mirror of
https://github.com/usmannasir/cyberpanel.git
synced 2025-11-08 06:16:08 +01:00
local changes
This commit is contained in:
@@ -4,149 +4,149 @@
|
||||
from django.dispatch import Signal
|
||||
|
||||
## This event is fired before CyberPanel core load Firewall home template.
|
||||
preFirewallHome = Signal(providing_args=["request"])
|
||||
preFirewallHome = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished loading Firewall home template.
|
||||
postFirewallHome = Signal(providing_args=["request", "response"])
|
||||
postFirewallHome = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start adding a firewall rule.
|
||||
preAddRule = Signal(providing_args=["request"])
|
||||
preAddRule = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished adding a firewall rule.
|
||||
postAddRule = Signal(providing_args=["request", "response"])
|
||||
postAddRule = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start deleting a firewall rule.
|
||||
preDeleteRule = Signal(providing_args=["request"])
|
||||
preDeleteRule = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished deleting a firewall rule.
|
||||
postDeleteRule = Signal(providing_args=["request", "response"])
|
||||
postDeleteRule = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start to reload firewalld.
|
||||
preReloadFirewall = Signal(providing_args=["request"])
|
||||
preReloadFirewall = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished reloading firewalld.
|
||||
postReloadFirewall = Signal(providing_args=["request", "response"])
|
||||
postReloadFirewall = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start firewalld.
|
||||
preStartFirewall = Signal(providing_args=["request"])
|
||||
preStartFirewall = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished starting firewalld.
|
||||
postStartFirewall = Signal(providing_args=["request", "response"])
|
||||
postStartFirewall = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core stop firewalld.
|
||||
preStopFirewall = Signal(providing_args=["request"])
|
||||
preStopFirewall = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished stopping firewalld.
|
||||
postStopFirewall = Signal(providing_args=["request", "response"])
|
||||
postStopFirewall = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start to fetch firewalld status.
|
||||
preFirewallStatus = Signal(providing_args=["request"])
|
||||
preFirewallStatus = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished getting firewalld status.
|
||||
postFirewallStatus = Signal(providing_args=["request", "response"])
|
||||
postFirewallStatus = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start loading template for securing ssh page.
|
||||
preSecureSSH = Signal(providing_args=["request"])
|
||||
preSecureSSH = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished oading template for securing ssh page.
|
||||
postSecureSSH = Signal(providing_args=["request", "response"])
|
||||
postSecureSSH = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start saving SSH configs.
|
||||
preSaveSSHConfigs = Signal(providing_args=["request"])
|
||||
preSaveSSHConfigs = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished saving saving SSH configs.
|
||||
postSaveSSHConfigs = Signal(providing_args=["request", "response"])
|
||||
postSaveSSHConfigs = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start deletion of an SSH key.
|
||||
preDeleteSSHKey = Signal(providing_args=["request"])
|
||||
preDeleteSSHKey = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished deletion of an SSH key.
|
||||
postDeleteSSHKey = Signal(providing_args=["request", "response"])
|
||||
postDeleteSSHKey = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start adding an ssh key.
|
||||
preAddSSHKey = Signal(providing_args=["request"])
|
||||
preAddSSHKey = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core finished adding ssh key.
|
||||
postAddSSHKey = Signal(providing_args=["request", "response"])
|
||||
postAddSSHKey = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core load template for Mod Security Page.
|
||||
preLoadModSecurityHome = Signal(providing_args=["request"])
|
||||
preLoadModSecurityHome = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished loading template for Mod Security Page.
|
||||
postLoadModSecurityHome = Signal(providing_args=["request", "response"])
|
||||
postLoadModSecurityHome = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start saving ModSecurity configurations.
|
||||
preSaveModSecConfigurations = Signal(providing_args=["request"])
|
||||
preSaveModSecConfigurations = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is saving ModSecurity configurations.
|
||||
postSaveModSecConfigurations = Signal(providing_args=["request", "response"])
|
||||
postSaveModSecConfigurations = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start to load Mod Sec Rules Template Page.
