Home
last modified time | relevance | path

Searched refs:authz (Results 1 – 25 of 2507) sorted by relevance

12345678910>>...101

/dports/sysutils/consul/consul-1.10.3/acl/
H A Dchained_authorizer_test.go12 return EnforcementDecision(authz)
15 return EnforcementDecision(authz)
18 return EnforcementDecision(authz)
21 return EnforcementDecision(authz)
24 return EnforcementDecision(authz)
27 return EnforcementDecision(authz)
30 return EnforcementDecision(authz)
33 return EnforcementDecision(authz)
36 return EnforcementDecision(authz)
39 return EnforcementDecision(authz)
[all …]
H A Dstatic_authorizer_test.go9 authz := AllowAll()
10 checkDenyACLRead(t, authz, "foo", nil)
11 checkDenyACLWrite(t, authz, "foo", nil)
12 checkAllowAgentRead(t, authz, "foo", nil)
13 checkAllowAgentWrite(t, authz, "foo", nil)
14 checkAllowEventRead(t, authz, "foo", nil)
19 checkAllowKeyRead(t, authz, "foo", nil)
20 checkAllowKeyList(t, authz, "foo", nil)
39 authz := DenyAll()
40 checkDenyACLRead(t, authz, "foo", nil)
[all …]
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
157 return authz.NodeReadAll(entCtx)
173 return authz.OperatorRead(entCtx)
[all …]
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/acl/
H A Dchained_authorizer_test.go12 return EnforcementDecision(authz)
15 return EnforcementDecision(authz)
18 return EnforcementDecision(authz)
21 return EnforcementDecision(authz)
24 return EnforcementDecision(authz)
27 return EnforcementDecision(authz)
30 return EnforcementDecision(authz)
33 return EnforcementDecision(authz)
36 return EnforcementDecision(authz)
39 return EnforcementDecision(authz)
[all …]
H A Dstatic_authorizer_test.go9 authz := AllowAll()
10 checkDenyACLRead(t, authz, "foo", nil)
11 checkDenyACLWrite(t, authz, "foo", nil)
12 checkAllowAgentRead(t, authz, "foo", nil)
13 checkAllowAgentWrite(t, authz, "foo", nil)
14 checkAllowEventRead(t, authz, "foo", nil)
19 checkAllowKeyRead(t, authz, "foo", nil)
20 checkAllowKeyList(t, authz, "foo", nil)
39 authz := DenyAll()
40 checkDenyACLRead(t, authz, "foo", nil)
[all …]
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
157 return authz.NodeReadAll(entCtx)
173 return authz.OperatorRead(entCtx)
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/acl/
H A Dchained_authorizer_test.go12 return EnforcementDecision(authz)
15 return EnforcementDecision(authz)
18 return EnforcementDecision(authz)
21 return EnforcementDecision(authz)
24 return EnforcementDecision(authz)
27 return EnforcementDecision(authz)
30 return EnforcementDecision(authz)
33 return EnforcementDecision(authz)
36 return EnforcementDecision(authz)
39 return EnforcementDecision(authz)
[all …]
H A Dstatic_authorizer_test.go9 authz := AllowAll()
10 checkDenyACLRead(t, authz, "foo", nil)
11 checkDenyACLWrite(t, authz, "foo", nil)
12 checkAllowAgentRead(t, authz, "foo", nil)
13 checkAllowAgentWrite(t, authz, "foo", nil)
14 checkAllowEventRead(t, authz, "foo", nil)
19 checkAllowKeyRead(t, authz, "foo", nil)
20 checkAllowKeyList(t, authz, "foo", nil)
39 authz := DenyAll()
40 checkDenyACLRead(t, authz, "foo", nil)
[all …]
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
157 return authz.NodeReadAll(entCtx)
173 return authz.OperatorRead(entCtx)
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/acl/
H A Dchained_authorizer_test.go10 return EnforcementDecision(authz)
13 return EnforcementDecision(authz)
16 return EnforcementDecision(authz)
19 return EnforcementDecision(authz)
22 return EnforcementDecision(authz)
25 return EnforcementDecision(authz)
28 return EnforcementDecision(authz)
31 return EnforcementDecision(authz)
34 return EnforcementDecision(authz)
37 return EnforcementDecision(authz)
