/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
cors.py | 15 """Implementation of cors configuration command for GCS buckets.""" 35 gsutil cors get url 39 gsutil cors set cors-json-file url... 44 Gets the CORS configuration for a single bucket. The output from 45 "cors get" can be redirected into a file, edited and then updated using 46 "cors set". 51 Sets the CORS configuration for one or more buckets. The 52 cors-json-file specified on the command line should be a path to a local 59 Gets or sets the Cross-Origin Resource Sharing (CORS) configuration on one o [all...] |
ls.py | 178 CORS configuration: Present 282 fields['cors_config'] = 'Present' if bucket.cors else 'None' 403 'defaultObjectAcl', 'website', 'logging', 'cors',
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/tests/ |
test_cors.py | 15 """Integration tests for cors command.""" 30 @SkipForS3('CORS command is only supported for gs:// URLs') 32 """Integration tests for cors command.""" 34 _set_cmd_prefix = ['cors', 'set'] 35 _get_cmd_prefix = ['cors', 'get'] 49 no_cors = 'has no CORS configuration' 52 '<CorsConfig><Cors><Origins>' 59 '<MaxAgeSec>3600</MaxAgeSec></Cors>' 60 '<Cors><Origins><Origin>http://origin3.example.com</Origin></Origins>' 64 '</Cors></CorsConfig>').toprettyxml(indent=' ' [all...] |
test_bucketconfig.py | 26 _set_cors_command = ['cors', 'set'] 27 _get_cors_command = ['cors', 'get']
|
test_tabcomplete.py | 162 self.RunGsUtilTabCompletion(['cors', 'get', bucket_request], 166 self.RunGsUtilTabCompletion(['cors', 'set', local_file_request], 170 self.RunGsUtilTabCompletion(['cors', 'set', 'some_file', bucket_request],
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/gs/ |
cors.py | 27 # Relevant tags for the CORS XML document. 29 CORS = 'Cors' 38 class Cors(handler.ContentHandler): 39 """Encapsulates the CORS configuration XML document""" 41 # List of CORS elements found within a CorsConfig element. 42 self.cors = [] 44 # found within a CORS element. We use a list of lists here 82 elif name == CORS: 107 elif name == CORS [all...] |
bucket.py | 34 from boto.gs.cors import Cors 45 CORS_ARG = 'cors' 561 """Returns a bucket's CORS XML document. 564 :rtype: :class:`~.cors.Cors` 571 # Success - parse XML and return Cors object. 572 cors = Cors() 573 h = handler.XmlHandler(cors, self [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
translation_helper.py | 76 # Because CORS is just a list in apitools, we need special handling or blank 77 # CORS lists will get sent with other configuration commands such as lifecycle, 78 # which would cause CORS configuration to be unintentionally removed. 81 # distinguish the default value from when we actually want to remove the CORS 82 # configuration. To work around this, we create a dummy CORS entry that 83 # signifies that we should nullify the CORS configuration. 84 # A value of [] means don't modify the CORS configuration. 85 # A value of REMOVE_CORS_CONFIG means remove the CORS configuration. 89 # Similar to CORS above, we need a sentinel value allowing us to specify 443 This class handles conversation to and from Boto Cors objects, JSON text [all...] |
cloud_api_delegator.py | 324 """XML compatibility function for getting CORS configuration on a bucket. 336 CORS configuration XML for the bucket specified by storage_url. 341 """XML compatibility function for setting CORS configuration on a bucket. 344 cors_text: Raw CORS XML string. 377 """XML compatibility function for setting CORS configuration on a bucket.
