- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 397 for xroles (0.05 sec)
-
fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml
<glob pattern="*.xcat"/> <glob pattern="*.xegrm"/> <glob pattern="*.xgrm"/> <glob pattern="*.xlex"/> <glob pattern="*.xlog"/> <glob pattern="*.xmap"/> <glob pattern="*.xroles"/> <glob pattern="*.xsamples"/> <glob pattern="*.xsp"/> <glob pattern="*.xtest"/> <glob pattern="*.xweb"/> <glob pattern="*.xwelcome"/> </mime-type>
Registered: Sun Nov 10 03:50:12 UTC 2024 - Last Modified: Thu Sep 21 06:46:43 UTC 2023 - 298.5K bytes - Viewed (0) -
cni/pkg/iptables/testdata/hostprobe_ipv6.golden
* nat -N ISTIO_POSTRT -A POSTROUTING -j ISTIO_POSTRT -A ISTIO_POSTRT -m owner --socket-exists -p tcp -m set --match-set istio-inpod-probes-v4 dst -j SNAT --to-source 169.254.7.127 COMMIT * nat -N ISTIO_POSTRT -A POSTROUTING -j ISTIO_POSTRT -A ISTIO_POSTRT -m owner --socket-exists -p tcp -m set --match-set istio-inpod-probes-v6 dst -j SNAT --to-source fd16:9254:7127:1337:ffff:ffff:ffff:ffff
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 399 bytes - Viewed (0) -
src/main/webapp/WEB-INF/view/admin/user/admin_user_details.jsp
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 13 07:47:04 UTC 2020 - 17.8K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
If you want to secure your API, there are several better things you can do, for example: * Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon Oct 28 11:21:54 UTC 2024 - 2.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/es/log/cbean/cq/bs/BsSearchLogCQ.java
public void setRoles_Equal(String roles) { setRoles_Term(roles, null); } public void setRoles_Equal(String roles, ConditionOptionCall<TermQueryBuilder> opLambda) { setRoles_Term(roles, opLambda); } public void setRoles_Term(String roles) { setRoles_Term(roles, null); } public void setRoles_Term(String roles, ConditionOptionCall<TermQueryBuilder> opLambda) {
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:37:57 UTC 2024 - 145.4K bytes - Viewed (0) -
src/main/resources/fess_config.properties
authentication.admin.users=admin authentication.admin.roles=admin role.search.default.permissions= role.search.default.display.permissions={role}guest role.search.guest.permissions={role}guest role.search.user.prefix=1 role.search.group.prefix=2 role.search.role.prefix=R role.search.denied.prefix=D # ----------------------------------------------------------
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Tue Oct 01 14:13:38 UTC 2024 - 30.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/es/user/exentity/User.java
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:37:57 UTC 2024 - 3.8K bytes - Viewed (0) -
cni/pkg/iptables/testdata/hostprobe.golden
* nat -N ISTIO_POSTRT -A POSTROUTING -j ISTIO_POSTRT -A ISTIO_POSTRT -m owner --socket-exists -p tcp -m set --match-set istio-inpod-probes-v4 dst -j SNAT --to-source 169.254.7.127
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 186 bytes - Viewed (0) -
internal/http/dial_linux.go
// The time (in seconds) the connection needs to remain idle before // TCP starts sending keepalive probes _ = syscall.SetsockoptInt(fd, syscall.IPPROTO_TCP, syscall.TCP_KEEPIDLE, 15) // Number of probes. // ~ cat /proc/sys/net/ipv4/tcp_keepalive_probes (defaults to 9, we reduce it to 5) _ = syscall.SetsockoptInt(fd, syscall.IPPROTO_TCP, syscall.TCP_KEEPCNT, 5)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jul 23 10:53:03 UTC 2024 - 5K bytes - Viewed (0) -
docs/bucket/replication/README.md
`existing-objects` as a value to `--replicate` flag while adding or editing a replication rule. Once existing object replication is enabled, all objects or object prefixes that satisfy the replication rules and were created prior to adding replication configuration OR while replication rules were disabled will be synced to the target cluster. Depending on the number of previously existing objects, the existing objects that are now eligible to be replicated will eventually be synced to the target...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jan 24 23:46:33 UTC 2023 - 18.2K bytes - Viewed (0)