/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 61 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 64 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 121 if s.CAConfig.NodeCertExpiry != 0 { 122 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 124 if s.CAConfig.SigningCACert != "" { 125 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 127 if s.CAConfig.SigningCAKey != "" { 129 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 131 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 59 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 62 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 119 if s.CAConfig.NodeCertExpiry != 0 { 120 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 122 if s.CAConfig.SigningCACert != "" { 123 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 125 if s.CAConfig.SigningCAKey != "" { 127 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 129 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 59 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 62 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 119 if s.CAConfig.NodeCertExpiry != 0 { 120 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 122 if s.CAConfig.SigningCACert != "" { 123 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 125 if s.CAConfig.SigningCAKey != "" { 127 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 129 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 62 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 65 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 122 if s.CAConfig.NodeCertExpiry != 0 { 123 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 125 if s.CAConfig.SigningCACert != "" { 126 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 128 if s.CAConfig.SigningCAKey != "" { 130 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 132 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 59 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 62 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 119 if s.CAConfig.NodeCertExpiry != 0 { 120 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 122 if s.CAConfig.SigningCACert != "" { 123 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 125 if s.CAConfig.SigningCAKey != "" { 127 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 129 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/daemon/cluster/convert/ |
H A D | swarm.go | 32 CAConfig: types.CAConfig{ 61 swarm.Spec.CAConfig.NodeCertExpiry, _ = gogotypes.DurationFromProto(c.Spec.CAConfig.NodeCertExpiry) 64 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 121 if s.CAConfig.NodeCertExpiry != 0 { 122 spec.CAConfig.NodeCertExpiry = gogotypes.DurationProto(s.CAConfig.NodeCertExpiry) 124 if s.CAConfig.SigningCACert != "" { 125 spec.CAConfig.SigningCACert = []byte(s.CAConfig.SigningCACert) 127 if s.CAConfig.SigningCAKey != "" { 129 spec.CAConfig.SigningCAKey = []byte(s.CAConfig.SigningCAKey) 131 spec.CAConfig.ForceRotate = s.CAConfig.ForceRotate [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/docker/daemon/cluster/convert/ |
H A D | swarm.go | 43 swarm.Spec.CAConfig.NodeCertExpiry, _ = ptypes.Duration(c.Spec.CAConfig.NodeCertExpiry) 45 for _, ca := range c.Spec.CAConfig.ExternalCAs { 46 swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{ 103 if s.CAConfig.NodeCertExpiry != 0 { 104 spec.CAConfig.NodeCertExpiry = ptypes.DurationProto(s.CAConfig.NodeCertExpiry) 107 for _, ca := range s.CAConfig.ExternalCAs { 112 spec.CAConfig.ExternalCAs = append(spec.CAConfig.ExternalCAs, &swarmapi.ExternalCA{
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/cli/cli-20.10.2/cli/command/swarm/ |
H A D | ca_test.go | 40 CAConfig: swarm.CAConfig{ 194 expected.CAConfig.ForceRotate = 2 195 expected.CAConfig.SigningCACert = "" 196 expected.CAConfig.SigningCAKey = "" 225 expected.CAConfig.SigningCACert = cert 226 expected.CAConfig.SigningCAKey = key 227 expected.CAConfig.NodeCertExpiry = 3 * time.Minute 251 expected.CAConfig.SigningCACert = cert 252 expected.CAConfig.SigningCAKey = "" 289 expected.CAConfig.SigningCACert = cert [all …]
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/cli/cli/command/swarm/ |
H A D | ca_test.go | 40 CAConfig: swarm.CAConfig{ 194 expected.CAConfig.ForceRotate = 2 195 expected.CAConfig.SigningCACert = "" 196 expected.CAConfig.SigningCAKey = "" 225 expected.CAConfig.SigningCACert = cert 226 expected.CAConfig.SigningCAKey = key 227 expected.CAConfig.NodeCertExpiry = 3 * time.Minute 251 expected.CAConfig.SigningCACert = cert 252 expected.CAConfig.SigningCAKey = "" 289 expected.CAConfig.SigningCACert = cert [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/cli/cli/command/swarm/ |
H A D | ca_test.go | 40 CAConfig: swarm.CAConfig{ 194 expected.CAConfig.ForceRotate = 2 195 expected.CAConfig.SigningCACert = "" 196 expected.CAConfig.SigningCAKey = "" 225 expected.CAConfig.SigningCACert = cert 226 expected.CAConfig.SigningCAKey = key 227 expected.CAConfig.NodeCertExpiry = 3 * time.Minute 251 expected.CAConfig.SigningCACert = cert 252 expected.CAConfig.SigningCAKey = "" 289 expected.CAConfig.SigningCACert = cert [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/cmd/swarmctl/cluster/ |
H A D | inspect.go | 32 if cluster.Spec.CAConfig.NodeCertExpiry != nil { 33 clusterDuration, err := ptypes.Duration(cluster.Spec.CAConfig.NodeCertExpiry) 40 if len(cluster.Spec.CAConfig.ExternalCAs) > 0 { 42 for _, ca := range cluster.Spec.CAConfig.ExternalCAs {
|
/dports/databases/prometheus-postgresql-adapter/prometheus-postgresql-adapter-0.6.0/vendor/github.com/prometheus/prometheus/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 140 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 153 var out CAConfig 161 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/grafana/loki/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 154 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 167 var out CAConfig 175 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/cortexproject/cortex/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 154 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 167 var out CAConfig 175 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 147 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 160 var out CAConfig 168 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/sysutils/consul/consul-1.10.3/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 154 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 167 var out CAConfig 175 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 140 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 153 var out CAConfig 161 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 140 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 153 var out CAConfig 161 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 140 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 153 var out CAConfig 161 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/api/ |
H A D | connect_ca.go | 11 type CAConfig struct { struct 147 func (h *Connect) CAGetConfig(q *QueryOptions) (*CAConfig, *QueryMeta, error) { 160 var out CAConfig 168 func (h *Connect) CASetConfig(conf *CAConfig, q *WriteOptions) (*WriteMeta, error) { argument
|