GET https://kbin.spritesserver.nl/index.php/u/@nirogu@vivaldi.net/posts/active

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
7.61 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.08 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\Post {#2084
  +user: App\Entity\User {#265 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +image: null
  +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
  +body: """
    Run command as not-root\n
    \n
    Hi everyone\n
    \n
    At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
    \n
    Does anyone know how to do it? Thanks in advance!\n
    \n
    @linux@lemmy.ml
    """
  +lang: "en"
  +commentCount: 30
  +favouriteCount: 36
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699069034 {#1407
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#1906 …}
  +votes: Doctrine\ORM\PersistentCollection {#1926 …}
  +reports: Doctrine\ORM\PersistentCollection {#1874 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
  +children: []
  -id: 286
  -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699037071
  +visibility: "visible             "
  +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698950671 {#2385
    date: 2023-11-02 19:44:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\Post {#2084
  +user: App\Entity\User {#265 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +image: null
  +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
  +body: """
    Run command as not-root\n
    \n
    Hi everyone\n
    \n
    At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
    \n
    Does anyone know how to do it? Thanks in advance!\n
    \n
    @linux@lemmy.ml
    """
  +lang: "en"
  +commentCount: 30
  +favouriteCount: 36
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699069034 {#1407
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#1906 …}
  +votes: Doctrine\ORM\PersistentCollection {#1926 …}
  +reports: Doctrine\ORM\PersistentCollection {#1874 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
  +children: []
  -id: 286
  -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699037071
  +visibility: "visible             "
  +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698950671 {#2385
    date: 2023-11-02 19:44:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\Post {#2084
  +user: App\Entity\User {#265 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +image: null
  +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
  +body: """
    Run command as not-root\n
    \n
    Hi everyone\n
    \n
    At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
    \n
    Does anyone know how to do it? Thanks in advance!\n
    \n
    @linux@lemmy.ml
    """
  +lang: "en"
  +commentCount: 30
  +favouriteCount: 36
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1699069034 {#1407
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
  ]
  +comments: Doctrine\ORM\PersistentCollection {#1906 …}
  +votes: Doctrine\ORM\PersistentCollection {#1926 …}
  +reports: Doctrine\ORM\PersistentCollection {#1874 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
  +children: []
  -id: 286
  -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699037071
  +visibility: "visible             "
  +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
  +editedAt: null
  +createdAt: DateTimeImmutable @1698950671 {#2385
    date: 2023-11-02 19:44:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS DENIED
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\PostComment {#3716
  +user: Proxies\__CG__\App\Entity\User {#3547 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3686 …}
  +root: App\Entity\PostComment {#3563 …}
  +image: null
  +body: """
    It’s not that an Amazon instance can be a docker container. It was more that the behavior you are describing is extremely odd for a full Linux environment but normal for a docker container.\n
    \n
    If you created the instance, it isn’t likely a container. But it also sounds like the base image might be poorly set up
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1699031117 {#3714
    date: 2023-11-03 18:05:17.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@ursakhiin@beehaw.org"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3717 …}
  +nested: Doctrine\ORM\PersistentCollection {#3719 …}
  +votes: Doctrine\ORM\PersistentCollection {#3721 …}
  +reports: Doctrine\ORM\PersistentCollection {#3723 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3725 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3727 …}
  -id: 634
  -bodyTs: "'also':49 'amazon':6 'base':53 'behavior':18 'contain':12,35,46 'creat':38 'describ':21 'docker':11,34 'environ':29 'extrem':23 'full':27 'imag':54 'instanc':7,40 'isn':42 'like':44,51 'linux':28 'might':55 'normal':31 'odd':24 'poor':57 'set':58 'sound':50"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1556211"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699031117 {#3715
    date: 2023-11-03 18:05:17.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\PostComment {#3716
  +user: Proxies\__CG__\App\Entity\User {#3547 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3686 …}
  +root: App\Entity\PostComment {#3563 …}
  +image: null
  +body: """
    It’s not that an Amazon instance can be a docker container. It was more that the behavior you are describing is extremely odd for a full Linux environment but normal for a docker container.\n
    \n
    If you created the instance, it isn’t likely a container. But it also sounds like the base image might be poorly set up
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1699031117 {#3714
    date: 2023-11-03 18:05:17.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@ursakhiin@beehaw.org"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3717 …}
  +nested: Doctrine\ORM\PersistentCollection {#3719 …}
  +votes: Doctrine\ORM\PersistentCollection {#3721 …}
  +reports: Doctrine\ORM\PersistentCollection {#3723 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3725 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3727 …}
  -id: 634
  -bodyTs: "'also':49 'amazon':6 'base':53 'behavior':18 'contain':12,35,46 'creat':38 'describ':21 'docker':11,34 'environ':29 'extrem':23 'full':27 'imag':54 'instanc':7,40 'isn':42 'like':44,51 'linux':28 'might':55 'normal':31 'odd':24 'poor':57 'set':58 'sound':50"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1556211"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699031117 {#3715
    date: 2023-11-03 18:05:17.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\PostComment {#3716
  +user: Proxies\__CG__\App\Entity\User {#3547 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3686 …}
  +root: App\Entity\PostComment {#3563 …}
  +image: null
  +body: """
    It’s not that an Amazon instance can be a docker container. It was more that the behavior you are describing is extremely odd for a full Linux environment but normal for a docker container.\n
    \n
    If you created the instance, it isn’t likely a container. But it also sounds like the base image might be poorly set up
    """
  +lang: "en"
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1699031117 {#3714
    date: 2023-11-03 18:05:17.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@ursakhiin@beehaw.org"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3717 …}
  +nested: Doctrine\ORM\PersistentCollection {#3719 …}
  +votes: Doctrine\ORM\PersistentCollection {#3721 …}
  +reports: Doctrine\ORM\PersistentCollection {#3723 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3725 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3727 …}
  -id: 634
  -bodyTs: "'also':49 'amazon':6 'base':53 'behavior':18 'contain':12,35,46 'creat':38 'describ':21 'docker':11,34 'environ':29 'extrem':23 'full':27 'imag':54 'instanc':7,40 'isn':42 'like':44,51 'linux':28 'might':55 'normal':31 'odd':24 'poor':57 'set':58 'sound':50"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1556211"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699031117 {#3715
    date: 2023-11-03 18:05:17.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED moderate
App\Entity\PostComment {#3731
  +user: Proxies\__CG__\App\Entity\User {#3656 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3701 …}
  +root: App\Entity\PostComment {#3254 …}
  +image: null
  +body: "You’ll thank yourself for it later. Things like this take a little longer up front but putting them off has a way of making you have to work around it again and again until, when you get around to correcting it, it takes far more time to undo the workarounds than it would’ve taken to correct it the first time."