|
boto_translation.py | 43 from boto.gs.cors import Cors 45 from boto.s3.cors import CORSConfiguration as S3Cors 245 if metadata.cors: 246 if metadata.cors == REMOVE_CORS_CONFIG: 247 metadata.cors = [] 248 boto_cors = CorsTranslation.BotoCorsFromMessage(metadata.cors) [all...] |
gcs_json_api.py | 419 if bucket_metadata.cors and bucket_metadata.cors == REMOVE_CORS_CONFIG: 420 bucket_metadata.cors = [] 421 apitools_include_fields.append('cors') [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/gs/ |
test_basic.py | 40 from boto.gs.cors import Cors 46 CORS_DOC = ('<CorsConfig><Cors><Origins><Origin>origin1.example.com' 52 '</Cors></CorsConfig>') 372 """Test setting and getting of CORS XML documents on Bucket.""" 378 # get new bucket cors and make sure it's empty 379 cors = re.sub(r'\s', '', bucket.get_cors().to_xml()) 380 self.assertEqual(cors, CORS_EMPTY) 381 # set cors document on new bucket 383 cors = re.sub(r'\s', '', bucket.get_cors().to_xml() [all...] |
/external/nanohttpd/webserver/src/test/java/fi/iki/elonen/ |
TestCorsHttpServer.java | 78 "--cors" 101 Assert.assertNotNull("Cors should have added a header: Access-Control-Allow-Origin", response.getLastHeader("Access-Control-Allow-Origin")); 102 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Origin: *", "*", response.getLastHeader("Access-Control-Allow-Origin").getValue()); 114 Assert.assertNotNull("Cors should have added a header: Access-Control-Allow-Origin", response.getLastHeader("Access-Control-Allow-Origin")); 115 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Origin: *", "*", response.getLastHeader("Access-Control-Allow-Origin").getValue()); 129 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Headers: " + SimpleWebServer.DEFAULT_ALLOWED_HEADERS, 147 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Headers: " + expectedValue, expectedValue,
|
TestCorsHttpServerWithSingleOrigin.java | 78 "--cors=http://localhost:9090" 101 Assert.assertNotNull("Cors should have added a header: Access-Control-Allow-Origin", response.getLastHeader("Access-Control-Allow-Origin")); 102 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Origin: http://localhost:9090", "http://localhost:9090", 115 Assert.assertNotNull("Cors should have added a header: Access-Control-Allow-Origin", response.getLastHeader("Access-Control-Allow-Origin")); 116 Assert.assertEquals("Cors should have added a header: Access-Control-Allow-Origin: http://localhost:9090", "http://localhost:9090",
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/s3/ |
test_cors.py | 25 Some integration tests for S3 CORS 33 from boto.s3.cors import CORSConfiguration 41 self.bucket_name = 'cors-%d' % int(time.time()) 76 self.fail('CORS configuration should not be there')
|
/external/nanohttpd/webserver/src/main/java/fi/iki/elonen/ |
SimpleWebServer.java | 105 String cors = null; local 118 } else if (args[i].startsWith("--cors")) { 119 cors = "*"; 122 cors = args[i].substring(equalIdx + 1); 171 ServerRunner.executeInstance(new SimpleWebServer(host, port, rootDirs, quiet, cors)); 195 private final String cors; field in class:SimpleWebServer 199 public SimpleWebServer(String host, int port, File wwwroot, boolean quiet, String cors) { 200 this(host, port, Collections.singletonList(wwwroot), quiet, cors); 211 public SimpleWebServer(String host, int port, List<File> wwwroots, boolean quiet, String cors) { 214 this.cors = cors [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/s3/ |
test_cors_configuration.py | 4 from boto.s3.cors import CORSConfiguration
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/ |
cors.py | 27 CORS rule for a bucket. 122 A container for the rules associated with a CORS configuration. 150 Add a rule to this CORS configuration. This only adds 152 the bucket, you need to pass this CORS config object
|
bucket.py | 41 from boto.s3.cors import CORSConfiguration [all...] |
/external/nanohttpd/ |
README.md | 133 * Simple [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) support via `--cors` paramater 138 * `--cors`: activates CORS support, `Access-Control-Allow-Origin` will be set to `*` 139 * `--cors=some_value`: `Access-Control-Allow-Origin` will be set to `some_value`. 144 * `--cors=http://appOne.company.com` 145 * `--cors="http://appOne.company.com, http://appTwo.company.com"`: note the double quotes so that the 2 URLs are considered part of a single argument.
|
/external/nanohttpd/src/site/markdown/ |
index.md | 133 * Simple [CORS](https://en.wikipedia.org/wiki/Cross-origin_resource_sharing) support via `--cors` paramater 138 * `--cors`: activates CORS support, `Access-Control-Allow-Origin` will be set to `*` 139 * `--cors=some_value`: `Access-Control-Allow-Origin` will be set to `some_value`. 144 * `--cors=http://appOne.company.com` 145 * `--cors="http://appOne.company.com, http://appTwo.company.com"`: note the double quotes so that the 2 URLs are considered part of a single argument.
|
/prebuilts/tools/common/m2/repository/io/netty/netty-codec-http/4.1.0.CR3/ |
netty-codec-http-4.1.0.CR3-sources.jar | |
/external/webrtc/webrtc/examples/peerconnection/server/ |
peer_channel.cc | 31 // WORKAROUND: Since support for CORS varies greatly from one browser to the 34 // always be exposed to CORS requests. There is a special CORS header devoted
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ |
storage_uri.py | 424 """returns a bucket's CORS XML""" 427 cors = bucket.get_cors(headers) 428 self.check_response(cors, 'cors', self.uri) 429 return cors 431 def set_cors(self, cors, validate=False, headers=None): 432 """sets or updates a bucket's CORS XML""" 435 bucket.set_cors(cors.to_xml(), headers) [all...] |
exception.py | 471 """Exception raised when CORS XML is invalid."""
|