dchoice.h35 ,const wxString& rsName = wxChoiceNameStr
46 ,rsName
57 ,const wxString& rsName = wxChoiceNameStr
67 ,rsName
79 ,const wxString& rsName = wxChoiceNameStr
89 ,const wxString& rsName = wxChoiceNameStr
H A Dcombobox.h36 ,const wxString& rsName = wxComboBoxNameStr
48 ,rsName
60 ,const wxString& rsName = wxComboBoxNameStr
71 ,rsName
84 ,const wxString& rsName = wxComboBoxNameStr
95 ,const wxString& rsName = wxComboBoxNameStr
H A Dlistbox.h47 ,const wxString& rsName = wxListBoxNameStr)
57 ,rsName
67 ,const wxString& rsName = wxListBoxNameStr)
76 ,rsName
88 ,const wxString& rsName = wxListBoxNameStr
97 ,const wxString& rsName = wxListBoxNameStr
H A Dframe.h30 ,const wxString& rsName = wxFrameNameStr
35 Create(pParent, vId, rsTitle, rPos, rSize, lStyle, rsName);
44 ,const wxString& rsName = wxFrameNameStr
70 ,const wxString& rsName = wxToolBarNameStr
75 ,const wxString& rsName
85 ,const wxString& rsName = wxStatusLineNameStr
H A Dradiobox.h32 ,const wxString& rsName = wxRadioBoxNameStr
45 ,rsName
58 ,const wxString& rsName = wxRadioBoxNameStr
70 ,rsName
86 ,const wxString& rsName = wxRadioBoxNameStr
98 ,const wxString& rsName = wxRadioBoxNameStr
/dports/databases/mongodb36/mongodb-src-r3.6.23/src/mongo/client/
H A Dremote_command_targeter_rs.cpp49 RemoteCommandTargeterRS::RemoteCommandTargeterRS(const std::string& rsName, in RemoteCommandTargeterRS() argument
51 : _rsName(rsName) { in RemoteCommandTargeterRS()
54 _rsMonitor = ReplicaSetMonitor::createIfNeeded(rsName, seedServers); in RemoteCommandTargeterRS()
58 rsName, std::vector<HostAndPort>(seedServers.begin(), seedServers.end())); in RemoteCommandTargeterRS()
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go77 rsName := d.Get("roleset").(string)
82 rs, err := getRoleSet(rsName, ctx, req.Storage)
87 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exist", rsName)), nil
91 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
125 rsName, ok := req.Secret.InternalData["role_set"]
136 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
138 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
143 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/
H A Dsecrets_service_account_key.go72 rsName := d.Get("roleset").(string)
76 rs, err := getRoleSet(rsName, ctx, req.Storage)
81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil
85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), …
119 rsName, ok := req.Secret.InternalData["role_set"]
130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage)
132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil
137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil

123456789