1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\PostComment {#1435
+user: App\Entity\User {#264 …}
+post: Proxies\__CG__\App\Entity\Post {#1579
+user: Proxies\__CG__\App\Entity\User {#2858 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+image: null
+slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
+body: """
Run command as not-root\n
\n
Hi everyone\n
\n
At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
\n
Does anyone know how to do it? Thanks in advance!\n
\n
@linux@lemmy.ml
"""
+lang: "en"
+commentCount: 30
+favouriteCount: 36
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699069034 {#2779
date: 2023-11-04 04:37:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
]
+comments: Doctrine\ORM\PersistentCollection {#2857 …}
+votes: Doctrine\ORM\PersistentCollection {#2855 …}
+reports: Doctrine\ORM\PersistentCollection {#2853 …}
+favourites: Doctrine\ORM\PersistentCollection {#2821 …}
+notifications: Doctrine\ORM\PersistentCollection {#2825 …}
+children: [
App\Entity\PostComment {#1435}
]
-id: 286
-bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
+upVotes: 0
+downVotes: 0
+ranking: 1699037071
+visibility: "visible "
+apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
+editedAt: null
+createdAt: DateTimeImmutable @1698950671 {#2778
date: 2023-11-02 19:44:31.0 +01:00
}
+__isInitialized__: true
+"title": 286
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1568 …}
+parent: null
+root: null
+image: null
+body: "You probably want to run the command as `nobody`, the special system user who daemons become when they don’t want to have root permissions."
+lang: "en"
+favouriteCount: 22
+score: 0
+lastActive: DateTime @1698973705 {#1744
date: 2023-11-03 02:08:25.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@linux@lemmy.ml"
"@nirogu@vivaldi.net"
]
+isAdult: false
+updateMark: false
+children: Doctrine\ORM\PersistentCollection {#1560 …}
+nested: Doctrine\ORM\PersistentCollection {#1551 …}
+votes: Doctrine\ORM\PersistentCollection {#1585 …}
+reports: Doctrine\ORM\PersistentCollection {#1586 …}
+favourites: Doctrine\ORM\PersistentCollection {#1561 …}
+notifications: Doctrine\ORM\PersistentCollection {#1651 …}
-id: 622
-bodyTs: "'becom':16 'command':7 'daemon':15 'nobodi':9 'permiss':25 'probabl':2 'root':24 'run':5 'special':11 'system':12 'user':13 'want':3,21"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/5100757"
+editedAt: null
+createdAt: DateTimeImmutable @1698973705 {#1612
date: 2023-11-03 02:08:25.0 +01:00
}
+"title": 622
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_ADMIN
|
null |
|
Show voter details
|
10 |
DENIED
|
ROLE_MODERATOR
|
null |
|
Show voter details
|