- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 864 for allow (0.12 sec)
-
fess-crawler/src/test/java/org/codelibs/fess/crawler/helper/RobotsTxtHelperTest.java
// Disallow: / but Allow: /$ (only root), Allow: /index.html$, Allow: /public/ assertFalse(robotsTxt.allows("/about", "ComplexBot")); assertTrue(robotsTxt.allows("/", "ComplexBot")); // Allow: /$ assertTrue(robotsTxt.allows("/index.html", "ComplexBot")); // Allow: /index.html$ assertFalse(robotsTxt.allows("/index.html?page=1", "ComplexBot")); // $ means exact endRegistered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 20.6K bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_wildcard.txt
Disallow: /admin/*.php Disallow: /*/private/ Allow: /public/*.html # Test end-of-path ($) patterns User-agent: EndPathBot Disallow: /fish$ Disallow: /temp$ Allow: /fishing # Test complex patterns User-agent: ComplexBot Disallow: / Allow: /$ Allow: /index.html$ Allow: /public/ # Test priority rules (longer match wins) User-agent: PriorityBot Disallow: /store Allow: /store/public Disallow: /store/public/sale
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Nov 13 14:03:41 UTC 2025 - 910 bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots.txt
User-agent: FessCrawler Disallow: # allows all User-agent: BruteBot Disallow: / Allow: /foo/bar/ Crawl-delay: 1314000 # welcome! User-agent: Googlebot Crawl-delay: 1 User-agent: * Disallow: /private/ Disallow: /help # disallows /help.html, /help/index.html, etc. Allow: /help/faq.html Crawl-delay: 3 User-agent: Crawler Disallow: /aaa User-agent: Crawler/1.0 Disallow: /bbb
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Sun Oct 11 02:16:55 UTC 2015 - 566 bytes - Viewed (0) -
docs/iam/opa.md
In another terminal, create a policy that allows root user all access and for all other users denies `PutObject`: ```sh cat > example.rego <<EOF package httpapi.authz import input default allow = false # Allow the root user to perform any action. allow { input.owner == true } # All other users may do anything other than call PutObject allow { input.action != "s3:PutObject" input.owner == false
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jul 17 15:43:14 UTC 2022 - 2.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: * * <pre> * Allow WNET\alice 0x001200A9 Direct * Allow Administrators 0x001F01FF Inherited * Allow SYSTEM 0x001F01FF Inherited * </pre> * * the access check would fail because the direct ACE has an access mask * of <code>0x001200A9</code> which doesn't have the
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
fess-crawler/src/test/resources/org/codelibs/fess/crawler/helper/robots_malformed.txt
Allow: # empty value # Case 3: Multiple colons in directive User-agent: MultiColonBot Disallow: http://example.com:8080/path Allow: /path:with:colons # Case 4: Extra whitespace User-agent: ExtraSpaceBot Disallow: /spaced/ Allow: /also-spaced/ # Case 5: Mixed case directives (should still work) UsEr-AgEnT: MixedCaseBot DiSaLlOw: /test1/ AlLoW: /test2/ CrAwL-dElAy: 2 SiTeMaP: http://example.com/sitemap.xml
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Fri Nov 14 12:52:01 UTC 2025 - 2.6K bytes - Viewed (0) -
docs/distributed/samples/myminio-iam-info-openid.zip
iam-assets/policies.json {"consoleAdmin":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:*"]},{"Effect":"Allow","Action":["kms:*"]},{"Effect":"Allow","Action":["s3:*"],"Resource":["arn:aws:s3:::*"]}]},diagnostics":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:TopLocksInfo","admin:BandwidthMonitor","admin:ConsoleLog","admin:OBDInfo","admin:Profiling","admin:Prometheus","admin:ServerInfo","admin:ServerTrace"],"Resource":["arn:aws:s3:::*"]}]},rea...Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 2K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/RobotsTxt.java
* 2. If both Allow and Disallow patterns match with the same length, Allow takes precedence * 3. If no pattern matches, the path is allowed by default * * @param path the path to check * @return true if the path is allowed, false otherwise */ public boolean allows(final String path) { PathPattern longestAllowMatch = null;Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 18.5K bytes - Viewed (0) -
docs/en/docs/tutorial/cors.md
* `allow_origin_regex` - A regex string to match against origins that should be permitted to make cross-origin requests. e.g. `'https://.*\.example\.org'`. * `allow_methods` - A list of HTTP methods that should be allowed for cross-origin requests. Defaults to `['GET']`. You can use `['*']` to allow all standard methods.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 5.5K bytes - Viewed (0) -
docs/site-replication/rw.json
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Dec 08 19:50:15 UTC 2021 - 146 bytes - Viewed (0)