/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/pomerium/csrf/ |
H A D | options.go | 1 package csrf package 8 type Option func(*csrf) 14 return func(cs *csrf) { 26 return func(cs *csrf) { 38 return func(cs *csrf) { 49 return func(cs *csrf) { 56 return func(cs *csrf) { 72 return func(cs *csrf) { 80 return func(cs *csrf) { 88 return func(cs *csrf) { [all …]
|
H A D | README.md | 1 # gorilla/csrf 3 [![GoDoc](https://godoc.org/github.com/gorilla/csrf?status.svg)](https://godoc.org/github.com/goril… 4 …https://sourcegraph.com/github.com/gorilla/csrf/-/badge.svg)](https://sourcegraph.com/github.com/g… 6 [![CircleCI](https://circleci.com/gh/gorilla/csrf.svg?style=svg)](https://circleci.com/gh/gorilla/c… 37 go get github.com/gorilla/csrf 77 "github.com/gorilla/csrf" 101 csrf.TemplateTag: csrf.TemplateField(r), 141 "github.com/gorilla/csrf" 210 "github.com/gorilla/csrf" 216 …csrfMiddleware := csrf.Protect([]byte("32-byte-long-auth-key"), csrf.TrustedOrigin([]string{"ui.do… [all …]
|
H A D | options_test.go | 1 package csrf package 78 csrf := handler.(*csrf) 79 cs := csrf.st.(*cookieStore) 88 csrf := handler.(*csrf) 89 cs := csrf.st.(*cookieStore)
|
/dports/www/writefreely/writefreely-0.13.1/vendor/github.com/gorilla/csrf/ |
H A D | options.go | 1 package csrf package 8 type Option func(*csrf) 14 return func(cs *csrf) { 26 return func(cs *csrf) { 38 return func(cs *csrf) { 49 return func(cs *csrf) { 56 return func(cs *csrf) { 79 return func(cs *csrf) { 92 return func(cs *csrf) { 100 return func(cs *csrf) { [all …]
|
H A D | README.md | 1 # gorilla/csrf 3 [![GoDoc](https://godoc.org/github.com/gorilla/csrf?status.svg)](https://godoc.org/github.com/goril… 6 [![CircleCI](https://circleci.com/gh/gorilla/csrf.svg?style=svg)](https://circleci.com/gh/gorilla/c… 37 go get github.com/gorilla/csrf 78 "github.com/gorilla/csrf" 102 csrf.TemplateTag: csrf.TemplateField(r), 142 "github.com/gorilla/csrf" 211 "github.com/gorilla/csrf" 281 CSRF := csrf.Protect( 284 csrf.SameSite(csrf.SameSiteStrictMode), [all …]
|
H A D | options_test.go | 1 package csrf package 83 csrf := handler.(*csrf) 84 cs := csrf.st.(*cookieStore) 93 csrf := handler.(*csrf) 94 cs := csrf.st.(*cookieStore)
|
/dports/www/oauth2-proxy/oauth2-proxy-7.2.0/pkg/cookies/ |
H A D | csrf.go | 30 type csrf struct { struct 56 return &csrf{ 75 func (c *csrf) HashOAuthState() string { argument 80 func (c *csrf) HashOIDCNonce() string { argument 86 func (c *csrf) CheckOAuthState(hashed string) bool { argument 91 func (c *csrf) CheckOIDCNonce(hashed string) bool { argument 134 func (c *csrf) encodeCookie() (string, error) { argument 162 csrf := &csrf{cookieOpts: opts} 163 err = msgpack.Unmarshal(decrypted, csrf) 168 return csrf, nil [all …]
|
/dports/www/osticket/upload/include/ |
H A D | class.csrf.php | 35 var $csrf; variable in CSRF 41 $this->csrf = &$_SESSION['csrf']; 45 $this->csrf = array(); 49 return ($this->timeout && (time()-$this->csrf['time'])>$this->timeout); 57 $this->csrf['token'] = sha1(session_id().Crypto::random(16).SECRET_SALT); 58 $this->csrf['time'] = time(); 63 if (!$this->csrf['token'] || $this->isExpired()) { 67 $this->csrf['time'] = time(); 70 return $this->csrf['token'];
|
/dports/net-mgmt/cacti/cacti-1.2.19/include/vendor/csrf/ |
H A D | README.md | 7 include_once '/path/to/csrf-magic.php'; 30 directory csrf-magic.php is in is writable, csrf-magic will generate a secret 31 key for you in the csrf-secret.php file. 35 csrf-magic.php as well as performs configuration. 46 csrf-magic.php. 50 csrf_conf('rewrite-js', '/web/path/to/csrf-magic.js'); 52 // include_once '/path/to/csrf-magic.php'; 110 * This is a function that gets called if a csrf check fails. csrf-magic will 133 csrf_conf('rewrite-js', '/csrf-magic.js'); 148 include_once '/path/to/csrf-magic.php'; [all …]
|
/dports/www/cutelyst/cutelyst-3.2.0/Cutelyst/Plugins/CSRFProtection/ |
