/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/core/common/cloud/ |
H A D | user_cloud_policy_store.cc | 67 const base::FilePath& policy_path, in StorePolicyToDiskOnBackgroundThread() argument 77 if (!WriteStringToFile(policy_path, data)) in StorePolicyToDiskOnBackgroundThread() 100 const base::FilePath& policy_path, in DesktopCloudPolicyStore() argument 109 policy_path_(policy_path), in DesktopCloudPolicyStore() 161 const base::FilePath& policy_path, in LoadAndFilterPolicyFromDisk() argument 172 const base::FilePath& policy_path, in LoadPolicyFromDisk() argument 178 if (!base::PathExists(policy_path)) { in LoadPolicyFromDisk() 188 << policy_path.value(); in LoadPolicyFromDisk() 398 const base::FilePath& policy_path, in UserCloudPolicyStore() argument 401 : DesktopCloudPolicyStore(policy_path, in UserCloudPolicyStore() [all …]
|
H A D | user_cloud_policy_store.h | 94 static PolicyLoadResult LoadPolicyFromDisk(const base::FilePath& policy_path, 134 const base::FilePath& policy_path,
|
H A D | machine_level_user_cloud_policy_store.cc | 29 const base::FilePath& policy_path, in MachineLevelUserCloudPolicyStore() argument 34 policy_path, in MachineLevelUserCloudPolicyStore()
|
H A D | machine_level_user_cloud_policy_store.h | 28 const base::FilePath& policy_path,
|
H A D | machine_level_user_cloud_policy_store_unittest.cc | 142 const base::FilePath policy_path = tmp_policy_dir_.GetPath().Append( in TEST_F() local 146 EXPECT_FALSE(base::PathExists(policy_path)); in TEST_F() 158 EXPECT_TRUE(base::PathExists(policy_path)); in TEST_F()
|
/dports/devel/py-oslo.upgradecheck/oslo.upgradecheck-1.4.0/oslo_upgradecheck/ |
H A D | common_checks.py | 41 policy_path = conf.find_file(conf.oslo_policy.policy_file) 42 if policy_path and fileutils.is_json(policy_path):
|
/dports/devel/py-oslo.policy/oslo.policy-3.10.0/oslo_policy/ |
H A D | policy.py | 541 self.policy_path = None 587 self.policy_path = None 610 if not self.policy_path: 612 self.policy_path = self._get_policy_path(self.policy_file) 619 if self.policy_path: 623 self.policy_path, 659 if self.policy_path: 661 self._load_policy_file(path=self.policy_path, 958 policy_path = self.conf.find_file(path) 960 if policy_path: [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/dbus/session_manager/ |
H A D | fake_session_manager_client.cc | 465 base::FilePath policy_path = in RetrievePolicy() local 467 DCHECK(!policy_path.empty()); in RetrievePolicy() 472 base::BindOnce(&GetFileContent, policy_path), in RetrievePolicy() 487 base::FilePath policy_path = in BlockingRetrievePolicy() local 489 DCHECK(!policy_path.empty()); in BlockingRetrievePolicy() 490 *policy_out = GetFileContent(policy_path); in BlockingRetrievePolicy() 544 base::FilePath policy_path = GetStubPolicyFilePath(descriptor, &key_path); in StorePolicy() local 545 DCHECK(!policy_path.empty()); in StorePolicy() 549 files_to_store[policy_path] = policy_blob; in StorePolicy()
|
/dports/security/py-ssh-audit/ssh-audit-2.5.0/ |
H A D | docker_test.sh | 540 policy_path="test/docker/policies/policy_${test_number}.txt" 547 …run_policy_test "${test_name}" "${server_exec}" "${policy_path}" "${test_result_stdout}" "${test_r… 554 policy_path=$3 568 ./ssh-audit.py -P "${policy_path}" localhost:2222 > ${test_result_stdout} 578 ./ssh-audit.py -P "${policy_path}" -j localhost:2222 > ${test_result_json}
|
/dports/devel/grpc/grpc-1.42.0/src/core/lib/security/authorization/ |
H A D | grpc_authorization_policy_provider.cc | 49 absl::StatusOr<std::string> ReadPolicyFromFile(absl::string_view policy_path) { in ReadPolicyFromFile() argument 52 grpc_load_file(std::string(policy_path).c_str(), 0, &policy_slice); in ReadPolicyFromFile()
|
/dports/devel/py-grpcio/grpcio-1.43.0/src/core/lib/security/authorization/ |
H A D | grpc_authorization_policy_provider.cc | 49 absl::StatusOr<std::string> ReadPolicyFromFile(absl::string_view policy_path) { in ReadPolicyFromFile() argument 52 grpc_load_file(std::string(policy_path).c_str(), 0, &policy_slice); in ReadPolicyFromFile()
