Searched refs:PolicySubset (Results 1 – 7 of 7) sorted by relevance
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/structs/ |
H A D | structs_test.go | 4276 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"})) 4277 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"})) 4278 assert.Equal(t, true, tk.PolicySubset([]string{"foo"})) 4279 assert.Equal(t, true, tk.PolicySubset([]string{})) 4281 assert.Equal(t, false, tk.PolicySubset([]string{"new"})) 4287 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"})) 4288 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"})) 4289 assert.Equal(t, true, tk.PolicySubset([]string{"foo"})) 4290 assert.Equal(t, true, tk.PolicySubset([]string{})) 4291 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "new"})) [all …]
|
H A D | structs.go | 9307 func (a *ACLToken) PolicySubset(policies []string) bool { func
|
/dports/sysutils/nomad/nomad-1.1.0/nomad/structs/ |
H A D | structs_test.go | 5243 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"})) 5244 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"})) 5245 assert.Equal(t, true, tk.PolicySubset([]string{"foo"})) 5246 assert.Equal(t, true, tk.PolicySubset([]string{})) 5248 assert.Equal(t, false, tk.PolicySubset([]string{"new"})) 5254 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"})) 5255 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"})) 5256 assert.Equal(t, true, tk.PolicySubset([]string{"foo"})) 5257 assert.Equal(t, true, tk.PolicySubset([]string{})) 5258 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "new"})) [all …]
|
H A D | structs.go | 11114 func (a *ACLToken) PolicySubset(policies []string) bool { func
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/ |
H A D | acl_endpoint.go | 313 if token.Type != structs.ACLManagementToken && !token.PolicySubset(args.Names) {
|
/dports/sysutils/nomad/nomad-1.1.0/nomad/ |
H A D | acl_endpoint.go | 313 if token.Type != structs.ACLManagementToken && !token.PolicySubset(args.Names) {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/nomad/nomad/structs/ |
H A D | structs.go | 8185 func (a *ACLToken) PolicySubset(policies []string) bool { func
|