/dports/databases/elixir-ecto/ecto-2.2.10/integration_test/sql/ |
H A D | sandbox.exs | 4 alias Ecto.Adapters.SQL.Sandbox 21 Sandbox.checkout(TestRepo) 23 Sandbox.checkin(TestRepo) 47 Sandbox.checkout(TestRepo) 55 Sandbox.checkout(TestRepo) 58 Sandbox.checkin(TestRepo) 59 Sandbox.checkout(TestRepo) 61 Sandbox.checkin(TestRepo) 68 Sandbox.checkin(TestRepo) 72 Sandbox.checkin(TestRepo) [all …]
|
/dports/net-im/telegram-desktop/tdesktop-3.2.5-full/Telegram/SourceFiles/core/ |
H A D | sandbox.cpp | 83 Sandbox::Sandbox( in Sandbox() function in Core::Sandbox 98 int Sandbox::start() { in start() 168 void Sandbox::QuitWhenStarted() { in QuitWhenStarted() 201 void Sandbox::setupScreenScale() { in setupScreenScale() 240 Sandbox::~Sandbox() = default; 242 bool Sandbox::event(QEvent *e) { in event() 249 void Sandbox::socketConnected() { in socketConnected() 281 void Sandbox::socketReading() { in socketReading() 404 void Sandbox::readClients() { in readClients() 462 void Sandbox::removeClients() { in removeClients() [all …]
|
H A D | sandbox.h | 24 class Sandbox final 34 Sandbox(not_null<Launcher*> launcher, int &argc, char **argv); 36 Sandbox(const Sandbox &other) = delete; 37 Sandbox &operator=(const Sandbox &other) = delete; 58 static Sandbox &Instance() { in Instance() 61 return *static_cast<Sandbox*>(QCoreApplication::instance()); in Instance() 65 ~Sandbox();
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/containerd/containerd/vendor/github.com/containerd/cri/pkg/store/sandbox/ |
H A D | sandbox.go | 31 type Sandbox struct { struct 48 func NewSandbox(metadata Metadata, status Status) Sandbox { 49 s := Sandbox{ 63 sandboxes map[string]Sandbox 70 sandboxes: make(map[string]Sandbox), 76 func (s *Store) Add(sb Sandbox) error { 91 func (s *Store) Get(id string) (Sandbox, error) { 99 return Sandbox{}, err 104 return Sandbox{}, store.ErrNotExist 108 func (s *Store) List() []Sandbox { [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/containerd/containerd/vendor/github.com/containerd/cri/pkg/store/sandbox/ |
H A D | sandbox.go | 31 type Sandbox struct { struct 48 func NewSandbox(metadata Metadata, status Status) Sandbox { 49 s := Sandbox{ 63 sandboxes map[string]Sandbox 70 sandboxes: make(map[string]Sandbox), 76 func (s *Store) Add(sb Sandbox) error { 91 func (s *Store) Get(id string) (Sandbox, error) { 99 return Sandbox{}, err 104 return Sandbox{}, store.ErrNotExist 108 func (s *Store) List() []Sandbox { [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/containerd/containerd/containerd-1.4.3/vendor/github.com/containerd/cri/pkg/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/containerd/containerd/pkg/cri/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/containerd/containerd/pkg/cri/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/containerd/containerd/pkg/cri/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/containerd/containerd/vendor/github.com/containerd/cri/pkg/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/containerd/containerd/vendor/github.com/containerd/cri/pkg/store/sandbox/ |
H A D | sandbox.go | 32 type Sandbox struct { struct 49 func NewSandbox(metadata Metadata, status Status) Sandbox { 50 s := Sandbox{ 64 sandboxes map[string]Sandbox 72 sandboxes: make(map[string]Sandbox), 79 func (s *Store) Add(sb Sandbox) error { 97 func (s *Store) Get(id string) (Sandbox, error) { 105 return Sandbox{}, err 110 return Sandbox{}, store.ErrNotExist 114 func (s *Store) List() []Sandbox { [all …]
|
/dports/www/foswiki/Foswiki-2.1.6/lib/TWiki/ |
