Home
last modified time | relevance | path

Searched refs:PolicySubset (Results 1 – 7 of 7) sorted by relevance

/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/structs/
H A Dstructs_test.go4276 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"}))
4277 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"}))
4278 assert.Equal(t, true, tk.PolicySubset([]string{"foo"}))
4279 assert.Equal(t, true, tk.PolicySubset([]string{}))
4281 assert.Equal(t, false, tk.PolicySubset([]string{"new"}))
4287 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"}))
4288 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"}))
4289 assert.Equal(t, true, tk.PolicySubset([]string{"foo"}))
4290 assert.Equal(t, true, tk.PolicySubset([]string{}))
4291 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "new"}))
[all …]
H A Dstructs.go9307 func (a *ACLToken) PolicySubset(policies []string) bool { func
/dports/sysutils/nomad/nomad-1.1.0/nomad/structs/
H A Dstructs_test.go5243 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"}))
5244 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"}))
5245 assert.Equal(t, true, tk.PolicySubset([]string{"foo"}))
5246 assert.Equal(t, true, tk.PolicySubset([]string{}))
5248 assert.Equal(t, false, tk.PolicySubset([]string{"new"}))
5254 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "baz"}))
5255 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar"}))
5256 assert.Equal(t, true, tk.PolicySubset([]string{"foo"}))
5257 assert.Equal(t, true, tk.PolicySubset([]string{}))
5258 assert.Equal(t, true, tk.PolicySubset([]string{"foo", "bar", "new"}))
[all …]
H A Dstructs.go11114 func (a *ACLToken) PolicySubset(policies []string) bool { func
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/nomad/nomad/
H A Dacl_endpoint.go313 if token.Type != structs.ACLManagementToken && !token.PolicySubset(args.Names) {
/dports/sysutils/nomad/nomad-1.1.0/nomad/
H A Dacl_endpoint.go313 if token.Type != structs.ACLManagementToken && !token.PolicySubset(args.Names) {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/nomad/nomad/structs/
H A Dstructs.go8185 func (a *ACLToken) PolicySubset(policies []string) bool { func