Home
last modified time | relevance | path

Searched refs:sandbox (Results 1 – 25 of 27) sorted by relevance

12

/plugin/findologicxmlexport/vendor/twig/twig/doc/tags/
Dsandbox.rst1 ``sandbox``
4 The ``sandbox`` tag can be used to enable the sandboxing mode for an included
9 {% sandbox %}
15 The ``sandbox`` tag is only available when the sandbox extension is
20 The ``sandbox`` tag can only be used to sandbox an include tag and it
21 cannot be used to sandbox a section of a template. The following example
26 {% sandbox %}
Dindex.rst20 sandbox
Dinclude.rst68 chapter and in the :doc:`sandbox<../tags/sandbox>` tag documentation.
/plugin/findologicxmlexport/vendor/twig/twig/test/Twig/Tests/Fixtures/tags/sandbox/
Dsimple.test2 sandbox tag
4 {%- sandbox %}
8 {%- sandbox %}
13 {%- sandbox %}{% include "foo.twig" %}{% endsandbox %}
Dnot_valid1.test2 sandbox tag
4 {%- sandbox %}
11 Twig\Error\SyntaxError: Only "include" tags are allowed within a "sandbox" section in "index.twig" …
Dnot_valid2.test2 sandbox tag
4 {%- sandbox %}
14 Twig\Error\SyntaxError: Only "include" tags are allowed within a "sandbox" section in "index.twig" …
Darray.test2 sandbox tag
4 {%- sandbox %}
/plugin/aichat/conf/
Ddefault.php59 $conf['skipRegex'] = ':(playground|sandbox)(:|$)';
/plugin/findologicxmlexport/vendor/twig/twig/src/Extension/
DCoreExtension.php1539 $sandbox = null;
1545 $sandbox = $env->getExtension('\Twig\Extension\SandboxExtension');
1546 if (!$alreadySandboxed = $sandbox->isSandboxed()) {
1547 $sandbox->enableSandbox();
1557 $sandbox->disableSandbox();
1564 $sandbox->disableSandbox();
1570 $sandbox->disableSandbox();
1577 $sandbox->disableSandbox();
/plugin/findologicxmlexport/vendor/twig/twig/doc/
Dapi.rst341 * *Twig_Extension_Sandbox*: Adds a sandbox mode to the default Twig
473 The ``sandbox`` extension can be used to evaluate untrusted code. Access to
474 unsafe attributes and methods is prohibited. The sandbox security is managed
496 The policy object is the first argument of the sandbox constructor::
498 $sandbox = new \Twig\Extension\SandboxExtension($policy);
499 $twig->addExtension($sandbox);
501 By default, the sandbox mode is disabled and should be enabled when including
502 untrusted template code by using the ``sandbox`` tag:
506 {% sandbox %}
510 You can sandbox all templates by passing ``true`` as the second argument of
[all …]
Dintro.rst17 * *Secure*: Twig has a sandbox mode to evaluate untrusted template code. This
Drecipes.rst335 This method won't catch any sandbox policy violations because the policy
/plugin/dirtylittlehelper/mermaid/editor/docs/
D15.15.js1 …ng.quote"],[/base-uri/,"string.quote"],[/plugin-types/,"string.quote"],[/sandbox/,"string.quote"],…
D15.15.js.map1 …g.quote'],\n [/plugin-types/, 'string.quote'],\n [/sandbox/, 'string.quote']…
D65.65.js.map1 …'if',\n 'import',\n 'include',\n 'macro',\n 'sandbox',\n 'set',…
/plugin/findologicxmlexport/vendor/twig/twig/
DCHANGELOG23 * fixed sandbox security issue (under some circumstances, calling the
30 * improved the performance of the sandbox
73 * fixed .. (range operator) in sandbox policy
160 * fixed sandbox being left enabled if an exception is thrown while rendering
319 * fixed limited RCEs when in sandbox mode
333 * fixed sandbox disabling when using the include function
391 * removed the __toString policy check when the sandbox is disabled
408 * fixed the C extension sandbox behavior when get or set is prepend to method name
589 * added compilation checks to avoid misuses of the sandbox tag
611 * fixed sandbox mode when used with inheritance
[all …]
/plugin/findologicxmlexport/vendor/twig/twig/doc/functions/
Dinclude.rst84 * ``sandboxed``: Whether to sandbox the template or not
/plugin/sequencediagram/bower_components/lodash/vendor/underscore/test/
Dutility.js38 var sandbox = vm.createScript(
43 sandbox.runInNewContext(context);
/plugin/webcode/
DREADME.md40 sandbox="allow-modals allow-forms allow-scripts allow-same-origin allow-popups allow-top-navigation…
/plugin/findologicxmlexport/vendor/twig/twig/src/
DTemplate.php42 protected $sandbox; variable in Twig\\Template
/plugin/jplayer/vendor/james-heinrich/getid3/
DREADME.md565 * http://sandbox.mc.edu/~bennet/cs110/tc/tctod.html
Dreadme.txt583 * http://sandbox.mc.edu/~bennet/cs110/tc/tctod.html
/plugin/sequencediagram/bower_components/lodash/vendor/firebug-lite/src/
Dfirebug-lite-debug.js22875 var sandbox;
22880 sandbox = new win.Function("arguments.callee.install(window.console={})");
22890 sandbox = new win.Function("arguments.callee.install(window.console={})");
22895 sandbox = new win.Function("arguments.callee.install(window.firebug={})");
22899 sandbox.install = installer;
22900 sandbox();
/plugin/webcode/vendor/
Dfirebug-lite-1.4.js5930 var sandbox;
5931 if(win.console){if(Env.Options.overrideConsole){sandbox=new win.Function("arguments.callee.install(…
5933 }}else{try{sandbox=new win.Function("arguments.callee.install(window.console={})")
5934 }catch(E){sandbox=new win.Function("arguments.callee.install(window.firebug={})")
5935 }}sandbox.install=installer;
5936 sandbox()
/plugin/combo/resources/firebug/
H A Dfirebug-lite-1.4.js5941 var sandbox;
5942 if(win.console){if(Env.Options.overrideConsole){sandbox=new win.Function("arguments.callee.install(…
5944 }}else{try{sandbox=new win.Function("arguments.callee.install(window.console={})")
5945 }catch(E){sandbox=new win.Function("arguments.callee.install(window.firebug={})")
5946 }}sandbox.install=installer;
5947 sandbox()

12