Home
last modified time | relevance | path

Searched refs:VersionTemplate (Results 1 – 25 of 221) sorted by relevance

123456789

/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/sysutils/gomplate/vault-sdk-v0.1.13/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/sysutils/istio/vault-sdk-v0.1.12/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/helper/keysutil/
H A Dencrypted_key_storage_test.go22 VersionTemplate: EncryptedKeyPolicyVersionTpl,
39 VersionTemplate: EncryptedKeyPolicyVersionTpl,
56 VersionTemplate: EncryptedKeyPolicyVersionTpl,
75 VersionTemplate: EncryptedKeyPolicyVersionTpl,
157 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/sysutils/helmfile/vault-f6547fa8e820/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go23 VersionTemplate: EncryptedKeyPolicyVersionTpl,
40 VersionTemplate: EncryptedKeyPolicyVersionTpl,
57 VersionTemplate: EncryptedKeyPolicyVersionTpl,
76 VersionTemplate: EncryptedKeyPolicyVersionTpl,
158 VersionTemplate: EncryptedKeyPolicyVersionTpl,
248 VersionTemplate: EncryptedKeyPolicyVersionTpl,
294 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/misc/concourse/vault-bdd38fca2cff/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go23 VersionTemplate: EncryptedKeyPolicyVersionTpl,
40 VersionTemplate: EncryptedKeyPolicyVersionTpl,
57 VersionTemplate: EncryptedKeyPolicyVersionTpl,
76 VersionTemplate: EncryptedKeyPolicyVersionTpl,
158 VersionTemplate: EncryptedKeyPolicyVersionTpl,
248 VersionTemplate: EncryptedKeyPolicyVersionTpl,
294 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go23 VersionTemplate: EncryptedKeyPolicyVersionTpl,
40 VersionTemplate: EncryptedKeyPolicyVersionTpl,
57 VersionTemplate: EncryptedKeyPolicyVersionTpl,
76 VersionTemplate: EncryptedKeyPolicyVersionTpl,
158 VersionTemplate: EncryptedKeyPolicyVersionTpl,
248 VersionTemplate: EncryptedKeyPolicyVersionTpl,
294 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/security/vault/vault-1.8.2/sdk/helper/keysutil/
H A Dencrypted_key_storage_test.go23 VersionTemplate: EncryptedKeyPolicyVersionTpl,
40 VersionTemplate: EncryptedKeyPolicyVersionTpl,
57 VersionTemplate: EncryptedKeyPolicyVersionTpl,
76 VersionTemplate: EncryptedKeyPolicyVersionTpl,
158 VersionTemplate: EncryptedKeyPolicyVersionTpl,
247 VersionTemplate: EncryptedKeyPolicyVersionTpl,
293 VersionTemplate: EncryptedKeyPolicyVersionTpl,
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go230 if vt := cryptoKey.VersionTemplate; vt != nil {
272 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
298 ck.VersionTemplate.Algorithm = algorithm
301 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
318 ck.VersionTemplate.ProtectionLevel = protectionLevel
320 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcpkms/
H A Dpath_keys.go229 if vt := cryptoKey.VersionTemplate; vt != nil {
271 VersionTemplate: new(kmspb.CryptoKeyVersionTemplate),
297 ck.VersionTemplate.Algorithm = algorithm
300 ck.VersionTemplate.Algorithm = kmspb.CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION
317 ck.VersionTemplate.ProtectionLevel = protectionLevel
319 ck.VersionTemplate.ProtectionLevel = kmspb.ProtectionLevel_SOFTWARE
/dports/textproc/textnote/textnote-1.3.0/cmd/
H A Droot.go49 fmt.Sprintf("%s: built from source", strings.TrimSuffix(cmd.VersionTemplate(), "\n")),
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/helper/keysutil/
H A Dpolicy.go241 VersionTemplate string member
261 VersionTemplate: config.VersionTemplate,
352 VersionTemplate string `json:"version_template"` member
1434 template := p.VersionTemplate
1454 template := p.VersionTemplate
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/github.com/hashicorp/vault/helper/keysutil/
H A Dpolicy.go241 VersionTemplate string member
261 VersionTemplate: config.VersionTemplate,
352 VersionTemplate string `json:"version_template"` member
1434 template := p.VersionTemplate
1454 template := p.VersionTemplate
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/helper/keysutil/
H A Dpolicy.go241 VersionTemplate string member
261 VersionTemplate: config.VersionTemplate,
352 VersionTemplate string `json:"version_template"` member
1434 template := p.VersionTemplate
1454 template := p.VersionTemplate

123456789