[all …]
H A Dstatic_authorizer_test.go13 authz := AllowAll()
14 checkDenyACLRead(t, authz, "foo", nil)
15 checkDenyACLWrite(t, authz, "foo", nil)
16 checkAllowAgentRead(t, authz, "foo", nil)
17 checkAllowAgentWrite(t, authz, "foo", nil)
18 checkAllowEventRead(t, authz, "foo", nil)
23 checkAllowKeyRead(t, authz, "foo", nil)
24 checkAllowKeyList(t, authz, "foo", nil)
44 authz := DenyAll()
45 checkDenyACLRead(t, authz, "foo", nil)
[all …]
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
120 return authz.KeyWrite(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
167 return authz.OperatorRead(entCtx)
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/acl/
H A Dchained_authorizer_test.go10 return EnforcementDecision(authz)
13 return EnforcementDecision(authz)
16 return EnforcementDecision(authz)
19 return EnforcementDecision(authz)
22 return EnforcementDecision(authz)
25 return EnforcementDecision(authz)
28 return EnforcementDecision(authz)
31 return EnforcementDecision(authz)
34 return EnforcementDecision(authz)
37 return EnforcementDecision(authz)
[all …]
H A Dstatic_authorizer_test.go13 authz := AllowAll()
14 checkDenyACLRead(t, authz, "foo", nil)
15 checkDenyACLWrite(t, authz, "foo", nil)
16 checkAllowAgentRead(t, authz, "foo", nil)
17 checkAllowAgentWrite(t, authz, "foo", nil)
18 checkAllowEventRead(t, authz, "foo", nil)
23 checkAllowKeyRead(t, authz, "foo", nil)
24 checkAllowKeyList(t, authz, "foo", nil)
44 authz := DenyAll()
45 checkDenyACLRead(t, authz, "foo", nil)
[all …]
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
120 return authz.KeyWrite(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
167 return authz.OperatorRead(entCtx)
[all …]
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/acl/
H A Dchained_authorizer.go27 for _, authz := range c.chain {
28 decision := enforce(authz)
39 return authz.ACLRead(entCtx)
46 return authz.ACLWrite(entCtx)
54 return authz.AgentRead(node, entCtx)
113 return authz.KeyRead(key, entCtx)
137 return authz.KeyringRead(entCtx)
144 return authz.KeyringWrite(entCtx)
157 return authz.NodeReadAll(entCtx)
173 return authz.OperatorRead(entCtx)
[all …]
/dports/www/gitea/gitea-1.16.5/vendor/github.com/mholt/acmez/acme/
H A Dauthorization.go75 if authz.Wildcard {
89 authz.Challenges[i].Identifier = authz.Identifier
116 return authz, err
123 return authz, err
126 return authz, nil
150 return authz, err
157 return authz, err
160 return authz, nil
180 return authz, err
197 return authz, err
[all …]
/dports/net-mgmt/nagiosgraph/nagiosgraph-1.5.2/t/
H A D05permissions.t143 undef %authz;
153 undef %authz;
163 undef %authz;
173 undef %authz;
187 undef %authz;
204 ok(Dumper(\%authz), "\$VAR1 = {
212 ok(Dumper(\%authz), "\$VAR1 = {
226 ok(Dumper(\%authz), "\$VAR1 = {
244 ok(Dumper(\%authz), "\$VAR1 = {
256 ok(Dumper(\%authz), "\$VAR1 = {
[all …]
/dports/www/gitea/gitea-1.16.5/vendor/github.com/mholt/acmez/
H A Dclient.go306 if err := authz.currentSolver.CleanUp(ctx, authz.currentChallenge); err != nil {
324 if authz.Status != acme.StatusPending && authz.Status != acme.StatusValid {
344 if authz.Status != acme.StatusPending && authz.Status != acme.StatusValid {
400 err = authz.currentSolver.Present(ctx, authz.currentChallenge)
427authz.currentChallenge, err = c.Client.InitiateChallenge(ctx, authz.account, authz.currentChalleng…
455 authz.currentSolver = c.ChallengeSolvers[authz.currentChallenge.Type]
457authz.remainingChallenges = append(authz.remainingChallenges[:i], authz.remainingChallenges[i+1:].…
467authz.IdentifierValue(), c.enabledChallengeTypes(), authz.listOfferedChallenges(), authz.listRemai…
