/dports/www/py-django-configurations/django-configurations-2.2/tests/settings/ |
H A D | mixin_inheritance.py | 7 allowed_hosts = super(Mixin1, self).ALLOWED_HOSTS[:] 8 allowed_hosts.append('test1') 9 return allowed_hosts 16 allowed_hosts = super(Mixin2, self).ALLOWED_HOSTS[:] 17 allowed_hosts.append('test2') 18 return allowed_hosts 24 allowed_hosts = super(Inheritance, self).ALLOWED_HOSTS[:] 25 allowed_hosts.append('test3') 26 return allowed_hosts
|
H A D | multiple_inheritance.py | 7 allowed_hosts = super(Inheritance, self).ALLOWED_HOSTS[:] 8 allowed_hosts.append('test-test') 9 return allowed_hosts
|
H A D | single_inheritance.py | 8 allowed_hosts = super(Inheritance, self).ALLOWED_HOSTS[:] 9 allowed_hosts.append('test') 10 return allowed_hosts
|
H A D | main.py | 44 allowed_hosts = super(Test, self).ALLOWED_HOSTS[:] 45 allowed_hosts.append('base') 46 return allowed_hosts
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/vmware/tests/integration/targets/vmware_host_firewall_manager/tasks/ |
H A D | main.yml | 130 allowed_hosts: 176 allowed_hosts: 191 - nfc_state.allowed_hosts.current_allowed_all == False 192 - nfc_state.allowed_hosts.previous_allowed_all == true 193 - nfc_state.allowed_hosts.desired_allowed_all == False 195 - nfc_state.allowed_hosts.previous_allowed_all == true 197 - nfc_state.allowed_hosts.current_allowed_networks == [] 198 - nfc_state.allowed_hosts.previous_allowed_networks == [] 199 - nfc_state.allowed_hosts.desired_allowed_networks == [] 211 allowed_hosts: [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/vmware_host_firewall_manager/tasks/ |
H A D | main.yml | 130 allowed_hosts: 176 allowed_hosts: 191 - nfc_state.allowed_hosts.current_allowed_all == False 192 - nfc_state.allowed_hosts.previous_allowed_all == True 193 - nfc_state.allowed_hosts.desired_allowed_all == False 195 - nfc_state.allowed_hosts.previous_allowed_all == True 197 - nfc_state.allowed_hosts.current_allowed_networks == [] 198 - nfc_state.allowed_hosts.previous_allowed_networks == [] 199 - nfc_state.allowed_hosts.desired_allowed_networks == [] 211 allowed_hosts: [all …]
|
/dports/www/py-starlette/starlette-0.17.1/starlette/middleware/ |
H A D | trustedhost.py | 14 allowed_hosts: typing.Sequence[str] = None, 17 if allowed_hosts is None: 18 allowed_hosts = ["*"] 20 for pattern in allowed_hosts: 25 self.allowed_hosts = list(allowed_hosts) 26 self.allow_any = "*" in allowed_hosts 41 for pattern in self.allowed_hosts:
|
/dports/security/denyhosts/DenyHosts-3.1.2/DenyHosts/ |
H A D | allowedhosts.py | 20 self.allowed_hosts = {} 28 if ip_addr in self.allowed_hosts: 34 print(list(self.allowed_hosts.keys())) 58 self.allowed_hosts["%s%s" % (first3, fourth)] = 1 62 self.allowed_hosts["%s%s" % (first3, i)] = 1 67 self.allowed_hosts["%s%d" % (first3, i)] = 1 71 self.allowed_hosts[line] = 1 75 self.allowed_hosts[ip] = 1 80 debug("allowed_hosts: %s", list(self.allowed_hosts.keys())) 88 self.allowed_hosts[hostname] = 1
|
/dports/net-mgmt/p5-SNMP_Session/SNMP_Session-1.13/test/ |
H A D | wwwtest | 35 my @allowed_hosts=qw(localhost ::1 127.0.0.1); 36 my %allowed_hosts; 46 foreach (@allowed_hosts) { $allowed_hosts{$_} = 1; } 54 if (! exists ($allowed_hosts{$q->param ('hostname')})) { 144 @allowed_hosts));
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/cloud/vmware/ |
H A D | vmware_host_firewall_manager.py | 227 allowed_hosts = rule_option.get('allowed_hosts', {}) 228 ip_addresses = allowed_hosts.get('ip_address', []) 229 ip_networks = allowed_hosts.get('ip_network', []) 290 allowed_hosts = rule_option.get('allowed_hosts', {}) 291 playbook_allows_all = allowed_hosts.get('all_ip', False) 292 playbook_allowed_ips = set(allowed_hosts.get('ip_address', [])) 293 playbook_allowed_networks = set(allowed_hosts.get('ip_network', [])) 379 allowed_hosts = rule_option['allowed_hosts'][0] 380 rule_option['allowed_hosts'] = allowed_hosts
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/vmware/plugins/modules/ |
H A D | vmware_host_firewall_manager.py | 241 allowed_hosts = rule_option.get('allowed_hosts', {}) 242 ip_addresses = allowed_hosts.get('ip_address', []) 243 ip_networks = allowed_hosts.get('ip_network', []) 304 allowed_hosts = rule_option.get('allowed_hosts', {}) 305 playbook_allows_all = allowed_hosts.get('all_ip', False) 306 playbook_allowed_ips = set(allowed_hosts.get('ip_address', [])) 307 playbook_allowed_networks = set(allowed_hosts.get('ip_network', [])) 393 allowed_hosts = rule_option['allowed_hosts'][0] 394 rule_option['allowed_hosts'] = allowed_hosts
|
