Home
last modified time | relevance | path

Searched refs:policy_path (Results 1 – 25 of 86) sorted by relevance

1234

/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/core/common/cloud/
H A Duser_cloud_policy_store.cc67 const base::FilePath& policy_path, in StorePolicyToDiskOnBackgroundThread() argument
77 if (!WriteStringToFile(policy_path, data)) in StorePolicyToDiskOnBackgroundThread()
100 const base::FilePath& policy_path, in DesktopCloudPolicyStore() argument
109 policy_path_(policy_path), in DesktopCloudPolicyStore()
161 const base::FilePath& policy_path, in LoadAndFilterPolicyFromDisk() argument
172 const base::FilePath& policy_path, in LoadPolicyFromDisk() argument
178 if (!base::PathExists(policy_path)) { in LoadPolicyFromDisk()
188 << policy_path.value(); in LoadPolicyFromDisk()
398 const base::FilePath& policy_path, in UserCloudPolicyStore() argument
401 : DesktopCloudPolicyStore(policy_path, in UserCloudPolicyStore()
[all …]
H A Duser_cloud_policy_store.h94 static PolicyLoadResult LoadPolicyFromDisk(const base::FilePath& policy_path,
134 const base::FilePath& policy_path,
H A Dmachine_level_user_cloud_policy_store.cc29 const base::FilePath& policy_path, in MachineLevelUserCloudPolicyStore() argument
34 policy_path, in MachineLevelUserCloudPolicyStore()
H A Dmachine_level_user_cloud_policy_store.h28 const base::FilePath& policy_path,
H A Dmachine_level_user_cloud_policy_store_unittest.cc142 const base::FilePath policy_path = tmp_policy_dir_.GetPath().Append( in TEST_F() local
146 EXPECT_FALSE(base::PathExists(policy_path)); in TEST_F()
158 EXPECT_TRUE(base::PathExists(policy_path)); in TEST_F()
/dports/devel/py-oslo.upgradecheck/oslo.upgradecheck-1.4.0/oslo_upgradecheck/
H A Dcommon_checks.py41 policy_path = conf.find_file(conf.oslo_policy.policy_file)
42 if policy_path and fileutils.is_json(policy_path):
/dports/devel/py-oslo.policy/oslo.policy-3.10.0/oslo_policy/
H A Dpolicy.py541 self.policy_path = None
587 self.policy_path = None
610 if not self.policy_path:
612 self.policy_path = self._get_policy_path(self.policy_file)
619 if self.policy_path:
623 self.policy_path,
659 if self.policy_path:
661 self._load_policy_file(path=self.policy_path,
958 policy_path = self.conf.find_file(path)
960 if policy_path:
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/dbus/session_manager/
H A Dfake_session_manager_client.cc465 base::FilePath policy_path = in RetrievePolicy() local
467 DCHECK(!policy_path.empty()); in RetrievePolicy()
472 base::BindOnce(&GetFileContent, policy_path), in RetrievePolicy()
487 base::FilePath policy_path = in BlockingRetrievePolicy() local
489 DCHECK(!policy_path.empty()); in BlockingRetrievePolicy()
490 *policy_out = GetFileContent(policy_path); in BlockingRetrievePolicy()
544 base::FilePath policy_path = GetStubPolicyFilePath(descriptor, &key_path); in StorePolicy() local
545 DCHECK(!policy_path.empty()); in StorePolicy()
549 files_to_store[policy_path] = policy_blob; in StorePolicy()
/dports/security/py-ssh-audit/ssh-audit-2.5.0/
H A Ddocker_test.sh540 policy_path="test/docker/policies/policy_${test_number}.txt"
547 …run_policy_test "${test_name}" "${server_exec}" "${policy_path}" "${test_result_stdout}" "${test_r…
554 policy_path=$3
568 ./ssh-audit.py -P "${policy_path}" localhost:2222 > ${test_result_stdout}
578 ./ssh-audit.py -P "${policy_path}" -j localhost:2222 > ${test_result_json}
/dports/devel/grpc/grpc-1.42.0/src/core/lib/security/authorization/
H A Dgrpc_authorization_policy_provider.cc49 absl::StatusOr<std::string> ReadPolicyFromFile(absl::string_view policy_path) { in ReadPolicyFromFile() argument
52 grpc_load_file(std::string(policy_path).c_str(), 0, &policy_slice); in ReadPolicyFromFile()
/dports/devel/py-grpcio/grpcio-1.43.0/src/core/lib/security/authorization/
