$ cd /path/to/Dockerfile
$ sudo docker build .
View running processes
{0: 'tench, Tinca tinca', | |
1: 'goldfish, Carassius auratus', | |
2: 'great white shark, white shark, man-eater, man-eating shark, Carcharodon carcharias', | |
3: 'tiger shark, Galeocerdo cuvieri', | |
4: 'hammerhead, hammerhead shark', | |
5: 'electric ray, crampfish, numbfish, torpedo', | |
6: 'stingray', | |
7: 'cock', | |
8: 'hen', | |
9: 'ostrich, Struthio camelus', |
Type: bucket
{
Bucket policy is an access policy available for you to grant anonymous permissions to your Minio resources. Bucket policy uses JSON-based access policy language.
This section presents a few examples of typical use cases for bucket policies. To test these policies, you need to replace these strings with your bucket name. For more information please read Amazon S3 access policy language
The following example policy grants the s3:GetObject
permission to any public anonymous users. This permission allows anyone to read the object data under testbucket
, which is useful for when you have publicly readable assets. A typical example is website assets stored in testbucket
.
mkdir -p tests/libs | |
cd tests/libs | |
git submodule add [email protected]:bats-core/bats-core bats | |
git submodule add [email protected]:bats-core/bats-support bats-support | |
git submodule add [email protected]:bats-core/bats-assert bats-assert | |
# try the following three steps | |
git submodule update --init --recursive |