- Sort Score
- Num 10 results
- Language All
Results 1 - 5 of 5 for normalizePath (0.23 seconds)
-
src/main/java/org/codelibs/fess/helper/LabelTypeHelper.java
} else { buf.append(split); } final String normalizePath = systemHelper.normalizeConfigPath(path); if (StringUtil.isNotBlank(normalizePath)) { buf.append(normalizePath); } } this.includedPaths = Pattern.compile(buf.toString()); }Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 14.8K bytes - Click Count (0) -
src/main/java/jcifs/util/PathValidator.java
*/ public void addToBlacklist(String path) { blacklistedPaths.add(normalizePath(path).toLowerCase()); } /** * Add path to whitelist * * @param path path or pattern to whitelist */ public void addToWhitelist(String path) { whitelistedPaths.add(normalizePath(path).toLowerCase()); } /** * Check if path is blacklisted */Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 14.5K bytes - Click Count (0) -
src/test/java/jcifs/util/PathValidatorTest.java
String normalizedPath = noUncValidator.validatePath("\\\\\\\\server\\\\\\\\share"); assertEquals("\\server\\share", normalizedPath); normalizedPath = noUncValidator.validatePath("////server//share"); assertEquals("\\server\\share", normalizedPath); // To properly test UNC rejection, we would need to fix the normalization logic
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 14.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/app/web/base/FessAdminAction.java
throw new IllegalArgumentException("File path cannot be blank."); } try { final Path filePath = Paths.get(path).normalize(); final String normalizedPath = filePath.toString(); if (normalizedPath.contains("..")) { throw new IllegalArgumentException("Invalid file path: path=" + path); } final File file = filePath.toFile();
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 19 13:57:12 GMT 2026 - 10.9K bytes - Click Count (0) -
src/main/java/org/codelibs/core/io/FileUtil.java
assertArgumentNotNull("pathToCheck", pathToCheck); assertArgumentNotNull("baseDirectory", baseDirectory); final Path normalizedPath = pathToCheck.toAbsolutePath().normalize(); final Path normalizedBase = baseDirectory.toAbsolutePath().normalize(); return normalizedPath.startsWith(normalizedBase); } /** * Validates that a given file is safe and does not attempt path traversal attacks.
Created: Fri Apr 03 20:58:12 GMT 2026 - Last Modified: Thu Feb 12 12:10:45 GMT 2026 - 13.2K bytes - Click Count (0)