- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 398 for allow (1.02 sec)
-
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_wildcard.txt
Disallow: /admin/*.php Disallow: /*/private/ Allow: /public/*.html # Test end-of-path ($) patterns User-agent: EndPathBot Disallow: /fish$ Disallow: /temp$ Allow: /fishing # Test complex patterns User-agent: ComplexBot Disallow: / Allow: /$ Allow: /index.html$ Allow: /public/ # Test priority rules (longer match wins) User-agent: PriorityBot Disallow: /store Allow: /store/public Disallow: /store/public/sale
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Nov 13 14:03:41 UTC 2025 - 910 bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots.txt
User-agent: FessCrawler Disallow: # allows all User-agent: BruteBot Disallow: / Allow: /foo/bar/ Crawl-delay: 1314000 # welcome! User-agent: Googlebot Crawl-delay: 1 User-agent: * Disallow: /private/ Disallow: /help # disallows /help.html, /help/index.html, etc. Allow: /help/faq.html Crawl-delay: 3 User-agent: Crawler Disallow: /aaa User-agent: Crawler/1.0 Disallow: /bbb
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Sun Oct 11 02:16:55 UTC 2015 - 566 bytes - Viewed (0) -
docs/iam/opa.md
In another terminal, create a policy that allows root user all access and for all other users denies `PutObject`: ```sh cat > example.rego <<EOF package httpapi.authz import input default allow = false # Allow the root user to perform any action. allow { input.owner == true } # All other users may do anything other than call PutObject allow { input.action != "s3:PutObject" input.owner == false
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jul 17 15:43:14 UTC 2022 - 2.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_malformed.txt
Allow: # empty value # Case 3: Multiple colons in directive User-agent: MultiColonBot Disallow: http://example.com:8080/path Allow: /path:with:colons # Case 4: Extra whitespace User-agent: ExtraSpaceBot Disallow: /spaced/ Allow: /also-spaced/ # Case 5: Mixed case directives (should still work) UsEr-AgEnT: MixedCaseBot DiSaLlOw: /test1/ AlLoW: /test2/ CrAwL-dElAy: 2 SiTeMaP: http://example.com/sitemap.xml
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Fri Nov 14 12:52:01 UTC 2025 - 2.6K bytes - Viewed (0) -
docs/distributed/samples/myminio-iam-info-openid.zip
iam-assets/policies.json {"consoleAdmin":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:*"]},{"Effect":"Allow","Action":["kms:*"]},{"Effect":"Allow","Action":["s3:*"],"Resource":["arn:aws:s3:::*"]}]},diagnostics":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:TopLocksInfo","admin:BandwidthMonitor","admin:ConsoleLog","admin:OBDInfo","admin:Profiling","admin:Prometheus","admin:ServerInfo","admin:ServerTrace"],"Resource":["arn:aws:s3:::*"]}]},rea...Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 2K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
* `allow_origin_regex` - A regex string to match against origins that should be permitted to make cross-origin requests. e.g. `'https://.*\.example\.org'`. * `allow_methods` - A list of HTTP methods that should be allowed for cross-origin requests. Defaults to `['GET']`. You can use `['*']` to allow all standard methods.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 5.5K bytes - Viewed (0) -
docs/site-replication/rw.json
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Dec 08 19:50:15 UTC 2021 - 146 bytes - Viewed (0) -
src/main/java/org/codelibs/fess/cors/CorsHandler.java
/** * CORS header for specifying allowed headers. */ protected static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; /** * CORS header for specifying allowed HTTP methods. */ protected static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; /**Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 2.4K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0)