Searched refs:secretVal (Results 1 – 15 of 15) sorted by relevance
/dports/sysutils/kubectl/kubernetes-1.22.2/test/integration/controlplane/ |
H A D | transformation_testcase.go | 49 secretVal = "086a7ffc-0225-11e8-ba89-0ed5f89f718b" // Fake value for testing. const 131 if !strings.Contains(string(v), secretVal) { 132 e.logger.Errorf("expected %q after decryption, but got %q", secretVal, string(v)) 140 if secretVal != string(s.Data[secretKey]) { 141 e.logger.Errorf("expected %s from KubeAPI, but got %s", secretVal, string(s.Data[secretKey])) 222 secretKey: []byte(secretVal),
|
H A D | kms_transformation_test.go | 174 if !strings.Contains(string(plainSecret), secretVal) { 175 t.Fatalf("expected %q after decryption, but got %q", secretVal, string(plainSecret)) 183 if secretVal != string(s.Data[secretKey]) { 184 t.Fatalf("expected %s from KubeAPI, but got %s", secretVal, string(s.Data[secretKey]))
|
/dports/security/vault/vault-1.8.2/vault/diagnose/ |
H A D | storage_checks.go | 14 secretVal string = "diagnoseSecret" const 26 err := b.Put(context.Background(), &physical.Entry{Key: uuid, Value: []byte(secretVal)}) 48 if val.Key != uuid && string(val.Value) != secretVal {
|
H A D | mock_storage_backend.go | 28 var goodEntry physical.Entry = physical.Entry{Key: "diagnose", Value: []byte(secretVal)}
|
/dports/sysutils/kubectl/kubernetes-1.22.2/test/e2e/storage/drivers/csi-test/driver/ |
H A D | driver.go | 309 func credsCheck(secrets map[string]string, secretVal string) (bool, error) { 314 if secrets[secretField] != secretVal {
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 61 secretVal, ok := vIfc.(string) 67 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/misc/concourse/vault-bdd38fca2cff/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-database-elasticsearch/ |
H A D | elasticsearch.go | 71 secretVal, ok := vIfc.(string) 77 replacements[secretVal] = "[" + secretKey + "]"
|