H A D | Sandbox.pm | 2 package TWiki::Sandbox; 9 use Foswiki::Sandbox; 17 sub untaintUnchecked { Foswiki::Sandbox::untaintUnchecked(@_) } 20 Foswiki::Sandbox::untaint( shift, 21 \&Foswiki::Sandbox::validateAttachmentName ); 23 sub sanitizeAttachmentName { Foswiki::Sandbox::sanitizeAttachmentName(@_) } 24 sub sysCommand { return Foswiki::Sandbox::sysCommand(@_) }
|
/dports/www/ikiwiki/ikiwiki-3.20200202.3/doc/bugs/ |
H A D | search_plugin_and_CGI_preview.mdwn | 3 I discovered this by using (perhaps this is weird) the Sandbox to 5 I just deleted the original Sandbox text in the edit form, pasted in my 6 file, hit Preview, then cancelled the edit, leaving the Sandbox unchanged. 8 After that, the Sandbox was one of the search hits for terms in the new 9 page, and the Sandbox excerpt in the search results showed text taken 10 from the new page, that was never really in the Sandbox page at all. 12 Clicking Edit and then Preview on the original Sandbox page corrected
|
/dports/audio/mixxx/mixxx-2.3.0/src/util/ |
H A D | sandbox.cpp | 21 QRecursiveMutex Sandbox::s_mutex; 23 QMutex Sandbox::s_mutex(QMutex::Recursive); 25 bool Sandbox::s_bInSandbox = false; 26 QSharedPointer<ConfigObject<ConfigValue>> Sandbox::s_pSandboxPermissions; 27 QHash<QString, SecurityTokenWeakPointer> Sandbox::s_activeTokens; 30 void Sandbox::checkSandboxed() { in checkSandboxed() 49 void Sandbox::setPermissionsFilePath(const QString& permissionsFile) { in setPermissionsFilePath() 56 void Sandbox::shutdown() { in shutdown() 66 bool Sandbox::askForAccess(const QString& path) { in askForAccess() 149 bool Sandbox::createSecurityToken(const QString& canonicalPath, in createSecurityToken() [all …]
|
/dports/www/foswiki/Foswiki-2.1.6/lib/Foswiki/Store/Rcs/ |
H A D | RcsWrapHandler.pm | 26 use Foswiki::Sandbox (); 68 my ( $rcsOutput, $exit ) = Foswiki::Sandbox->sysCommand( 193 my ( $rcsOut, $exit ) = Foswiki::Sandbox->sysCommand( 229 ( $rcsOut, $exit, $stderr ) = Foswiki::Sandbox->sysCommand( 244 ( $rcsOut, $exit, $stderr ) = Foswiki::Sandbox->sysCommand( 333 my $f = Foswiki::Sandbox::untaintUnchecked($_); 355 my ( $rcsOut, $exit ) = Foswiki::Sandbox->sysCommand( 394 Foswiki::Sandbox->sysCommand( $Foswiki::cfg{RCS}{histCmd}, 427 ( $tmp, $exit ) = Foswiki::Sandbox->sysCommand( 534 Foswiki::Sandbox->sysCommand( [all …]
|
/dports/www/foswiki/Foswiki-2.1.6/lib/Foswiki/UI/ |
H A D | Viewfile.pm | 19 use Foswiki::Sandbox (); 90 Foswiki::Sandbox::untaint( $path[0], 91 \&Foswiki::Sandbox::validateWebName ); 97 Foswiki::Sandbox::untaint( $path[0], 98 \&Foswiki::Sandbox::validateWebName ); 119 Foswiki::Sandbox::untaint( shift(@path), 120 \&Foswiki::Sandbox::validateTopicName ); 153 $fileName = Foswiki::Sandbox::untaint( $fileName, 154 \&Foswiki::Sandbox::validateAttachmentName );
|
/dports/www/elixir-phoenix_ecto/phoenix_ecto-3.3.0/test/phoenix_ecto/sql/ |
H A D | sandbox_test.exs | 5 alias Phoenix.Ecto.SQL.Sandbox 32 |> Sandbox.init() 34 Sandbox.call(conn, opts) 43 metadata = Sandbox.metadata_for(MyRepo, self()) 56 metadata = Sandbox.metadata_for(repos, self()) 69 metadata = Sandbox.metadata_for(MyRepo, self()) 88 metadata = Sandbox.metadata_for(MyRepo, self()) 89 encoded_meta = Sandbox.encode_metadata(metadata) 92 assert metadata == Sandbox.decode_metadata(encoded_meta)
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/cli/ |
H A D | sandbox.cpp | 31 Sandbox::Sandbox() in Sandbox() function in Botan_CLI::Sandbox 44 bool Sandbox::init() in init() 112 Sandbox::~Sandbox() in ~Sandbox()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/cli/ |
H A D | sandbox.cpp | 31 Sandbox::Sandbox() in Sandbox() function in Botan_CLI::Sandbox 44 bool Sandbox::init() in init() 112 Sandbox::~Sandbox() in ~Sandbox()
