/dports/net/py-python-openstackclient/python-openstackclient-5.2.1/openstackclient/tests/unit/network/v2/ |
H A D | test_network_rbac.py | 58 rbac_policy.action, 59 rbac_policy.id, 60 rbac_policy.object_id, 61 rbac_policy.object_type, 62 rbac_policy.tenant_id, 63 rbac_policy.target_tenant, 255 self.rbac_policy.id, 556 rbac_policy.action, 557 rbac_policy.id, 558 rbac_policy.object_id, [all …]
|
/dports/www/py-horizon/horizon-19.2.0/openstack_dashboard/dashboards/admin/rbac_policies/ |
H A D | tests.py | 61 rbac_policy = self.rbac_policies.first() 66 self.mock_rbac_policy_create.return_value = rbac_policy 68 form_data = {'target_tenant': rbac_policy.target_tenant, 81 params = {'target_tenant': rbac_policy.target_tenant, 96 rbac_policy = self.rbac_policies.filter(object_type="qos_policy")[0] 102 self.mock_rbac_policy_create.return_value = rbac_policy 104 form_data = {'target_tenant': rbac_policy.target_tenant, 118 params = {'target_tenant': rbac_policy.target_tenant, 130 rbac_policy = self.rbac_policies.first() 137 form_data = {'target_tenant': rbac_policy.target_tenant, [all …]
|
H A D | tabs.py | 33 rbac_policy = {} 37 rbac_policy = api.neutron.rbac_policy_get(self.request, 44 return rbac_policy 48 rbac_policy = self._get_data() 50 context["rbac_policy"] = rbac_policy
|
H A D | forms.py | 144 rbac_policy = api.neutron.rbac_policy_create(request, **params) 147 return rbac_policy 175 rbac_policy = api.neutron.rbac_policy_update( 180 return rbac_policy
|
H A D | views.py | 136 rbac_policy = self._get_object() 137 return {'rbac_policy_id': rbac_policy['id'], 138 'target_tenant': rbac_policy['target_tenant']}
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/doc/source/user/resources/network/v2/ |
H A D | rbac_policy.rst | 1 openstack.network.v2.rbac_policy 4 .. automodule:: openstack.network.v2.rbac_policy 11 .. autoclass:: openstack.network.v2.rbac_policy.RBACPolicy
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/tests/unit/network/v2/ |
H A D | test_rbac_policy.py | 13 from openstack.network.v2 import rbac_policy 30 sot = rbac_policy.RBACPolicy() 41 sot = rbac_policy.RBACPolicy(**EXAMPLE)
|
H A D | test_proxy.py | 48 from openstack.network.v2 import rbac_policy 864 rbac_policy.RBACPolicy) 868 rbac_policy.RBACPolicy, False) 872 rbac_policy.RBACPolicy, True) 875 self.verify_find(self.proxy.find_rbac_policy, rbac_policy.RBACPolicy) 878 self.verify_get(self.proxy.get_rbac_policy, rbac_policy.RBACPolicy) 881 self.verify_list(self.proxy.rbac_policies, rbac_policy.RBACPolicy) 885 rbac_policy.RBACPolicy)
|
/dports/net/py-python-openstackclient/python-openstackclient-5.2.1/openstackclient/network/v2/ |
H A D | network_rbac.py | 166 for rbac in parsed_args.rbac_policy: 177 total = len(parsed_args.rbac_policy) 271 obj = client.find_rbac_policy(parsed_args.rbac_policy, 299 obj = client.find_rbac_policy(parsed_args.rbac_policy,
|
/dports/devel/grpc/grpc-1.42.0/src/core/lib/security/authorization/ |
H A D | cel_authorization_engine.cc | 63 for (const auto& rbac_policy : rbac_policies) { in CelAuthorizationEngine() local 70 rbac_policy, &policy_num)) != nullptr) { in CelAuthorizationEngine() 86 if (envoy_config_rbac_v3_RBAC_action(rbac_policy) == kAllow) { in CelAuthorizationEngine()
|
/dports/devel/grpc134/grpc-1.34.1/src/core/lib/security/authorization/ |
H A D | authorization_engine.cc | 61 for (const auto& rbac_policy : rbac_policies) { in AuthorizationEngine() local 68 rbac_policy, &policy_num)) != nullptr) { in AuthorizationEngine() 84 if (envoy_config_rbac_v3_RBAC_action(rbac_policy) == kAllow) { in AuthorizationEngine()
|
/dports/devel/py-grpcio/grpcio-1.43.0/src/core/lib/security/authorization/ |
