Home
last modified time | relevance | path

Searched refs:secretVal (Results 1 – 15 of 15) sorted by relevance

/dports/sysutils/kubectl/kubernetes-1.22.2/test/integration/controlplane/
H A Dtransformation_testcase.go49 secretVal = "086a7ffc-0225-11e8-ba89-0ed5f89f718b" // Fake value for testing. const
131 if !strings.Contains(string(v), secretVal) {
132 e.logger.Errorf("expected %q after decryption, but got %q", secretVal, string(v))
140 if secretVal != string(s.Data[secretKey]) {
141 e.logger.Errorf("expected %s from KubeAPI, but got %s", secretVal, string(s.Data[secretKey]))
222 secretKey: []byte(secretVal),
H A Dkms_transformation_test.go174 if !strings.Contains(string(plainSecret), secretVal) {
175 t.Fatalf("expected %q after decryption, but got %q", secretVal, string(plainSecret))
183 if secretVal != string(s.Data[secretKey]) {
184 t.Fatalf("expected %s from KubeAPI, but got %s", secretVal, string(s.Data[secretKey]))
/dports/security/vault/vault-1.8.2/vault/diagnose/
H A Dstorage_checks.go14 secretVal string = "diagnoseSecret" const
26 err := b.Put(context.Background(), &physical.Entry{Key: uuid, Value: []byte(secretVal)})
48 if val.Key != uuid && string(val.Value) != secretVal {
H A Dmock_storage_backend.go28 var goodEntry physical.Entry = physical.Entry{Key: "diagnose", Value: []byte(secretVal)}
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/storage/drivers/csi-test/driver/
H A Ddriver.go309 func credsCheck(secrets map[string]string, secretVal string) (bool, error) {
314 if secrets[secretField] != secretVal {
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go61 secretVal, ok := vIfc.(string)
67 replacements[secretVal] = "[" + secretKey + "]"
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/
H A Delasticsearch.go71 secretVal, ok := vIfc.(string)
77 replacements[secretVal] = "[" + secretKey + "]"