/dports/sysutils/consul/consul-1.10.3/acl/ |
H A D | chained_authorizer_test.go | 12 return EnforcementDecision(authz) 15 return EnforcementDecision(authz) 18 return EnforcementDecision(authz) 21 return EnforcementDecision(authz) 24 return EnforcementDecision(authz) 27 return EnforcementDecision(authz) 30 return EnforcementDecision(authz) 33 return EnforcementDecision(authz) 36 return EnforcementDecision(authz) 39 return EnforcementDecision(authz) [all …]
|
H A D | static_authorizer_test.go | 9 authz := AllowAll() 10 checkDenyACLRead(t, authz, "foo", nil) 11 checkDenyACLWrite(t, authz, "foo", nil) 12 checkAllowAgentRead(t, authz, "foo", nil) 13 checkAllowAgentWrite(t, authz, "foo", nil) 14 checkAllowEventRead(t, authz, "foo", nil) 19 checkAllowKeyRead(t, authz, "foo", nil) 20 checkAllowKeyList(t, authz, "foo", nil) 39 authz := DenyAll() 40 checkDenyACLRead(t, authz, "foo", nil) [all …]
|
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 157 return authz.NodeReadAll(entCtx) 173 return authz.OperatorRead(entCtx) [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/hashicorp/consul/acl/ |
H A D | chained_authorizer_test.go | 12 return EnforcementDecision(authz) 15 return EnforcementDecision(authz) 18 return EnforcementDecision(authz) 21 return EnforcementDecision(authz) 24 return EnforcementDecision(authz) 27 return EnforcementDecision(authz) 30 return EnforcementDecision(authz) 33 return EnforcementDecision(authz) 36 return EnforcementDecision(authz) 39 return EnforcementDecision(authz) [all …]
|
H A D | static_authorizer_test.go | 9 authz := AllowAll() 10 checkDenyACLRead(t, authz, "foo", nil) 11 checkDenyACLWrite(t, authz, "foo", nil) 12 checkAllowAgentRead(t, authz, "foo", nil) 13 checkAllowAgentWrite(t, authz, "foo", nil) 14 checkAllowEventRead(t, authz, "foo", nil) 19 checkAllowKeyRead(t, authz, "foo", nil) 20 checkAllowKeyList(t, authz, "foo", nil) 39 authz := DenyAll() 40 checkDenyACLRead(t, authz, "foo", nil) [all …]
|
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 157 return authz.NodeReadAll(entCtx) 173 return authz.OperatorRead(entCtx) [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/hashicorp/consul/acl/ |
H A D | chained_authorizer_test.go | 12 return EnforcementDecision(authz) 15 return EnforcementDecision(authz) 18 return EnforcementDecision(authz) 21 return EnforcementDecision(authz) 24 return EnforcementDecision(authz) 27 return EnforcementDecision(authz) 30 return EnforcementDecision(authz) 33 return EnforcementDecision(authz) 36 return EnforcementDecision(authz) 39 return EnforcementDecision(authz) [all …]
|
H A D | static_authorizer_test.go | 9 authz := AllowAll() 10 checkDenyACLRead(t, authz, "foo", nil) 11 checkDenyACLWrite(t, authz, "foo", nil) 12 checkAllowAgentRead(t, authz, "foo", nil) 13 checkAllowAgentWrite(t, authz, "foo", nil) 14 checkAllowEventRead(t, authz, "foo", nil) 19 checkAllowKeyRead(t, authz, "foo", nil) 20 checkAllowKeyList(t, authz, "foo", nil) 39 authz := DenyAll() 40 checkDenyACLRead(t, authz, "foo", nil) [all …]
|
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 157 return authz.NodeReadAll(entCtx) 173 return authz.OperatorRead(entCtx) [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/acl/ |
H A D | chained_authorizer_test.go | 10 return EnforcementDecision(authz) 13 return EnforcementDecision(authz) 16 return EnforcementDecision(authz) 19 return EnforcementDecision(authz) 22 return EnforcementDecision(authz) 25 return EnforcementDecision(authz) 28 return EnforcementDecision(authz) 31 return EnforcementDecision(authz) 34 return EnforcementDecision(authz) 37 return EnforcementDecision(authz) [all …]
|
