/dports/dns/knot3/knot-3.1.5/src/knot/modules/cookies/ |
H A D | cookies.c | 65 pthread_t update_secret; member 98 static void *update_secret(void *data) in update_secret() function 280 if (pthread_create(&ctx->update_secret, NULL, update_secret, (void *)mod)) { in cookies_load() 299 (void)pthread_cancel(ctx->update_secret); in cookies_unload() 300 (void)pthread_join(ctx->update_secret, NULL); in cookies_unload()
|
/dports/dns/knot3-lib/knot-3.1.5/src/knot/modules/cookies/ |
H A D | cookies.c | 65 pthread_t update_secret; member 98 static void *update_secret(void *data) in update_secret() function 280 if (pthread_create(&ctx->update_secret, NULL, update_secret, (void *)mod)) { in cookies_load() 299 (void)pthread_cancel(ctx->update_secret); in cookies_unload() 300 (void)pthread_join(ctx->update_secret, NULL); in cookies_unload()
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/amqp_client/src/ |
H A D | amqp_connection.erl | 67 -export([connection_name/1, update_secret/3]). 302 -spec update_secret(pid(), term(), binary()) -> 307 update_secret(ConnectionPid, NewSecret, Reason) -> function 310 amqp_gen_connection:update_secret(ConnectionPid, Update).
|
H A D | amqp_gen_connection.erl | 18 register_blocked_handler/2, update_secret/2]). 80 update_secret(Pid, Method) -> function 81 gen_server:call(Pid, {command, {update_secret, Method}}, amqp_util:call_timeout()). 273 handle_command({update_secret, #'connection.update_secret'{} = Method}, _From,
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/windows/ |
H A D | win_credential.ps1 | 32 update_secret = @{ type = "str"; default = "always"; choices = @("always", "on_create") } 52 $update_secret = $module.Params.update_secret variable 673 } elseif ($update_secret -eq "always") { variable
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/windows/plugins/modules/ |
H A D | win_credential.ps1 | 32 update_secret = @{ type = "str"; default = "always"; choices = @("always", "on_create") } 52 $update_secret = $module.Params.update_secret variable 673 } elseif ($update_secret -eq "always") { variable
|
/dports/devel/py-moto/moto-2.2.16/tests/test_secretsmanager/ |
H A D | test_secretsmanager.py | 959 updated_secret = conn.update_secret(SecretId=secret_id, SecretString="barsecret") 988 updated_secret = conn.update_secret( 1025 updated_secret = conn.update_secret( 1046 conn.update_secret(SecretId="test-secret", SecretString="barsecret") 1062 conn.update_secret(SecretId="test-secret", SecretString="barsecret") 1077 updated_secret = conn.update_secret( 1185 updated_secret = client.update_secret( 1191 updated_secret = client.update_secret( 1197 client.update_secret(
|
/dports/sysutils/ansible2/ansible-2.9.27/test/units/modules/network/f5/ |
H A D | test_bigip_device_auth.py | 77 update_secret="on_create", 107 update_secret="on_create",
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/f5networks/f5_modules/tests/unit/modules/network/f5/ |
H A D | test_bigip_device_auth.py | 60 update_secret="on_create", 103 update_secret="on_create",
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/amazon/ |
H A D | aws_secret.py | 221 def update_secret(self, secret): member in SecretsManagerInterface 226 response = self.client.update_secret(**secret.update_args) 375 result = secrets_mgr.update_secret(secret)
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/aws/plugins/modules/ |
H A D | aws_secret.py | 228 def update_secret(self, secret): member in SecretsManagerInterface 233 response = self.client.update_secret(**secret.update_args) 382 result = secrets_mgr.update_secret(secret)
|
/dports/devel/py-moto/moto-2.2.16/moto/secretsmanager/ |
H A D | responses.py | 57 def update_secret(self): member in SecretsManagerResponse 63 return secretsmanager_backends[self.region].update_secret(
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/doc/source/user/proxies/ |
H A D | key_manager.rst | 22 :members: create_secret, update_secret, delete_secret, get_secret,
|
/dports/devel/py-oci/oci-2.53.1/src/oci/vault/ |
H A D | vaults_client_composite_operations.py | 85 … operation_result = self.client.update_secret(secret_id, update_secret_details, **operation_kwargs)
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/key_manager/v1/ |
H A D | _proxy.py | 250 def update_secret(self, secret, **attrs): member in Proxy
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/f5networks/f5_modules/plugins/modules/ |
H A D | bigip_device_auth_radius_server.py | 278 if self.want.update_secret == 'always': 497 update_secret=dict(
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/tests/unit/key_manager/v1/ |
H A D | test_proxy.py | 91 self.verify_update(self.proxy.update_secret, secret.Secret)
|
/dports/net/py-python-barbicanclient/python-barbicanclient-5.2.0/functionaltests/cli/v1/behaviors/ |
H A D | secret_behaviors.py | 28 def update_secret(self, member in SecretBehaviors
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/kubernetes/ |
H A D | kube_client.rb | 207 update_secret(resource)
|
/dports/net/py-python-barbicanclient/python-barbicanclient-5.2.0/functionaltests/cli/v1/smoke/ |
H A D | test_secret.py | 93 self.secret_behaviors.update_secret(secret_href,
|
/dports/security/py-azure-keyvault-secrets/azure-keyvault-secrets-4.3.0/azure/keyvault/secrets/_generated/v7_2/operations/ |
H A D | _key_vault_client_operations.py | 160 def update_secret( member in KeyVaultClientOperationsMixin 198 url = self.update_secret.metadata['url'] # type: ignore 233 update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} # type: ignore
|
/dports/security/py-azure-keyvault-secrets/azure-keyvault-secrets-4.3.0/azure/keyvault/secrets/_generated/v7_2/aio/operations/ |
H A D | _key_vault_client_operations.py | 154 async def update_secret( member in KeyVaultClientOperationsMixin 191 url = self.update_secret.metadata['url'] # type: ignore 226 update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} # type: ignore
|
/dports/security/py-azure-keyvault-secrets/azure-keyvault-secrets-4.3.0/azure/keyvault/secrets/_generated/v7_1/aio/operations/ |
H A D | _key_vault_client_operations.py | 154 async def update_secret( member in KeyVaultClientOperationsMixin 191 url = self.update_secret.metadata['url'] # type: ignore 226 update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} # type: ignore
|
/dports/security/py-azure-keyvault-secrets/azure-keyvault-secrets-4.3.0/azure/keyvault/secrets/_generated/v7_1/operations/ |
H A D | _key_vault_client_operations.py | 160 def update_secret( member in KeyVaultClientOperationsMixin 198 url = self.update_secret.metadata['url'] # type: ignore 233 update_secret.metadata = {'url': '/secrets/{secret-name}/{secret-version}'} # type: ignore
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/network/f5/ |
H A D | bigip_device_auth.py | 372 if self.want.secret != self.have.secret and self.want.update_secret == 'always': 771 update_secret=dict(
|