|
/dports/security/botan2/Botan-2.18.2/src/cli/ |
H A D | sandbox.cpp | 31 Sandbox::Sandbox() in Sandbox() function in Botan_CLI::Sandbox 44 bool Sandbox::init() in init() 112 Sandbox::~Sandbox() in ~Sandbox()
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/golang.org/x/tools/internal/lsp/fake/ |
H A D | sandbox.go | 23 type Sandbox struct { struct 72 func NewSandbox(config *SandboxConfig) (_ *Sandbox, err error) { 80 sb := &Sandbox{} 196 func (sb *Sandbox) RootDir() string { argument 201 func (sb *Sandbox) GOPATH() string { argument 207 func (sb *Sandbox) GoEnv() map[string]string { argument 222 func (sb *Sandbox) RunGoCommand(ctx context.Context, dir, verb string, args []string) error { argument 257 func (sb *Sandbox) Close() error { argument
|
/dports/biology/artemis/artemis-17.0.1-11-g3e43d27e/test/evosuite-tests/uk/ac/sanger/artemis/ |
H A D | ExternalProgramThread_ESTest_scaffolding.java | 14 import org.evosuite.runtime.sandbox.Sandbox; 15 import org.evosuite.runtime.sandbox.Sandbox.SandboxMode; 35 …org.evosuite.runtime.RuntimeSettings.sandboxMode = org.evosuite.runtime.sandbox.Sandbox.SandboxMod… in initEvoSuiteFramework() 36 org.evosuite.runtime.sandbox.Sandbox.initializeSecurityManagerForSUT(); in initEvoSuiteFramework() 45 Sandbox.resetDefaultSecurityManager(); in clearEvoSuiteFramework() 54 org.evosuite.runtime.sandbox.Sandbox.goingToExecuteSUTCode(); in initTestCase() 67 org.evosuite.runtime.sandbox.Sandbox.doneWithExecutingSUTCode(); in doneWithTestCase()
|
/dports/biology/artemis/artemis-17.0.1-11-g3e43d27e/test/evosuite-tests/uk/ac/sanger/artemis/circular/digest/ |
H A D | CutSite_ESTest_scaffolding.java | 14 import org.evosuite.runtime.sandbox.Sandbox; 15 import org.evosuite.runtime.sandbox.Sandbox.SandboxMode; 35 …org.evosuite.runtime.RuntimeSettings.sandboxMode = org.evosuite.runtime.sandbox.Sandbox.SandboxMod… in initEvoSuiteFramework() 36 org.evosuite.runtime.sandbox.Sandbox.initializeSecurityManagerForSUT(); in initEvoSuiteFramework() 45 Sandbox.resetDefaultSecurityManager(); in clearEvoSuiteFramework() 54 org.evosuite.runtime.sandbox.Sandbox.goingToExecuteSUTCode(); in initTestCase() 67 org.evosuite.runtime.sandbox.Sandbox.doneWithExecutingSUTCode(); in doneWithTestCase()
|
/dports/biology/artemis/artemis-17.0.1-11-g3e43d27e/test/evosuite-tests/uk/ac/sanger/artemis/io/ |
H A D | EMBLObject_ESTest_scaffolding.java | 14 import org.evosuite.runtime.sandbox.Sandbox; 15 import org.evosuite.runtime.sandbox.Sandbox.SandboxMode; 35 …org.evosuite.runtime.RuntimeSettings.sandboxMode = org.evosuite.runtime.sandbox.Sandbox.SandboxMod… in initEvoSuiteFramework() 36 org.evosuite.runtime.sandbox.Sandbox.initializeSecurityManagerForSUT(); in initEvoSuiteFramework() 45 Sandbox.resetDefaultSecurityManager(); in clearEvoSuiteFramework() 54 org.evosuite.runtime.sandbox.Sandbox.goingToExecuteSUTCode(); in initTestCase() 67 org.evosuite.runtime.sandbox.Sandbox.doneWithExecutingSUTCode(); in doneWithTestCase()
|
H A D | EntryStreamEvent_ESTest_scaffolding.java | 14 import org.evosuite.runtime.sandbox.Sandbox; 15 import org.evosuite.runtime.sandbox.Sandbox.SandboxMode; 35 …org.evosuite.runtime.RuntimeSettings.sandboxMode = org.evosuite.runtime.sandbox.Sandbox.SandboxMod… in initEvoSuiteFramework() 36 org.evosuite.runtime.sandbox.Sandbox.initializeSecurityManagerForSUT(); in initEvoSuiteFramework() 45 Sandbox.resetDefaultSecurityManager(); in clearEvoSuiteFramework() 54 org.evosuite.runtime.sandbox.Sandbox.goingToExecuteSUTCode(); in initTestCase() 67 org.evosuite.runtime.sandbox.Sandbox.doneWithExecutingSUTCode(); in doneWithTestCase()
|