H A D | static_authorizer_test.go | 13 authz := AllowAll() 14 checkDenyACLRead(t, authz, "foo", nil) 15 checkDenyACLWrite(t, authz, "foo", nil) 16 checkAllowAgentRead(t, authz, "foo", nil) 17 checkAllowAgentWrite(t, authz, "foo", nil) 18 checkAllowEventRead(t, authz, "foo", nil) 23 checkAllowKeyRead(t, authz, "foo", nil) 24 checkAllowKeyList(t, authz, "foo", nil) 44 authz := DenyAll() 45 checkDenyACLRead(t, authz, "foo", nil) [all …]
|
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 120 return authz.KeyWrite(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 167 return authz.OperatorRead(entCtx) [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/acl/ |
H A D | chained_authorizer_test.go | 10 return EnforcementDecision(authz) 13 return EnforcementDecision(authz) 16 return EnforcementDecision(authz) 19 return EnforcementDecision(authz) 22 return EnforcementDecision(authz) 25 return EnforcementDecision(authz) 28 return EnforcementDecision(authz) 31 return EnforcementDecision(authz) 34 return EnforcementDecision(authz) 37 return EnforcementDecision(authz) [all …]
|
H A D | static_authorizer_test.go | 13 authz := AllowAll() 14 checkDenyACLRead(t, authz, "foo", nil) 15 checkDenyACLWrite(t, authz, "foo", nil) 16 checkAllowAgentRead(t, authz, "foo", nil) 17 checkAllowAgentWrite(t, authz, "foo", nil) 18 checkAllowEventRead(t, authz, "foo", nil) 23 checkAllowKeyRead(t, authz, "foo", nil) 24 checkAllowKeyList(t, authz, "foo", nil) 44 authz := DenyAll() 45 checkDenyACLRead(t, authz, "foo", nil) [all …]
|
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 120 return authz.KeyWrite(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 167 return authz.OperatorRead(entCtx) [all …]
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/hashicorp/consul/acl/ |
H A D | chained_authorizer.go | 27 for _, authz := range c.chain { 28 decision := enforce(authz) 39 return authz.ACLRead(entCtx) 46 return authz.ACLWrite(entCtx) 54 return authz.AgentRead(node, entCtx) 113 return authz.KeyRead(key, entCtx) 137 return authz.KeyringRead(entCtx) 144 return authz.KeyringWrite(entCtx) 157 return authz.NodeReadAll(entCtx) 173 return authz.OperatorRead(entCtx) [all …]
|
/dports/www/gitea/gitea-1.16.5/vendor/github.com/mholt/acmez/acme/ |
H A D | authorization.go | 75 if authz.Wildcard { 89 authz.Challenges[i].Identifier = authz.Identifier 116 return authz, err 123 return authz, err 126 return authz, nil 150 return authz, err 157 return authz, err 160 return authz, nil 180 return authz, err 197 return authz, err [all …]
|
/dports/net-mgmt/nagiosgraph/nagiosgraph-1.5.2/t/ |
H A D | 05permissions.t | 143 undef %authz; 153 undef %authz; 163 undef %authz; 173 undef %authz; 187 undef %authz; 204 ok(Dumper(\%authz), "\$VAR1 = { 212 ok(Dumper(\%authz), "\$VAR1 = { 226 ok(Dumper(\%authz), "\$VAR1 = { 244 ok(Dumper(\%authz), "\$VAR1 = { 256 ok(Dumper(\%authz), "\$VAR1 = { [all …]
|
/dports/www/gitea/gitea-1.16.5/vendor/github.com/mholt/acmez/ |
H A D | client.go | 306 if err := authz.currentSolver.CleanUp(ctx, authz.currentChallenge); err != nil { 324 if authz.Status != acme.StatusPending && authz.Status != acme.StatusValid { 344 if authz.Status != acme.StatusPending && authz.Status != acme.StatusValid { 400 err = authz.currentSolver.Present(ctx, authz.currentChallenge) 427 …authz.currentChallenge, err = c.Client.InitiateChallenge(ctx, authz.account, authz.currentChalleng… 455 authz.currentSolver = c.ChallengeSolvers[authz.currentChallenge.Type] 457 …authz.remainingChallenges = append(authz.remainingChallenges[:i], authz.remainingChallenges[i+1:].… 467 …authz.IdentifierValue(), c.enabledChallengeTypes(), authz.listOfferedChallenges(), authz.listRemai… 497 cleanupErr := authz.currentSolver.CleanUp(ctx, authz.currentChallenge) 610 authz.remainingChallenges = append(authz.remainingChallenges, chal) [all …]
