- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 128 for allow (0.02 sec)
-
fess-crawler/src/test/java/org/codelibs/fess/crawler/helper/RobotsTxtHelperTest.java
// Disallow: / but Allow: /$ (only root), Allow: /index.html$, Allow: /public/ assertFalse(robotsTxt.allows("/about", "ComplexBot")); assertTrue(robotsTxt.allows("/", "ComplexBot")); // Allow: /$ assertTrue(robotsTxt.allows("/index.html", "ComplexBot")); // Allow: /index.html$ assertFalse(robotsTxt.allows("/index.html?page=1", "ComplexBot")); // $ means exact endRegistered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 20.6K bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_wildcard.txt
Disallow: /admin/*.php Disallow: /*/private/ Allow: /public/*.html # Test end-of-path ($) patterns User-agent: EndPathBot Disallow: /fish$ Disallow: /temp$ Allow: /fishing # Test complex patterns User-agent: ComplexBot Disallow: / Allow: /$ Allow: /index.html$ Allow: /public/ # Test priority rules (longer match wins) User-agent: PriorityBot Disallow: /store Allow: /store/public Disallow: /store/public/sale
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Nov 13 14:03:41 UTC 2025 - 910 bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_malformed.txt
Allow: # empty value # Case 3: Multiple colons in directive User-agent: MultiColonBot Disallow: http://example.com:8080/path Allow: /path:with:colons # Case 4: Extra whitespace User-agent: ExtraSpaceBot Disallow: /spaced/ Allow: /also-spaced/ # Case 5: Mixed case directives (should still work) UsEr-AgEnT: MixedCaseBot DiSaLlOw: /test1/ AlLoW: /test2/ CrAwL-dElAy: 2 SiTeMaP: http://example.com/sitemap.xml
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Fri Nov 14 12:52:01 UTC 2025 - 2.6K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/RobotsTxt.java
* 2. If both Allow and Disallow patterns match with the same length, Allow takes precedence * 3. If no pattern matches, the path is allowed by default * * @param path the path to check * @return true if the path is allowed, false otherwise */ public boolean allows(final String path) { PathPattern longestAllowMatch = null;Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 18.5K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
* `allow_origin_regex` - A regex string to match against origins that should be permitted to make cross-origin requests. e.g. `'https://.*\.example\.org'`. * `allow_methods` - A list of HTTP methods that should be allowed for cross-origin requests. Defaults to `['GET']`. You can use `['*']` to allow all standard methods.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 5.5K bytes - Viewed (0) -
tests/test_tutorial/test_cors/test_tutorial001.py
assert response.status_code == 200, response.text assert response.text == "OK" assert ( response.headers["access-control-allow-origin"] == "https://localhost.tiangolo.com" ) assert response.headers["access-control-allow-headers"] == "X-Example" # Test standard response headers = {"Origin": "https://localhost.tiangolo.com"} response = client.get("/", headers=headers)Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 1.3K bytes - Viewed (0) -
ci/official/utilities/setup_docker.sh
"$TFCI_DOCKER_IMAGE" \ bash if [[ "$is_windows" == true ]]; then # Allow requests from the container. # Additional setup is contained in ci/official/envs/rbe. CONTAINER_IP_ADDR=$(docker inspect -f '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' tf) netsh advfirewall firewall add rule name="Allow Metadata Proxy" dir=in action=allow protocol=TCP localport=80 remoteip="$CONTAINER_IP_ADDR"Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Thu Nov 20 17:33:55 UTC 2025 - 2.9K bytes - Viewed (0) -
tests/test_forms_single_model.py
class FormModelExtraAllow(BaseModel): param: str model_config = {"extra": "allow"} @app.post("/form/") def post_form(user: Annotated[FormModel, Form()]): return user @app.post("/form-extra-allow/") def post_form_extra_allow(params: Annotated[FormModelExtraAllow, Form()]): return params client = TestClient(app)
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 18:19:10 UTC 2025 - 3.4K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/helper/RobotsTxtHelper.java
* <li>Disallow and Allow directives with pattern matching</li> * <li>Wildcard (*) in paths - matches any sequence of characters</li> * <li>End-of-path ($) matching - matches the end of URL path</li> * <li>Crawl-delay directive</li> * <li>Sitemap directive</li> * <li>Comment support (#)</li> * <li>Priority-based matching (longest match wins, Allow beats Disallow at equal length)</li> * </ul> *
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Fri Nov 14 12:52:01 UTC 2025 - 11.4K bytes - Viewed (0) -
docs/en/docs/advanced/behind-a-proxy.md
/// ### Enable Proxy Forwarded Headers { #enable-proxy-forwarded-headers } You can start FastAPI CLI with the *CLI Option* `--forwarded-allow-ips` and pass the IP addresses that should be trusted to read those forwarded headers. If you set it to `--forwarded-allow-ips="*"` it would trust all the incoming IPs.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 16.4K bytes - Viewed (0)