/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | path_role_set_secrets_test.go | 14 rsName := "test-gentoken" 15 testGetRoleSetAccessToken(t, rsName, fmt.Sprintf("roleset/%s/token", rsName)) 19 rsName := "test-genkey" 20 testGetRoleSetKey(t, rsName, fmt.Sprintf("roleset/%s/key", rsName)) 25 rsName := "test-gentoken" 26 testGetRoleSetAccessToken(t, rsName, fmt.Sprintf("token/%s", rsName)) 31 rsName := "test-genkey" 32 testGetRoleSetKey(t, rsName, fmt.Sprintf("key/%s", rsName)) 134 rsName := "test-genkey" 197 rsName := "test-genkey" [all …]
|
H A D | path_role_set_test.go | 21 rsName := "test-basicrs" 43 testRoleSetCreate(t, td, rsName, 72 rsName := "test-updatekeyrs" 93 testRoleSetCreate(t, td, rsName, 143 testRoleSetUpdate(t, td, rsName, 176 rsName := "test-rotatekeyrs" 193 testRoleSetCreate(t, td, rsName, 209 testRoleSetRotate(t, td, rsName) 249 testRoleSetCreate(t, td, rsName, 318 rsName := "test-updatetokenrs" [all …]
|
H A D | path_role_set_secrets.go | 103 rsName := d.Get("roleset").(string) 108 rs, err := getRoleSet(rsName, ctx, req.Storage) 113 return logical.ErrorResponse("role set %q does not exists", rsName), nil 117 …"role set %q cannot generate service account keys (has secret type %s)", rsName, rs.SecretType), n… 134 rsName := d.Get("roleset").(string) 136 rs, err := getRoleSet(rsName, ctx, req.Storage) 141 return logical.ErrorResponse("role set '%s' does not exists", rsName), nil 145 …onse("role set '%s' cannot generate access tokens (has secret type %s)", rsName, rs.SecretType), n…
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/upgrades/apps/ |
H A D | replicasets.go | 35 rsName = "rs" const 56 ginkgo.By(fmt.Sprintf("Creating replicaset %s in namespace %s", rsName, ns)) 61 ginkgo.By(fmt.Sprintf("Waiting for replicaset %s to have all of its replicas ready", rsName)) 62 framework.ExpectNoError(e2ereplicaset.WaitForReadyReplicaSet(c, ns, rsName)) 74 ginkgo.By(fmt.Sprintf("Waiting for upgrade to finish before checking replicaset %s", rsName)) 78 ginkgo.By(fmt.Sprintf("Checking UID to verify replicaset %s survives upgrade", rsName)) 79 upgradedRS, err := rsClient.Get(context.TODO(), rsName, metav1.GetOptions{}) 86 framework.ExpectNoError(e2ereplicaset.WaitForReadyReplicaSet(c, ns, rsName)) 89 ginkgo.By(fmt.Sprintf("Scaling up replicaset %s to %d", rsName, scaleNum)) 90 _, err = e2ereplicaset.UpdateReplicaSetWithRetries(c, ns, rsName, func(rs *appsv1.ReplicaSet) { [all …]
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/apps/ |
H A D | replica_set.go | 61 Name: rsName, 414 rsName := "test-rs" 480 rsName := "test-rs" 505 ginkgo.By(fmt.Sprintf("Scaling up %q replicaset ", rsName)) 524 "name": rsName, 539 found := rset.ObjectMeta.Name == rsName && 565 rsName := "test-rs" 584 r, err := rsClient.Get(context.TODO(), rsName, metav1.GetOptions{}) 615 rsName := "test-rs" 696 framework.Logf("Replicaset %s has an updated status", rsName) [all …]
|
/dports/x11-toolkits/wxgtk30/wxWidgets-3.0.5.1/include/wx/os2/ |
H A D | checkbox.h | 29 ,const wxString& rsName = wxCheckBoxNameStr 39 ,rsName 50 ,const wxString& rsName = wxCheckBoxNameStr 80 ,const wxString& rsName = wxCheckBoxNameStr 90 ,rsName 101 ,const wxString& rsName = wxCheckBoxNameStr
|
H A D | choice.h | 35 ,const wxString& rsName = wxChoiceNameStr 46 ,rsName 57 ,const wxString& rsName = wxChoiceNameStr 67 ,rsName 79 ,const wxString& rsName = wxChoiceNameStr 89 ,const wxString& rsName = wxChoiceNameStr
|
H A D | combobox.h | 36 ,const wxString& rsName = wxComboBoxNameStr 48 ,rsName 60 ,const wxString& rsName = wxComboBoxNameStr 71 ,rsName 84 ,const wxString& rsName = wxComboBoxNameStr 95 ,const wxString& rsName = wxComboBoxNameStr
|
H A D | listbox.h | 47 ,const wxString& rsName = wxListBoxNameStr) 57 ,rsName 67 ,const wxString& rsName = wxListBoxNameStr) 76 ,rsName 88 ,const wxString& rsName = wxListBoxNameStr 97 ,const wxString& rsName = wxListBoxNameStr
