- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 990 for allow (0.02 seconds)
-
src/test/java/org/codelibs/fess/helper/PermissionHelperTest.java
assertEquals("1guest", permissionHelper.encode("(allow){user}guest")); assertEquals("Rguest", permissionHelper.encode("(allow){role}guest")); assertEquals("2guest", permissionHelper.encode("(allow){group}guest")); assertEquals("1guest", permissionHelper.encode("(allow){USER}guest")); assertEquals("Rguest", permissionHelper.encode("(allow){ROLE}guest"));
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 14K bytes - Click Count (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 5.6K bytes - Click Count (0) -
docs/distributed/samples/myminio-iam-info-openid.zip
iam-assets/policies.json {"consoleAdmin":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:*"]},{"Effect":"Allow","Action":["kms:*"]},{"Effect":"Allow","Action":["s3:*"],"Resource":["arn:aws:s3:::*"]}]},diagnostics":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:TopLocksInfo","admin:BandwidthMonitor","admin:ConsoleLog","admin:OBDInfo","admin:Profiling","admin:Prometheus","admin:ServerInfo","admin:ServerTrace"],"Resource":["arn:aws:s3:::*"]}]},rea...Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Sep 17 16:45:46 GMT 2024 - 2K bytes - Click Count (0) -
docs/iam/opa.md
In another terminal, create a policy that allows root user all access and for all other users denies `PutObject`: ```sh cat > example.rego <<EOF package httpapi.authz import input default allow = false # Allow the root user to perform any action. allow { input.owner == true } # All other users may do anything other than call PutObject allow { input.action != "s3:PutObject" input.owner == false
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Jul 17 15:43:14 GMT 2022 - 2.3K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/cors/CorsHandler.java
/** * CORS header for specifying allowed headers. */ protected static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; /** * CORS header for specifying allowed HTTP methods. */ protected static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; /**Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Jul 17 08:28:31 GMT 2025 - 2.4K bytes - Click Count (0) -
src/main/webapp/js/admin/plugins/form-validator/color.js
e:"hex",validatorFunction:function(a,b){if("true"===b.valAttr("allow-transparent")&&"transparent"===a)return!0;var c="#"===a[0];if(!c)return!1;var d=4===a.length||7===a.length;if(d){var e=/[0-9a-f]/i,f=a.slice(1).split(""),g=!0;return f.forEach(function(a){null===a.match(e)&&(g=!1)}),g}return!1},errorMessage:"",errorMessageKey:"badHex"}),a.formUtils.addValidator({name:"rgb",validatorFunction:function(a,b){if("true"===b.valAttr("allow-transparent")&&"transparent"===a)return!0;var c=a.replace(/ /g...
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Mon Jan 01 05:12:47 GMT 2018 - 2.8K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
.github/workflows/mint/nginx-1-node.conf
ip_hash; server minio1:9001; } server { listen 9000; listen [::]:9000; server_name localhost; # To allow special characters in headers ignore_invalid_headers off; # Allow any size file to be uploaded. # Set to a value such as 1000m; to restrict file size to a specific value client_max_body_size 0; # To disable bufferingCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Mar 31 21:38:10 GMT 2023 - 2.8K bytes - Click Count (1) -
docs/bucket/replication/setup_replication.sh
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 26 05:07:25 GMT 2023 - 2.6K bytes - Click Count (0) -
docs/resiliency/nginx.conf
server minio4:9001; } server { listen 9000; listen [::]:9000; server_name localhost; # To allow special characters in headers ignore_invalid_headers off; # Allow any size file to be uploaded. # Set to a value such as 1000m; to restrict file size to a specific value client_max_body_size 0; # To disable bufferingCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sat Dec 21 04:24:45 GMT 2024 - 3K bytes - Click Count (0)