|
||||
preModSecRules = Signal(providing_args=["request"])
|
||||
preModSecRules = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished loading Mod Sec Rules Template Page.
|
||||
postModSecRules = Signal(providing_args=["request", "response"])
|
||||
postModSecRules = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start saving custom Mod Sec rules.
|
||||
preSaveModSecRules = Signal(providing_args=["request"])
|
||||
preSaveModSecRules = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished saving custom Mod Sec rules.
|
||||
postSaveModSecRules = Signal(providing_args=["request", "response"])
|
||||
postSaveModSecRules = Signal()
|
||||
|
||||
|
||||
## This event is fired before CyberPanel core start to load template for Mod Sec rules packs.
|
||||
preModSecRulesPacks = Signal(providing_args=["request"])
|
||||
preModSecRulesPacks = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished loading template for Mod Sec rules packs.
|
||||
postModSecRulesPacks = Signal(providing_args=["request", "response"])
|
||||
postModSecRulesPacks = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core fetch status of Comodo or OWASP rules.
|
||||
preGetOWASPAndComodoStatus = Signal(providing_args=["request"])
|
||||
preGetOWASPAndComodoStatus = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished fetching status of Comodo or OWASP rules.
|
||||
postGetOWASPAndComodoStatus = Signal(providing_args=["request", "response"])
|
||||
postGetOWASPAndComodoStatus = Signal()
|
||||
|
||||
|
||||
## This event is fired before CyberPanel core start installing Comodo or OWASP rules.
|
||||
preInstallModSecRulesPack = Signal(providing_args=["request"])
|
||||
preInstallModSecRulesPack = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished installing Comodo or OWASP rules.
|
||||
postInstallModSecRulesPack = Signal(providing_args=["request", "response"])
|
||||
postInstallModSecRulesPack = Signal()
|
||||
|
||||
|
||||
## This event is fired before CyberPanel core fetch available rules file for Comodo or OWASP.
|
||||
preGetRulesFiles = Signal(providing_args=["request"])
|
||||
preGetRulesFiles = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished fetching available rules file for Comodo or OWASP.
|
||||
postGetRulesFiles = Signal(providing_args=["request", "response"])
|
||||
postGetRulesFiles = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start to enable or disable a rule file.
|
||||
preEnableDisableRuleFile = Signal(providing_args=["request"])
|
||||
preEnableDisableRuleFile = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished enabling or disabling a rule file.
|
||||
postEnableDisableRuleFile = Signal(providing_args=["request", "response"])
|
||||
postEnableDisableRuleFile = Signal()
|
||||
|
||||
|
||||
## This event is fired before CyberPanel core start to load template for CSF.
|
||||
preCSF = Signal(providing_args=["request"])
|
||||
preCSF = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished loading template for CSF.
|
||||
postCSF = Signal(providing_args=["request", "response"])
|
||||
postCSF = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start to enable/disable CSF firewall.
|
||||
preChangeStatus = Signal(providing_args=["request"])
|
||||
preChangeStatus = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished enabling/disabling CSF firewall.
|
||||
postChangeStatus = Signal(providing_args=["request", "response"])
|
||||
postChangeStatus = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start modifying CSF ports.
|
||||
preModifyPorts = Signal(providing_args=["request"])
|
||||
preModifyPorts = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished modifying CSF ports.
|
||||
postModifyPorts = Signal(providing_args=["request", "response"])
|
||||
postModifyPorts = Signal()
|
||||
|
||||
## This event is fired before CyberPanel core start modifying IPs.
|
||||
preModifyIPs = Signal(providing_args=["request"])
|
||||
preModifyIPs = Signal()
|
||||
|
||||
## This event is fired after CyberPanel core is finished modifying IPs.
|
||||
postModifyIPs = Signal(providing_args=["request", "response"])
|
||||
postModifyIPs = Signal()
|
||||
Reference in New Issue
Block a user