497 cleanupErr := authz.currentSolver.CleanUp(ctx, authz.currentChallenge)
610 authz.remainingChallenges = append(authz.remainingChallenges, chal)
[all …]
/dports/www/p5-CGI-Application-Plugin-Authorization/CGI-Application-Plugin-Authorization-0.07/t/
H A D02_config.t27 lives_ok { $cgiapp->authz->config(%config) } 'All config parameters accepted';
28 isa_ok($cgiapp->authz->drivers,'CGI::Application::Plugin::Authorization::Driver::Generic');
35 lives_ok { TestAppConfig->new->authz->config(%config) } 'All config parameters accepted';
39 lives_ok { TestAppConfig->new->authz->config(DRIVER => 'MODULE' ) } 'config accepts single DRIVER …
49 lives_ok { TestAppConfig->new->authz->config(FORBIDDEN_URL => '/' ) } 'config accepts FORBIDDEN_UR…
59 lives_ok { TestAppConfig->authz->config(%config) } 'config can be called as a class method';
62 lives_ok { TestAppConfig->authz->config(\%config) } 'config can be called with a hashref or hash';
65 lives_ok { TestAppConfig->authz->config() } 'current configuration returned';
72 my $authz = $app->authz;
73 $authz->config( \%config );
[all …]
H A D01_basic.t45 sub { TestAppBasicNOTCA->new->authz },
53 my $authz = TestAppBasic->authz;
56 my $authz2 = TestAppBasic->authz;
60 my $authz3 = TestAppBasic->authz('named');
64 my $authz4 = TestAppBasic->authz('named');
72 my $authz = $t1_obj->authz;
73 my $authz_again = $t1_obj->authz;
74 my $authz_named = $t1_obj->authz('named');
76 isa_ok($authz, 'CGI::Application::Plugin::Authorization');
83 my $authz2 = $t2_obj->authz;
[all …]
/dports/www/apache24/httpd-2.4.53/modules/md/
H A Dmd_acme_authz.c44 md_acme_authz_t *authz; in md_acme_authz_create() local
45 authz = apr_pcalloc(p, sizeof(*authz)); in md_acme_authz_create()
47 return authz; in md_acme_authz_create()
76 ctx->authz = authz; in authz_req_ctx_init()
88 authz = apr_pcalloc(p, sizeof(*authz)); in md_acme_authz_retrieve()
124 assert(authz); in md_acme_authz_update()
125 assert(authz->url); in md_acme_authz_update()
129 authz->error_type = authz->error_detail = NULL; in md_acme_authz_update()
151 ctx.authz = authz; in md_acme_authz_update()
222 (void)authz; in setup_key_authz()
[all …]
/dports/security/lego/lego-4.5.3/challenge/resolver/
H A Dprober.go34 authz acme.Authorization member
58 for _, authz := range authorizations {
59 domain := challenge.GetTargetedDomain(authz)
60 if authz.Status == acme.StatusValid {
67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr}
102 err := solvr.PreSolve(authSolver.authz)
133 authz := authSolver.authz
135 err := solvr.PreSolve(authz)
151 authz := authSolver.authz
158 err := authSolver.solver.Solve(authz)
[all …]
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/go-acme/lego/v3/challenge/resolver/
H A Dprober.go34 authz acme.Authorization member
58 for _, authz := range authorizations {
59 domain := challenge.GetTargetedDomain(authz)
60 if authz.Status == acme.StatusValid {
67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr}
102 err := solvr.PreSolve(authSolver.authz)
133 authz := authSolver.authz
135 err := solvr.PreSolve(authz)
151 authz := authSolver.authz
158 err := authSolver.solver.Solve(authz)
[all …]
/dports/net/traefik/traefik-2.6.1/vendor/github.com/go-acme/lego/v4/challenge/resolver/
H A Dprober.go34 authz acme.Authorization member
58 for _, authz := range authorizations {
59 domain := challenge.GetTargetedDomain(authz)
60 if authz.Status == acme.StatusValid {
67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr}
102 err := solvr.PreSolve(authSolver.authz)
133 authz := authSolver.authz
135 err := solvr.PreSolve(authz)
151 authz := authSolver.authz
158 err := authSolver.solver.Solve(authz)
[all …]

12345678910>>...101