/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/credential/aws/ |
H A D | path_config_client.go | 107 var result clientConfig 115 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 120 if clientConfig == nil { 126 "access_key": clientConfig.AccessKey, 127 "endpoint": clientConfig.Endpoint, 128 "iam_endpoint": clientConfig.IAMEndpoint, 129 "sts_endpoint": clientConfig.STSEndpoint, 130 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 131 "max_retries": clientConfig.MaxRetries, 167 configEntry = &clientConfig{} [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/credential/aws/ |
H A D | path_config_client.go | 99 var result clientConfig 107 clientConfig, err := b.lockedClientConfigEntry(ctx, req.Storage) 112 if clientConfig == nil { 118 "access_key": clientConfig.AccessKey, 119 "endpoint": clientConfig.Endpoint, 120 "iam_endpoint": clientConfig.IAMEndpoint, 121 "sts_endpoint": clientConfig.STSEndpoint, 122 "iam_server_id_header_value": clientConfig.IAMServerIdHeaderValue, 123 "max_retries": clientConfig.MaxRetries, 159 configEntry = &clientConfig{} [all …]
|
/dports/misc/perkeep/perkeep-0.11/pkg/server/ |
H A D | help.go | 65 clientConfig *clientconfig.Config // generated from serverConfig member 113 clientConfig, err := clientconfig.GenerateClientConfig(hh.serverConfig) 117 hh.clientConfig = clientConfig 119 hh.serverSecRing = clientConfig.IdentitySecretRing 120 clientConfig.IdentitySecretRing = "/home/you/.config/perkeep/identity-secring.gpg" 143 cc, err := fixServerInConfig(hh.clientConfig, req) 148 if clientConfig := req.FormValue("clientConfig"); clientConfig != "" { 149 if clientConfigOnly, err := strconv.ParseBool(clientConfig); err == nil && clientConfigOnly {
|
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/cli-runtime/pkg/genericclioptions/ |
H A D | client_config.go | 37 var _ = clientcmd.ClientConfig(&clientConfig{}) 39 type clientConfig struct { struct 43 func (c *clientConfig) RawConfig() (clientcmdapi.Config, error) { argument 52 func (c *clientConfig) ClientConfig() (*restclient.Config, error) { argument 61 func (c *clientConfig) Namespace() (string, bool, error) { argument 70 func (c *clientConfig) ConfigAccess() clientcmd.ConfigAccess { argument
|
/dports/sysutils/helm/helm-3.5.2/vendor/k8s.io/cli-runtime/pkg/genericclioptions/ |
H A D | client_config.go | 36 var _ = clientcmd.ClientConfig(&clientConfig{}) 38 type clientConfig struct { struct 42 func (c *clientConfig) RawConfig() (clientcmdapi.Config, error) { argument 51 func (c *clientConfig) ClientConfig() (*restclient.Config, error) { argument 60 func (c *clientConfig) Namespace() (string, bool, error) { argument 69 func (c *clientConfig) ConfigAccess() clientcmd.ConfigAccess { argument
|
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/controller-manager/pkg/clientbuilder/ |
H A D | client_builder_dynamic.go | 79 func NewDynamicClientBuilder(clientConfig *restclient.Config, coreClient v1core.CoreV1Interface, ns… 81 ClientConfig: clientConfig, 95 ClientConfig: clientConfig, 136 clientConfig, err := t.Config(name) 140 return clientConfig 144 clientConfig, err := t.Config(name) 148 return clientset.NewForConfig(clientConfig) 160 clientConfig, err := t.Config(name) 166 clientConfig.Burst = 200 167 clientConfig.QPS = 20 [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/golang.org/x/crypto/ssh/test/ |
H A D | session_test.go | 24 conn := server.Dial(clientConfig()) 42 conf := clientConfig() 63 conn := server.Dial(clientConfig()) 86 conn := server.Dial(clientConfig()) 110 conn := server.Dial(clientConfig()) 127 conn := server.Dial(clientConfig()) 179 conf := clientConfig() 290 conf := clientConfig() 311 conf := clientConfig() 330 conf := clientConfig() [all …]