|
H A D | frame.h | 30 ,const wxString& rsName = wxFrameNameStr 35 Create(pParent, vId, rsTitle, rPos, rSize, lStyle, rsName); 44 ,const wxString& rsName = wxFrameNameStr 70 ,const wxString& rsName = wxToolBarNameStr 75 ,const wxString& rsName 85 ,const wxString& rsName = wxStatusLineNameStr
|
H A D | radiobox.h | 32 ,const wxString& rsName = wxRadioBoxNameStr 45 ,rsName 58 ,const wxString& rsName = wxRadioBoxNameStr 70 ,rsName 86 ,const wxString& rsName = wxRadioBoxNameStr 98 ,const wxString& rsName = wxRadioBoxNameStr
|
/dports/x11-toolkits/py-wxPython40/wxPython-4.0.7/ext/wxWidgets/include/wx/os2/ |
H A D | checkbox.h | 29 ,const wxString& rsName = wxCheckBoxNameStr 39 ,rsName 50 ,const wxString& rsName = wxCheckBoxNameStr 80 ,const wxString& rsName = wxCheckBoxNameStr 90 ,rsName 101 ,const wxString& rsName = wxCheckBoxNameStr
|
H A D | choice.h | 35 ,const wxString& rsName = wxChoiceNameStr 46 ,rsName 57 ,const wxString& rsName = wxChoiceNameStr 67 ,rsName 79 ,const wxString& rsName = wxChoiceNameStr 89 ,const wxString& rsName = wxChoiceNameStr
|
H A D | combobox.h | 36 ,const wxString& rsName = wxComboBoxNameStr 48 ,rsName 60 ,const wxString& rsName = wxComboBoxNameStr 71 ,rsName 84 ,const wxString& rsName = wxComboBoxNameStr 95 ,const wxString& rsName = wxComboBoxNameStr
|
H A D | listbox.h | 47 ,const wxString& rsName = wxListBoxNameStr) 57 ,rsName 67 ,const wxString& rsName = wxListBoxNameStr) 76 ,rsName 88 ,const wxString& rsName = wxListBoxNameStr 97 ,const wxString& rsName = wxListBoxNameStr
|
H A D | frame.h | 30 ,const wxString& rsName = wxFrameNameStr 35 Create(pParent, vId, rsTitle, rPos, rSize, lStyle, rsName); 44 ,const wxString& rsName = wxFrameNameStr 70 ,const wxString& rsName = wxToolBarNameStr 75 ,const wxString& rsName 85 ,const wxString& rsName = wxStatusLineNameStr
|
H A D | radiobox.h | 32 ,const wxString& rsName = wxRadioBoxNameStr 45 ,rsName 58 ,const wxString& rsName = wxRadioBoxNameStr 70 ,rsName 86 ,const wxString& rsName = wxRadioBoxNameStr 98 ,const wxString& rsName = wxRadioBoxNameStr
|
/dports/databases/mongodb36/mongodb-src-r3.6.23/src/mongo/client/ |
H A D | remote_command_targeter_rs.cpp | 49 RemoteCommandTargeterRS::RemoteCommandTargeterRS(const std::string& rsName, in RemoteCommandTargeterRS() argument 51 : _rsName(rsName) { in RemoteCommandTargeterRS() 54 _rsMonitor = ReplicaSetMonitor::createIfNeeded(rsName, seedServers); in RemoteCommandTargeterRS() 58 rsName, std::vector<HostAndPort>(seedServers.begin(), seedServers.end())); in RemoteCommandTargeterRS()
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 77 rsName := d.Get("roleset").(string) 82 rs, err := getRoleSet(rsName, ctx, req.Storage) 87 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exist", rsName)), nil 91 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 125 rsName, ok := req.Secret.InternalData["role_set"] 136 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 138 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 143 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | secrets_service_account_key.go | 72 rsName := d.Get("roleset").(string) 76 rs, err := getRoleSet(rsName, ctx, req.Storage) 81 return logical.ErrorResponse(fmt.Sprintf("role set '%s' does not exists", rsName)), nil 85 …ole set '%s' cannot generate service account keys (has secret type %s)", rsName, rs.SecretType)), … 119 rsName, ok := req.Secret.InternalData["role_set"] 130 rs, err := getRoleSet(rsName.(string), ctx, req.Storage) 132 return logical.ErrorResponse(fmt.Sprintf("could not find role set '%v' for secret", rsName)), nil 137 …rintf("role set '%v' bindings were updated since secret was generated, cannot renew", rsName)), nil
|