|
/dports/net/samba412/samba-4.12.15/python/samba/provision/ |
H A D | __init__.py | 1263 return policy_path 1266 def create_gpo_struct(policy_path): argument 1267 if not os.path.exists(policy_path): 1268 os.makedirs(policy_path, 0o775) 1269 f = open(os.path.join(policy_path, "GPT.INI"), 'w') 1274 p = os.path.join(policy_path, "MACHINE") 1277 p = os.path.join(policy_path, "USER") 1290 policy_path = getpolicypath(sysvolpath, dnsdomain, policyguid) 1291 create_gpo_struct(policy_path) 1294 create_gpo_struct(policy_path) [all …]
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/test_support/ |
H A D | policy_testserver.py | 1438 def __init__(self, server_address, data_dir, policy_path, client_state_file, argument 1458 self.policy_path = policy_path 1534 elif not os.path.exists(self.policy_path): 1535 logging.warning('Missing policies file %s' % self.policy_path) 1538 policy = json.loads(open(self.policy_path).read(), strict=False) 1540 logging.error('Failed to load policies from %s' % self.policy_path)
|
/dports/devel/grpc/grpc-1.42.0/test/cpp/end2end/ |
H A D | sdk_authz_end2end_test.cc | 81 CreateFileWatcherAuthzPolicyProvider(const std::string& policy_path, in CreateFileWatcherAuthzPolicyProvider() argument 86 policy_path, refresh_interval_sec, &status); in CreateFileWatcherAuthzPolicyProvider()
|
/dports/databases/arrow/apache-arrow-6.0.1/python/pyarrow/tests/ |
H A D | test_fs.py | 303 policy_path = os.path.join(tmpdir, 'limited-buckets-policy.json') 304 with open(policy_path, mode='w') as policy_file: 313 'myminio/', 'no-create-buckets', policy_path)
|
/dports/security/tpm2-tss/tpm2-tss-3.1.0/src/tss2-fapi/ |
H A D | fapi_int.h | 396 char *policy_path; member
|
/dports/devel/py-oslo.policy/oslo.policy-3.10.0/oslo_policy/tests/ |
H A D | test_policy.py | 561 self.assertIsNone(self.enforcer.policy_path) 700 with open(self.enforcer.policy_path, 'w') as f:
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/aws/docs/ |
H A D | community.aws.ec2_vpc_endpoint_module.rst | 197 … <div style="font-size: small; color: darkgreen"><br/>aliases: policy_path</div>
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/zh_CN/ |
H A D | gitlab.po | 26097 msgid "Policy management project does have any policies in %{policy_path}" 26098 msgstr "策略管理项目的任何策略位于%{policy_path}" 41937 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 41938 msgstr "扫描执行策略:策略未应用, %{policy_path} 文件无效" 41940 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing" 41941 msgstr "扫描执行策略:策略未应用,缺少 %{policy_path} 文件"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/am_ET/ |
H A D | gitlab.po | 26279 msgid "Policy management project does have any policies in %{policy_path}" 42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/bg/ |
H A D | gitlab.po | 26279 msgid "Policy management project does have any policies in %{policy_path}" 42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/cs_CZ/ |
H A D | gitlab.po | 26643 msgid "Policy management project does have any policies in %{policy_path}" 42654 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42657 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/el_GR/ |
H A D | gitlab.po | 26279 msgid "Policy management project does have any policies in %{policy_path}" 42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/et_EE/ |
H A D | gitlab.po | 26279 msgid "Policy management project does have any policies in %{policy_path}" 42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/locale/fil_PH/ |
H A D | gitlab.po | 26279 msgid "Policy management project does have any policies in %{policy_path}" 42176 msgid "scan-execution-policy: policy not applied, %{policy_path} file is invalid" 42179 msgid "scan-execution-policy: policy not applied, %{policy_path} file is missing"
|