H A Dgrpc_authorization_policy_provider.cc49 absl::StatusOr<std::string> ReadPolicyFromFile(absl::string_view policy_path) { in ReadPolicyFromFile() argument
52 grpc_load_file(std::string(policy_path).c_str(), 0, &policy_slice); in ReadPolicyFromFile()
/dports/net/samba412/samba-4.12.15/python/samba/provision/
H A D__init__.py1263 return policy_path
1266 def create_gpo_struct(policy_path): argument
1267 if not os.path.exists(policy_path):
1268 os.makedirs(policy_path, 0o775)
1269 f = open(os.path.join(policy_path, "GPT.INI"), 'w')
1274 p = os.path.join(policy_path, "MACHINE")
1277 p = os.path.join(policy_path, "USER")
1290 policy_path = getpolicypath(sysvolpath, dnsdomain, policyguid)
1291 create_gpo_struct(policy_path)
1294 create_gpo_struct(policy_path)
[all …]
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/test_support/
H A Dpolicy_testserver.py1438 def __init__(self, server_address, data_dir, policy_path, client_state_file, argument
1458 self.policy_path = policy_path
1534 elif not os.path.exists(self.policy_path):
1535 logging.warning('Missing policies file %s' % self.policy_path)
1538 policy = json.loads(open(self.policy_path).read(), strict=False)
1540 logging.error('Failed to load policies from %s' % self.policy_path)
/dports/devel/grpc/grpc-1.42.0/test/cpp/end2end/
H A Dsdk_authz_end2end_test.cc81 CreateFileWatcherAuthzPolicyProvider(const std::string& policy_path, in CreateFileWatcherAuthzPolicyProvider() argument
86 policy_path, refresh_interval_sec, &status); in CreateFileWatcherAuthzPolicyProvider()
/dports/databases/arrow/apache-arrow-6.0.1/python/pyarrow/tests/
H A Dtest_fs.py303 policy_path = os.path.join(tmpdir, 'limited-buckets-policy.json')
304 with open(policy_path, mode='w') as policy_file:
313 'myminio/', 'no-create-buckets', policy_path)
/dports/security/tpm2-tss/tpm2-tss-3.1.0/src/tss2-fapi/
H A Dfapi_int.h396 char *policy_path; member
/dports/devel/py-oslo.policy/oslo.policy-3.10.0/oslo_policy/tests/
H A Dtest_policy.py561 self.assertIsNone(self.enforcer.policy_path)
700 with open(self.enforcer.policy_path, 'w') as f:
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/aws/docs/
H A Dcommunity.aws.ec2_vpc_endpoint_module.rst197 … <div style="font-size: small; color: darkgreen"><br/>aliases: policy_path</div>
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/zh_CN/
H A Dgitlab.po26097 msgid "Policy management project does have any policies in %{policy_path}"
26098 msgstr "策略管理项目的任何策略位于%{policy_path}"
41937 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
41938 msgstr "扫描执行策略:策略未应用, %{policy_path} 文件无效"
41940 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
41941 msgstr "扫描执行策略:策略未应用,缺少 %{policy_path} 文件"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/am_ET/
H A Dgitlab.po26279 msgid "Policy management project does have any policies in %{policy_path}"
42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/bg/
H A Dgitlab.po26279 msgid "Policy management project does have any policies in %{policy_path}"
42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/cs_CZ/
H A Dgitlab.po26643 msgid "Policy management project does have any policies in %{policy_path}"
42654 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42657 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/el_GR/
H A Dgitlab.po26279 msgid "Policy management project does have any policies in %{policy_path}"
42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/et_EE/
H A Dgitlab.po26279 msgid "Policy management project does have any policies in %{policy_path}"
42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/fil_PH/
H A Dgitlab.po26279 msgid "Policy management project does have any policies in %{policy_path}"
42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid"
42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"

1234