- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 1,173 for allow (0.18 sec)
-
src/main/java/jcifs/internal/dtyp/ACE.java
* with desired access bits <tt>0x00000003</tt> (<tt>FILE_READ_DATA | * FILE_WRITE_DATA</tt>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <tt>0x001200A9</tt> which doesn't have the
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 5.4K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
The following arguments are supported: * `allow_origins` - A list of origins that should be permitted to make cross-origin requests. E.g. `['https://example.org', 'https://www.example.org']`. You can use `['*']` to allow any origin. * `allow_origin_regex` - A regex string to match against origins that should be permitted to make cross-origin requests. e.g. `'https://.*\.example\.org'`.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sun Nov 13 20:28:37 GMT 2022 - 5.1K bytes - Viewed (0) -
manifests/charts/istio-cni/README.md
#### Calico For Calico, you must also modify the settings to allow source spoofing: - if deployed by operator, `kubectl patch felixconfigurations default --type='json' -p='[{"op": "add", "path": "/spec/workloadSourceSpoofing", "value": "Any"}]'` - if deployed by manifest, add env `FELIX_WORKLOADSOURCESPOOFING` with value `Any` in `spec.template.spec.containers.env` for daemonset `calico-node`. (This will allow PODs with specified annotation to skip the rpf check. )
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Jan 10 05:10:03 GMT 2024 - 2.5K bytes - Viewed (0) -
docs/multi-user/README.md
``` { "Version": "2012-10-17", "Statement": [ { "Action": ["s3:ListBucket"], "Effect": "Allow", "Resource": ["arn:aws:s3:::mybucket"], "Condition": {"StringLike": {"s3:prefix": ["${aws:username}/*"]}} }, { "Action": [ "s3:GetObject", "s3:PutObject" ], "Effect": "Allow", "Resource": ["arn:aws:s3:::mybucket/${aws:username}/*"] } ] } ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Mar 21 06:38:06 GMT 2023 - 8K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/spnego/SpnegoAuthenticator.java
protected static final String SPNEGO_ALLOW_DELEGATION = "spnego.allow.delegation"; protected static final String SPNEGO_ALLOW_LOCALHOST = "spnego.allow.localhost"; protected static final String SPNEGO_PROMPT_NTLM = "spnego.prompt.ntlm"; protected static final String SPNEGO_ALLOW_UNSECURE_BASIC = "spnego.allow.unsecure.basic"; protected static final String SPNEGO_ALLOW_BASIC = "spnego.allow.basic";
Java - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Feb 22 01:37:57 GMT 2024 - 11.2K bytes - Viewed (0) -
docs/iam/opa.md
In another terminal, create a policy that allows root user all access and for all other users denies `PutObject`: ```sh cat > example.rego <<EOF package httpapi.authz import input default allow = false # Allow the root user to perform any action. allow { input.owner == true } # All other users may do anything other than call PutObject allow { input.action != "s3:PutObject" input.owner == false
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Jul 17 15:43:14 GMT 2022 - 2.3K bytes - Viewed (0) -
internal/config/policy/opa/config.go
// form http://localhost:8181/v1/data/httpapi/authz type opaResultAllow struct { Result struct { Allow bool `json:"allow"` } `json:"result"` } // Handle simpler OPA responses when OPA URL is of // form http://localhost:8181/v1/data/httpapi/authz/allow type opaResult struct { Result bool `json:"result"` } respBody := bytes.NewReader(opaRespBytes)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 14 21:50:16 GMT 2023 - 5.2K bytes - Viewed (1) -
maven-core/src/main/java/org/apache/maven/AbstractMavenLifecycleParticipant.java
* @since 3.0-alpha-3 */ public abstract class AbstractMavenLifecycleParticipant { /** * Invoked after all MavenProject instances have been created. * * This callback is intended to allow extensions to manipulate MavenProjects * before they are sorted and actual build execution starts. * * @param session the Maven session * @throws MavenExecutionException in case of issue */
Java - Registered: Sun May 05 03:35:11 GMT 2024 - Last Modified: Tue Nov 22 13:26:01 GMT 2022 - 2.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/cors/CorsHandler.java
protected static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; protected static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; protected static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; protected static final String ACCESS_CONTROL_ALLOW_PRIVATE_NETWORK = "Access-Control-Allow-Private-Network";
Java - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Feb 22 01:37:57 GMT 2024 - 1.4K bytes - Viewed (0) -
.github/workflows/latest-changes.yml
Others - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Jan 09 14:57:33 GMT 2024 - 1.4K bytes - Viewed (0)