H A D | cel_authorization_engine.cc | 63 for (const auto& rbac_policy : rbac_policies) { in CelAuthorizationEngine() local 70 rbac_policy, &policy_num)) != nullptr) { in CelAuthorizationEngine() 86 if (envoy_config_rbac_v3_RBAC_action(rbac_policy) == kAllow) { in CelAuthorizationEngine()
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/tests/functional/network/v2/ |
H A D | test_rbac_policy.py | 15 from openstack.network.v2 import rbac_policy 40 assert isinstance(sot, rbac_policy.RBACPolicy)
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/doc/source/user/resources/network/ |
H A D | index.rst | 33 v2/rbac_policy
|
/dports/devel/py-openstacksdk/openstacksdk-0.60.0/openstack/network/v2/ |
H A D | _proxy.py | 51 from openstack.network.v2 import rbac_policy as _rbac_policy 2644 def delete_rbac_policy(self, rbac_policy, ignore_missing=True): argument 2657 self._delete(_rbac_policy.RBACPolicy, rbac_policy, 2660 def find_rbac_policy(self, rbac_policy, ignore_missing=True, **args): argument 2674 return self._find(_rbac_policy.RBACPolicy, rbac_policy, 2677 def get_rbac_policy(self, rbac_policy): argument 2687 return self._get(_rbac_policy.RBACPolicy, rbac_policy) 2707 def update_rbac_policy(self, rbac_policy, **attrs): argument 2718 return self._update(_rbac_policy.RBACPolicy, rbac_policy, **attrs)
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/openstack/cloud/plugins/modules/ |
H A D | os_quota.py | 287 rbac_policy=dict(required=False, type='int', default=None),
|
H A D | quota.py | 287 rbac_policy=dict(required=False, type='int', default=None),
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/openstack/ |
H A D | os_quota.py | 360 rbac_policy=dict(required=False, type='int', default=None),
|
/dports/www/py-horizon/horizon-19.2.0/openstack_dashboard/api/ |
H A D | neutron.py | 2024 rbac_policy = neutronclient(request).create_rbac_policy( 2026 return RBACPolicy(rbac_policy) 2045 rbac_policy = neutronclient(request).update_rbac_policy( 2047 return RBACPolicy(rbac_policy)
|
/dports/net/py-libcloud/apache-libcloud-3.4.1/libcloud/compute/drivers/ |
H A D | openstack.py | 3998 rbac_policy=obj['rbac_policy'], 4465 def __init__(self, floatingip, network, port, rbac_policy, router, argument 4492 self.rbac_policy = self._to_quota_set_item(rbac_policy)
|
/dports/devel/grpc/grpc-1.42.0/ |
H A D | build_autogenerated.yaml | 138 - src/core/lib/security/authorization/rbac_policy.h 152 - src/core/lib/security/authorization/rbac_policy.cc 3859 - src/core/lib/security/authorization/rbac_policy.h 3865 - src/core/lib/security/authorization/rbac_policy.cc 4558 - src/core/lib/security/authorization/rbac_policy.h 4574 - src/core/lib/security/authorization/rbac_policy.h 4833 - src/core/lib/security/authorization/rbac_policy.h 6026 - src/core/lib/security/authorization/rbac_policy.h 6042 - src/core/lib/security/authorization/rbac_policy.h 7379 - src/core/lib/security/authorization/rbac_policy.h [all …]
|
H A D | BUILD | 3301 "src/core/lib/security/authorization/rbac_policy.cc", 3306 "src/core/lib/security/authorization/rbac_policy.h",
|
H A D | gRPC-Core.podspec | 2116 'src/core/lib/security/authorization/rbac_policy.cc', 2117 'src/core/lib/security/authorization/rbac_policy.h',
|
/dports/www/py-horizon/horizon-19.2.0/openstack_dashboard/conf/ |
H A D | neutron_policy.yaml | 678 #"restrict_wildcard": "(not field:rbac_policy:target_tenant=*) or rule:admin_only"
|
/dports/www/py-horizon/horizon-19.2.0/openstack_dashboard/conf/default_policies/ |
H A D | neutron.yaml | 1060 - check_str: (not field:rbac_policy:target_tenant=*) or rule:admin_only
|