/dports/security/py-social-auth-core/social-auth-core-4.0.2/social_core/ |
H A D | actions.py | 22 allowed_hosts = backend.setting('ALLOWED_REDIRECT_HOSTS', []) + \ 24 redirect_uri = sanitize_redirect(allowed_hosts, redirect_uri) 98 allowed_hosts = backend.setting('ALLOWED_REDIRECT_HOSTS', []) + \ 100 url = sanitize_redirect(allowed_hosts, url) or \ 127 allowed_hosts = backend.setting('ALLOWED_REDIRECT_HOSTS', []) + \ 129 url = sanitize_redirect(allowed_hosts, url) or \
|
/dports/news/knews/knews-1.0b.1/util/tcp_relay/ |
H A D | tcp_relay.c | 49 static struct in_addr *allowed_hosts = NULL; variable 64 allowed_hosts = xrealloc(allowed_hosts, in allow_host() 66 sizeof allowed_hosts[0]); in allow_host() 68 memcpy(&allowed_hosts[n_hosts++], hent->h_addr, hent->h_length); in allow_host() 76 if (memcmp(&addr->sin_addr, &allowed_hosts[i], in is_allowed()
|
/dports/www/py-flask-apscheduler/Flask-APScheduler-1.12.2/flask_apscheduler/ |
H A D | scheduler.py | 42 self.allowed_hosts = ['*'] 100 if self.host_name not in self.allowed_hosts and '*' not in self.allowed_hosts: 102 (self.host_name, ','.join(self.allowed_hosts))) 323 self.allowed_hosts = self.app.config.get('SCHEDULER_ALLOWED_HOSTS', self.allowed_hosts)
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/content/browser/webui/ |
H A D | web_ui_url_loader_factory.cc | 219 base::flat_set<std::string> allowed_hosts) { in Create() argument 224 new WebUIURLLoaderFactory(ftn, scheme, std::move(allowed_hosts), in Create() 306 base::flat_set<std::string> allowed_hosts, in WebUIURLLoaderFactory() argument 311 allowed_hosts_(std::move(allowed_hosts)) {} in WebUIURLLoaderFactory() 325 base::flat_set<std::string> allowed_hosts) { in CreateWebUIURLLoaderFactory() argument 327 scheme, std::move(allowed_hosts)); in CreateWebUIURLLoaderFactory()
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/config/initializers/ |
H A D | rails_host_authorization.rb | 5 if Gitlab.config.gitlab.allowed_hosts.present? 7 Rails.application.config.hosts += Gitlab.config.gitlab.allowed_hosts
|
/dports/security/zeronet/ZeroNet-0.7.1/src/Ui/ |
H A D | UiServer.py | 65 self.allowed_hosts = set(config.ui_host) 69 self.allowed_hosts = set(["zero", "localhost:%s" % config.ui_port]) 77 self.allowed_hosts.update(["localhost"]) 79 self.allowed_hosts = set([])
|
/dports/lang/rust/rustc-1.58.1-src/vendor/jsonrpc-server-utils/src/ |
H A D | hosts.rs | 151 pub fn is_host_valid(host: Option<&str>, allowed_hosts: &Option<Vec<Host>>) -> bool { in is_host_valid() 152 match allowed_hosts.as_ref() { in is_host_valid() 154 Some(ref allowed_hosts) => match host { in is_host_valid() 156 Some(ref host) => allowed_hosts.iter().any(|h| h.matches(host)), in is_host_valid()
|
/dports/www/py-bokeh/bokeh-2.3.3/bokeh/server/views/ |
H A D | ws.py | 102 allowed_hosts = self.application.websocket_origins 104 allowed_hosts = set(settings.allowed_ws_origin()) 106 allowed = check_allowlist(origin_host, allowed_hosts) 112 origin, origin_host, origin_host, allowed_hosts)
|
/dports/mail/roundcube/roundcubemail-1.5.1/plugins/managesieve/ |
H A D | managesieve.php | 49 $allowed_hosts = $this->rc->config->get('managesieve_allowed_hosts'); 50 … if (!empty($allowed_hosts) && !in_array($_SESSION['storage_host'], (array) $allowed_hosts)) {
|
/dports/www/py-wagtail/wagtail-2.14.2/wagtail/admin/views/pages/ |
H A D | lock.py | 29 if redirect_to and is_safe_url(url=redirect_to, allowed_hosts={request.get_host()}): 55 if redirect_to and is_safe_url(url=redirect_to, allowed_hosts={request.get_host()}):
|
/dports/devel/py-jedi/jedi-0.18.0/jedi/third_party/django-stubs/django-stubs/utils/ |
H A D | http.pyi | 29 … url: Optional[str], allowed_hosts: Optional[Union[str, Iterable[str]]], require_https: bool = ... 32 … url: Optional[str], allowed_hosts: Optional[Union[str, Iterable[str]]], require_https: bool = ...
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/urllib3/packages/rfc3986/ |
H A D | validators.py | 61 self.allowed_hosts = set() 104 self.allowed_hosts.add(normalizers.normalize_host(host)) 239 ensure_one_of(self.allowed_hosts, uri, 'host')
|
/dports/www/py-rfc3986/rfc3986-1.5.0/src/rfc3986/ |
H A D | validators.py | 55 self.allowed_hosts = set() 98 self.allowed_hosts.add(normalizers.normalize_host(host)) 233 ensure_one_of(self.allowed_hosts, uri, "host")
|
/dports/www/py-rfc3986/rfc3986-1.5.0/tests/ |
H A D | test_validators.py | 19 assert validator.allowed_hosts == set() 38 assert "pypi.python.org" in validator.allowed_hosts 39 assert "pypi.org" in validator.allowed_hosts
|