H A D | csrfprotection.cpp | 61 static thread_local CSRFProtection *csrf = nullptr; variable 113 csrf = app->plugin<CSRFProtection *>(); in setup() 215 if (!csrf) { in getTokenFormField() 361 if (!csrf) { in getToken() 366 if (csrf->d_ptr->useSessions) { in getToken() 392 if (!csrf) { in setToken() 397 if (csrf->d_ptr->useSessions) { in setToken() 401 if (!csrf->d_ptr->cookieDomain.isEmpty()) { in setToken() 406 cookie.setPath(csrf->d_ptr->cookiePath); in setToken() 424 if (!csrf) { in reject() [all …]
|
/dports/security/keybase/client-v5.7.1/go/libkb/ |
H A D | session.go | 15 csrf string member 69 return s.csrf 72 func (s *Session) APIArgs() (token, csrf string) { 73 return s.token, s.csrf 85 s.csrf = csrfToken 111 s.csrf = "" 124 session, csrf string member 127 func (s *SessionTokener) Tokens() (session, csrf string) { 128 return s.session, s.csrf 144 csrf, err := resp.Body.AtKey("csrf_token").GetString() [all …]
|
/dports/www/py-freenit/freenit-0.1.25/tests/ |
H A D | base.py | 15 csrf = getattr(self, csrf_name) 17 self.headers.add_header('X-CSRF-TOKEN', csrf) 23 def post(self, endpoint, data, csrf=None, **kwargs): argument 25 self.set_csrf(csrf) 35 def put(self, endpoint, data, csrf=None, **kwargs): argument 37 self.set_csrf(csrf) 47 def patch(self, endpoint, data, csrf=None, **kwargs): argument 49 self.set_csrf(csrf) 59 def delete(self, endpoint, csrf=None, **kwargs): argument 61 self.set_csrf(csrf)
|
/dports/www/py-flask-wtf/Flask-WTF-0.15.1/tests/ |
H A D | test_csrf_extension.py | 26 def csrf(app): function 108 def test_exempt_view(app, csrf, client): argument 110 @csrf.exempt 117 csrf.exempt('test_csrf_extension.index') 122 def test_manual_protect(app, csrf, client): argument 124 @csrf.exempt 126 csrf.protect() 135 def test_exempt_blueprint(app, csrf, client): argument 137 csrf.exempt(bp) 158 from flask_wtf.csrf import logger [all …]
|
/dports/www/elixir-phoenix_html/phoenix_html-2.11.2/test/phoenix_html/ |
H A D | csrf_test.exs | 8 test "link with post using a custom csrf token" do 10 … ~r(<a data-csrf="[^"]+" data-method="post" data-to="/world" href="#" rel="nofollow">hello</a>) 13 test "link with put/delete using a custom csrf token" do 15 … ~r(<a data-csrf="[^"]+" data-method="put" data-to="/world" href="#" rel="nofollow">hello</a>) 18 test "button with post using a custom csrf token" do 20 ~r(<button data-csrf="[^"]+" data-method="post" data-to="/world">hello</button>) 23 test "form_tag for post using a custom csrf token" do 31 test "form_tag for other method using a custom csrf token" do 42 …~r(<meta charset="UTF-8" content="[^"]+" csrf-param="_csrf_token" method-param="_method" name="csr…
|
/dports/www/kanboard/kanboard-1.2.21/app/Helper/ |
H A D | UrlHelper.php | 68 * @param boolean $csrf Add a CSRF token 76 …public function icon($icon, $label, $controller, $action, array $params = array(), $csrf = false, … argument 79 …return $this->helper->url->link($html, $controller, $action, $params, $csrf, $class, $title, $newT… 90 * @param boolean $csrf Add a CSRF token 98 …public function link($label, $controller, $action, array $params = array(), $csrf = false, $class … argument 124 * @param boolean $csrf Add a CSRF token 129 …public function href($controller, $action, array $params = array(), $csrf = false, $anchor = '', $… argument 131 return $this->build('&', $controller, $action, $params, $csrf, $anchor, $absolute); 214 * @param boolean $csrf Add a CSRF token 219 …protected function build($separator, $controller, $action, array $params = array(), $csrf = false,… argument [all …]
|
/dports/www/py-freenit/freenit-0.1.25/freenit/project/tests/ |
H A D | base.py | 15 csrf = getattr(self, csrf_name) 17 self.headers.add_header('X-CSRF-TOKEN', csrf) 23 def post(self, endpoint, data, csrf=None): argument 25 self.set_csrf(csrf) 35 def put(self, endpoint, data, csrf=None): argument 37 self.set_csrf(csrf) 47 def patch(self, endpoint, data, csrf=None): argument 49 self.set_csrf(csrf)
|
/dports/www/gitea/gitea-1.16.5/modules/context/ |
