- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 44 for ekvs (0.06 sec)
-
cmd/common-main.go
} defer f.Close() var ekvs []envKV scanner := bufio.NewScanner(f) for scanner.Scan() { ekv, err := parsEnvEntry(scanner.Text()) if err != nil { return nil, err } if ekv.Skip { // Skips empty lines continue } ekvs = append(ekvs, ekv) } if err = scanner.Err(); err != nil { return nil, err } return ekvs, nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 21:50:11 UTC 2024 - 31.7K bytes - Viewed (0) -
internal/config/config.go
} return s.String() } // KVS - is a shorthand for some wrapper functions // to operate on list of key values. type KVS []KV // Empty - return if kv is empty func (kvs KVS) Empty() bool { return len(kvs) == 0 } // Clone - returns a copy of the KVS func (kvs KVS) Clone() KVS { return append(make(KVS, 0, len(kvs)), kvs...) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 37.7K bytes - Viewed (0) -
internal/logger/config.go
cfg.HTTP[target] = http.Config{ Enabled: true, Endpoint: url, } } case config.AuditWebhookSubSys: // List legacy audit ENVs if any. var loggerAuditTargets []string envs := env.List(legacyEnvAuditLoggerHTTPEndpoint) for _, k := range envs { target := strings.TrimPrefix(k, legacyEnvAuditLoggerHTTPEndpoint+config.Default) if target == legacyEnvAuditLoggerHTTPEndpoint { target = config.Default
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 20 16:02:50 UTC 2024 - 18.3K bytes - Viewed (0) -
internal/config/policy/opa/config.go
type Opa struct { args Args client *http.Client } // Enabled returns if opa is enabled. func Enabled(kvs config.KVS) bool { return kvs.Get(URL) != "" } // LookupConfig lookup Opa from config, override with any ENVs. func LookupConfig(kv config.KVS, transport *http.Transport, closeRespFn func(io.ReadCloser)) (Args, error) { args := Args{}
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
// remove this since we have removed support for this already. for k := range s[config.IdentityOpenIDSubSys] { for _, dk := range deprecatedKeys { kvs := s[config.IdentityOpenIDSubSys][k] kvs.Delete(dk) s[config.IdentityOpenIDSubSys][k] = kvs } } if err := s.CheckValidKeys(config.IdentityOpenIDSubSys, deprecatedKeys); err != nil { return c, err }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0) -
internal/config/identity/ldap/config.go
func Enabled(kvs config.KVS) bool { return kvs.Get(ServerAddr) != "" } // Lookup - initializes LDAP config, overrides config, if any ENV values are set. func Lookup(s config.Config, rootCAs *x509.CertPool) (l Config, err error) { l = Config{} // Purge all removed keys first kvs := s[config.IdentityLDAPSubSys][config.Default] if len(kvs) > 0 { for _, k := range removedKeys {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 07 12:59:47 UTC 2024 - 8.4K bytes - Viewed (0) -
internal/config/api/api.go
gzipObjects := env.Get(EnvAPIGzipObjects, kvs.Get(apiGzipObjects)) == config.EnableOn rootAccess := env.Get(EnvAPIRootAccess, kvs.Get(apiRootAccess)) == config.EnableOn cfg = Config{ EnableODirect: enableODirect || !disableODirect, GzipObjects: gzipObjects, RootAccess: rootAccess, } var corsAllowOrigin []string
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 16 08:43:49 UTC 2024 - 11.5K bytes - Viewed (0) -
cmd/config-current.go
} for k, v := range notify.DefaultNotificationKVS { kvs[k] = v } for k, v := range lambda.DefaultLambdaKVS { kvs[k] = v } if globalIsErasure { kvs[config.StorageClassSubSys] = storageclass.DefaultKVS kvs[config.HealSubSys] = heal.DefaultKVS } config.RegisterDefaultKVS(kvs) // Captures help for each sub-system helpSubSys := config.HelpKVS{ config.HelpKV{
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 30.1K bytes - Viewed (0) -
internal/config/notify/parse.go
}, } ) // GetNotifyES - returns a map of registered notification 'elasticsearch' targets func GetNotifyES(esKVS map[string]config.KVS, transport *http.Transport) (map[string]target.ElasticsearchArgs, error) { esTargets := make(map[string]target.ElasticsearchArgs) for k, kv := range config.Merge(esKVS, target.EnvElasticEnable, DefaultESKVS) { enableEnv := target.EnvElasticEnable if k != config.Default {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 47K bytes - Viewed (0) -
internal/config/etcd/etcd.go
} // Enabled returns if etcd is enabled. func Enabled(kvs config.KVS) bool { endpoints := kvs.Get(Endpoints) return endpoints != "" } // LookupConfig - Initialize new etcd config. func LookupConfig(kvs config.KVS, rootCAs *x509.CertPool) (Config, error) { cfg := Config{} if err := config.CheckValidKeys(config.EtcdSubSys, kvs, DefaultKVS); err != nil { return cfg, err }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jun 28 23:17:22 UTC 2024 - 5.2K bytes - Viewed (0)