|
/dports/www/grafana8/grafana-8.3.6/packages/grafana-toolkit/src/cli/utils/ |
H A D | githubClient.ts | 28 const clientConfig: AxiosRequestConfig = { constant 38 clientConfig.auth = { username: username, password: token }; 41 this.client = this.createClient(clientConfig); 44 private createClient(clientConfig: AxiosRequestConfig) { 45 return axios.create(clientConfig);
|
/dports/devel/raylib/raylib-3.7.0/examples/network/ |
H A D | network_ping_pong.c | 27 SocketConfig clientConfig = { .host = "127.0.0.1", .port = "4950", .type = SOCKET_TCP, .nonblocking… variable 39 if ((serverConfig.type == SOCKET_UDP) && (clientConfig.type == SOCKET_UDP)) in NetworkConnect() 87 if ((serverConfig.type == SOCKET_UDP) && (clientConfig.type == SOCKET_UDP)) in UpdateNetwork() 108 …if (serverConfig.type == SOCKET_UDP && clientConfig.type == SOCKET_UDP) SocketSend(clientResult->s… in UpdateNetwork() 114 …if (serverConfig.type == SOCKET_UDP && clientConfig.type == SOCKET_UDP) SocketSend(clientResult->s… in UpdateNetwork() 159 if (!SocketCreate(&clientConfig, clientResult)) in main() 165 if (!(clientConfig.type == SOCKET_UDP)) in main() 167 if (!SocketConnect(&clientConfig, clientResult)) in main()
|
/dports/misc/concourse/concourse-6.7.2/vendor/google.golang.org/grpc/xds/internal/balancer/ |
H A D | xds_client_wrapper.go | 134 clientConfig := bootstrapConfigNew() 135 if clientConfig.BalancerName == "" { 136 clientConfig.BalancerName = config.BalancerName 139 if c.balancerName == clientConfig.BalancerName { 143 if clientConfig.Creds == nil { 149 clientConfig.Creds = defaultDialCreds(clientConfig.BalancerName, c.bbo) 156 newClient, err := xdsclientNew(xdsclient.Options{Config: *clientConfig, DialOpts: dopts}) 165 return c.replaceXDSClient(newClient, clientConfig.BalancerName)
|
/dports/net-im/nextcloud-spreed-signaling/nextcloud-spreed-signaling-0.2.0/vendor/src/google.golang.org/grpc/xds/internal/balancer/ |
H A D | xds_client_wrapper.go | 134 clientConfig := bootstrapConfigNew() 135 if clientConfig.BalancerName == "" { 136 clientConfig.BalancerName = config.BalancerName 139 if c.balancerName == clientConfig.BalancerName { 143 if clientConfig.Creds == nil { 149 clientConfig.Creds = defaultDialCreds(clientConfig.BalancerName, c.bbo) 156 newClient, err := xdsclientNew(xdsclient.Options{Config: *clientConfig, DialOpts: dopts}) 165 return c.replaceXDSClient(newClient, clientConfig.BalancerName)
|
/dports/net/grpcui/grpcui-1.1.0/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/net-mgmt/bind_exporter/bind_exporter-0.4.0/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/net/goreplay/goreplay-1.2.0/vendor/golang.org/x/crypto/crypto-75b288015ac9/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/devel/gh/cli-2.4.0/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/databases/pg_tileserv/pg_tileserv-1.0.8/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/sysutils/cbsd-mq-api/cbsd-mq-api-0.3/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/sysutils/cbsd-mq-router/cbsd-mq-router-0.2/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/security/vault/vault-1.8.2/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|
/dports/deskutils/pet/pet-0.4.0/vendor/golang.org/x/crypto/ssh/ |
H A D | client_auth_test.go | 340 clientConfig := &ClientConfig{ 344 clientConfig.Auth = append(clientConfig.Auth, PublicKeys(certSigner)) 427 clientConfig := &ClientConfig{ 434 clientConfig.User = "permissions" 436 clientConfig.User = "nopermissions" 446 go NewClientConn(c2, "", clientConfig) 528 clientConfig := &ClientConfig{ 540 go NewClientConn(c2, "", clientConfig) 572 clientConfig := &ClientConfig{ 651 clientConfig := &ClientConfig{ [all …]
|