|
/dports/www/p5-CGI-Application-Plugin-Authorization/CGI-Application-Plugin-Authorization-0.07/t/ |
H A D | 02_config.t | 27 lives_ok { $cgiapp->authz->config(%config) } 'All config parameters accepted'; 28 isa_ok($cgiapp->authz->drivers,'CGI::Application::Plugin::Authorization::Driver::Generic'); 35 lives_ok { TestAppConfig->new->authz->config(%config) } 'All config parameters accepted'; 39 lives_ok { TestAppConfig->new->authz->config(DRIVER => 'MODULE' ) } 'config accepts single DRIVER … 49 lives_ok { TestAppConfig->new->authz->config(FORBIDDEN_URL => '/' ) } 'config accepts FORBIDDEN_UR… 59 lives_ok { TestAppConfig->authz->config(%config) } 'config can be called as a class method'; 62 lives_ok { TestAppConfig->authz->config(\%config) } 'config can be called with a hashref or hash'; 65 lives_ok { TestAppConfig->authz->config() } 'current configuration returned'; 72 my $authz = $app->authz; 73 $authz->config( \%config ); [all …]
|
H A D | 01_basic.t | 45 sub { TestAppBasicNOTCA->new->authz }, 53 my $authz = TestAppBasic->authz; 56 my $authz2 = TestAppBasic->authz; 60 my $authz3 = TestAppBasic->authz('named'); 64 my $authz4 = TestAppBasic->authz('named'); 72 my $authz = $t1_obj->authz; 73 my $authz_again = $t1_obj->authz; 74 my $authz_named = $t1_obj->authz('named'); 76 isa_ok($authz, 'CGI::Application::Plugin::Authorization'); 83 my $authz2 = $t2_obj->authz; [all …]
|
/dports/www/apache24/httpd-2.4.53/modules/md/ |
H A D | md_acme_authz.c | 44 md_acme_authz_t *authz; in md_acme_authz_create() local 45 authz = apr_pcalloc(p, sizeof(*authz)); in md_acme_authz_create() 47 return authz; in md_acme_authz_create() 76 ctx->authz = authz; in authz_req_ctx_init() 88 authz = apr_pcalloc(p, sizeof(*authz)); in md_acme_authz_retrieve() 124 assert(authz); in md_acme_authz_update() 125 assert(authz->url); in md_acme_authz_update() 129 authz->error_type = authz->error_detail = NULL; in md_acme_authz_update() 151 ctx.authz = authz; in md_acme_authz_update() 222 (void)authz; in setup_key_authz() [all …]
|
/dports/security/lego/lego-4.5.3/challenge/resolver/ |
H A D | prober.go | 34 authz acme.Authorization member 58 for _, authz := range authorizations { 59 domain := challenge.GetTargetedDomain(authz) 60 if authz.Status == acme.StatusValid { 67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr} 102 err := solvr.PreSolve(authSolver.authz) 133 authz := authSolver.authz 135 err := solvr.PreSolve(authz) 151 authz := authSolver.authz 158 err := authSolver.solver.Solve(authz) [all …]
|
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/go-acme/lego/v3/challenge/resolver/ |
H A D | prober.go | 34 authz acme.Authorization member 58 for _, authz := range authorizations { 59 domain := challenge.GetTargetedDomain(authz) 60 if authz.Status == acme.StatusValid { 67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr} 102 err := solvr.PreSolve(authSolver.authz) 133 authz := authSolver.authz 135 err := solvr.PreSolve(authz) 151 authz := authSolver.authz 158 err := authSolver.solver.Solve(authz) [all …]
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/go-acme/lego/v4/challenge/resolver/ |
H A D | prober.go | 34 authz acme.Authorization member 58 for _, authz := range authorizations { 59 domain := challenge.GetTargetedDomain(authz) 60 if authz.Status == acme.StatusValid { 67 authSolver := &selectedAuthSolver{authz: authz, solver: solvr} 102 err := solvr.PreSolve(authSolver.authz) 133 authz := authSolver.authz 135 err := solvr.PreSolve(authz) 151 authz := authSolver.authz 158 err := authSolver.solver.Solve(authz) [all …]
|