- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 248 for Allow (0.02 sec)
-
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_wildcard.txt
Disallow: /admin/*.php Disallow: /*/private/ Allow: /public/*.html # Test end-of-path ($) patterns User-agent: EndPathBot Disallow: /fish$ Disallow: /temp$ Allow: /fishing # Test complex patterns User-agent: ComplexBot Disallow: / Allow: /$ Allow: /index.html$ Allow: /public/ # Test priority rules (longer match wins) User-agent: PriorityBot Disallow: /store Allow: /store/public Disallow: /store/public/sale
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Nov 13 14:03:41 UTC 2025 - 910 bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_malformed.txt
Allow: # empty value # Case 3: Multiple colons in directive User-agent: MultiColonBot Disallow: http://example.com:8080/path Allow: /path:with:colons # Case 4: Extra whitespace User-agent: ExtraSpaceBot Disallow: /spaced/ Allow: /also-spaced/ # Case 5: Mixed case directives (should still work) UsEr-AgEnT: MixedCaseBot DiSaLlOw: /test1/ AlLoW: /test2/ CrAwL-dElAy: 2 SiTeMaP: http://example.com/sitemap.xml
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Fri Nov 14 12:52:01 UTC 2025 - 2.6K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
fess-crawler/src/test/java/org/codelibs/fess/crawler/helper/RobotsTxtHelperTest.java
// Disallow: /temp$ but Allow: /fishing assertFalse(robotsTxt.allows("/temp", "EndPathBot")); assertTrue(robotsTxt.allows("/temporary", "EndPathBot")); assertTrue(robotsTxt.allows("/fishing", "EndPathBot")); // Test ComplexBot - complex patterns // Disallow: / but Allow: /$ (only root), Allow: /index.html$, Allow: /public/Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 20.6K bytes - Viewed (0) -
docs/multi-user/README.md
``` { "Version": "2012-10-17", "Statement": [ { "Action": ["s3:ListBucket"], "Effect": "Allow", "Resource": ["arn:aws:s3:::mybucket"], "Condition": {"StringLike": {"s3:prefix": ["${aws:username}/*"]}} }, { "Action": [ "s3:GetObject", "s3:PutObject" ], "Effect": "Allow", "Resource": ["arn:aws:s3:::mybucket/${aws:username}/*"] } ] } ```Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.2K bytes - Viewed (0) -
tests/test_tutorial/test_cors/test_tutorial001.py
assert response.status_code == 200, response.text assert response.text == "OK" assert ( response.headers["access-control-allow-origin"] == "https://localhost.tiangolo.com" ) assert response.headers["access-control-allow-headers"] == "X-Example" # Test standard response headers = {"Origin": "https://localhost.tiangolo.com"} response = client.get("/", headers=headers)Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 1.3K bytes - Viewed (0) -
ci/official/utilities/setup_docker.sh
"$TFCI_DOCKER_IMAGE" \ bash if [[ "$is_windows" == true ]]; then # Allow requests from the container. # Additional setup is contained in ci/official/envs/rbe. CONTAINER_IP_ADDR=$(docker inspect -f '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' tf) netsh advfirewall firewall add rule name="Allow Metadata Proxy" dir=in action=allow protocol=TCP localport=80 remoteip="$CONTAINER_IP_ADDR"Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Thu Nov 20 17:33:55 UTC 2025 - 2.9K bytes - Viewed (0) -
tests/test_forms_single_model.py
class FormModelExtraAllow(BaseModel): param: str model_config = {"extra": "allow"} @app.post("/form/") def post_form(user: Annotated[FormModel, Form()]): return user @app.post("/form-extra-allow/") def post_form_extra_allow(params: Annotated[FormModelExtraAllow, Form()]): return params client = TestClient(app)
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 18:19:10 UTC 2025 - 3.4K bytes - Viewed (0) -
internal/config/policy/plugin/config.go
// form http://localhost:8181/v1/data/httpapi/authz type opaResultAllow struct { Result struct { Allow bool `json:"allow"` } `json:"result"` } // Handle simpler OPA responses when OPA URL is of // form http://localhost:8181/v1/data/httpapi/authz/allow type opaResult struct { Result bool `json:"result"` } respBody := bytes.NewReader(opaRespBytes)Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.8K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/RobotsTxt.java
* Checks if the given path is allowed according to this directive. * According to RFC 9309: * 1. Find the longest matching pattern (by priority length) * 2. If both Allow and Disallow patterns match with the same length, Allow takes precedence * 3. If no pattern matches, the path is allowed by default * * @param path the path to checkRegistered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 18.5K bytes - Viewed (0)