H A D | csrf.go | 53 type csrf struct { struct 77 func (c *csrf) GetHeaderName() string { argument 82 func (c *csrf) GetFormName() string { argument 87 func (c *csrf) GetCookieName() string { argument 92 func (c *csrf) GetCookiePath() string { argument 97 func (c *csrf) GetCookieHTTPOnly() bool { argument 102 func (c *csrf) GetCookieDomain() string { argument 108 func (c *csrf) GetToken() string { argument 113 func (c *csrf) ValidToken(t string) bool { argument 118 func (c *csrf) Error(w http.ResponseWriter) { argument [all …]
|
/dports/sysutils/rundeck2/pkgs/webapp/WEB-INF/classes/rundeck/filters/ |
H A D | RefererFilters.groovy | 29 * rundeck.security.csrf.referer.filterMethod=NONE|POST|* 32 * rundeck.security.csrf.referer.allowApi=true|false 36 * rundeck.security.csrf.referer.requireHttps=true|false 47 … def csrf = configurationService.getString('security.csrf.referer.filterMethod', 'NONE') 48 if (!csrf || csrf == 'NONE') { 53 … def allowApi = configurationService.getBoolean('security.csrf.referer.allowApi', true) 62 … def requireHttps = configurationService.getBoolean('security.csrf.referer.requireHttps', true) 75 if (csrf == 'POST') { 90 } else if (csrf == '*') {
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/app/assets/javascripts/custom_metrics/components/ |
H A D | custom_metrics_form.vue | 3 import csrf from '~/lib/utils/csrf'; 54 this.csrf = csrf.token != null ? csrf.token : ''; 86 :csrf-token="csrf"
|
/dports/www/py-flask-wtf/Flask-WTF-0.15.1/docs/ |
H A D | csrf.rst | 1 .. currentmodule:: flask_wtf.csrf 19 from flask_wtf.csrf import CSRFProtect 21 csrf = CSRFProtect(app) 25 csrf = CSRFProtect() 29 csrf.init_app(app) 93 from flask_wtf.csrf import CSRFError 106 @csrf.exempt 113 csrf.exempt(account_blueprint) 117 :meth:`~flask_wtf.csrf.CSRFProtect.protect` only when you need. This also enables you to do some 123 csrf.protect()
|
/dports/finance/odoo/odoo-19d77c2a03335eb95a686bd69a1b56b38e87d609/odoo/addons/hw_posbox_homepage/controllers/ |
H A D | main.py | 136 @http.route('/save_credential', type='http', auth='none', cors='*', csrf=False) 142 @http.route('/clear_credential', type='http', auth='none', cors='*', csrf=False) 158 @http.route('/wifi_connect', type='http', auth='none', cors='*', csrf=False) 183 @http.route('/wifi_clear', type='http', auth='none', cors='*', csrf=False) 188 @http.route('/server_clear', type='http', auth='none', cors='*', csrf=False) 193 @http.route('/handlers_clear', type='http', auth='none', cors='*', csrf=False) 201 @http.route('/server_connect', type='http', auth='none', cors='*', csrf=False) 219 @http.route('/steps', type='http', auth='none', cors='*', csrf=False) 230 @http.route('/step_configure', type='http', auth='none', cors='*', csrf=False) 265 @http.route('/enable_ngrok', type='http', auth='none', cors='*', csrf=False) [all …]
|
/dports/net-im/openfire/Openfire-4.7.1/xmppserver/src/main/webapp/ |
H A D | pubsub-service-summary.jsp | 21 Cookie csrfCookie = CookieUtils.getCookie(request, "csrf"); 22 String csrfParam = ParamUtils.getParameter(request, "csrf"); 34 errors.put("csrf", "CSRF Failure!"); 38 CookieUtils.setCookie(request, response, "csrf", csrfParam, -1); 39 pageContext.setAttribute("csrf", csrfParam); 95 … <c:when test="${err.key eq 'csrf'}"><fmt:message key="global.csrf.failed" /></c:when> 113 <input type="hidden" name="csrf" value="${csrf}">
|
/dports/www/gitea/gitea-1.16.5/integrations/ |
H A D | change_default_branch_test.go | 25 csrf := GetCSRF(t, session, branchesURL) 27 "_csrf": csrf, 33 csrf = GetCSRF(t, session, branchesURL) 35 "_csrf": csrf,
|
/dports/textproc/py-wtforms/WTForms-2.1/docs/ |
H A D | meta.rst | 14 csrf = True 28 .. autoattribute:: csrf 30 Setting ``csrf`` to `True` will enable CSRF for the form. The value can 32 (for example, if csrf needs to be turned off only in a special case) 36 form = MyForm(request.form, meta={'csrf': False}) 41 Read the :doc:`CSRF Documentation <csrf>` to get more information on
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/app/assets/javascripts/members/components/action_buttons/ |
H A D | approve_access_request_button.vue | 4 import csrf from '~/lib/utils/csrf'; 9 csrf, 37 <input :value="$options.csrf.token" type="hidden" name="authenticity_token" />
|