  +lang: "en"
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1699069034 {#3729
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@astray@lemm.ee"
    "@elscallr@lemmy.world"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3732 …}
  +nested: Doctrine\ORM\PersistentCollection {#3734 …}
  +votes: Doctrine\ORM\PersistentCollection {#3736 …}
  +reports: Doctrine\ORM\PersistentCollection {#3738 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3740 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3742 …}
  -id: 636
  -bodyTs: "'around':30,39 'correct':41,58 'far':45 'first':61 'front':16 'get':38 'later':7 'like':9 'littl':13 'll':2 'longer':14 'make':25 'put':18 'take':11,44 'taken':56 'thank':3 'thing':8 'time':47,62 'undo':49 've':55 'way':23 'work':29 'workaround':51 'would':54"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/5050298"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699069034 {#3730
    date: 2023-11-04 04:37:14.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
11 DENIED edit
App\Entity\PostComment {#3731
  +user: Proxies\__CG__\App\Entity\User {#3656 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3701 …}
  +root: App\Entity\PostComment {#3254 …}
  +image: null
  +body: "You’ll thank yourself for it later. Things like this take a little longer up front but putting them off has a way of making you have to work around it again and again until, when you get around to correcting it, it takes far more time to undo the workarounds than it would’ve taken to correct it the first time."
  +lang: "en"
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1699069034 {#3729
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@astray@lemm.ee"
    "@elscallr@lemmy.world"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3732 …}
  +nested: Doctrine\ORM\PersistentCollection {#3734 …}
  +votes: Doctrine\ORM\PersistentCollection {#3736 …}
  +reports: Doctrine\ORM\PersistentCollection {#3738 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3740 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3742 …}
  -id: 636
  -bodyTs: "'around':30,39 'correct':41,58 'far':45 'first':61 'front':16 'get':38 'later':7 'like':9 'littl':13 'll':2 'longer':14 'make':25 'put':18 'take':11,44 'taken':56 'thank':3 'thing':8 'time':47,62 'undo':49 've':55 'way':23 'work':29 'workaround':51 'would':54"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/5050298"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699069034 {#3730
    date: 2023-11-04 04:37:14.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
12 DENIED moderate
App\Entity\PostComment {#3731
  +user: Proxies\__CG__\App\Entity\User {#3656 …}
  +post: App\Entity\Post {#2084
    +user: App\Entity\User {#265 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
    +image: null
    +slug: "Run-command-as-not-root-Hi-everyone-At-work-I-have"
    +body: """
      Run command as not-root\n
      \n
      Hi everyone\n
      \n
      At work, I have to run a command in an AWS instance. In that particular instance only exists the root user. The command should not be executed with root privileges (it executes mpirun, which is not recommended to run as sudo or the machine might break), so I was wondering if there is a way to block or disable the sudo privileges while the command is running. As mentioned, the only user existing there is root, so I suppose "sudo -u" is not an option.\n
      \n
      Does anyone know how to do it? Thanks in advance!\n
      \n
      @linux@lemmy.ml
      """
    +lang: "en"
    +commentCount: 30
    +favouriteCount: 36
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1699069034 {#1407
      date: 2023-11-04 04:37:14.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@linux@lemmy.ml"
    ]
    +comments: Doctrine\ORM\PersistentCollection {#1906 …}
    +votes: Doctrine\ORM\PersistentCollection {#1926 …}
    +reports: Doctrine\ORM\PersistentCollection {#1874 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2025 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2026 …}
    +children: []
    -id: 286
    -bodyTs: "'advanc':103 'anyon':95 'aw':19 'block':65 'break':54 'command':2,16,31,73 'disabl':67 'everyon':8 'execut':35,40 'exist':26,81 'hi':7 'instanc':20,24 'know':96 'linux@lemmy.ml':104 'machin':52 'mention':77 'might':53 'mpirun':41 'not-root':4 'option':93 'particular':23 'privileg':38,70 'recommend':45 'root':6,28,37,84 'run':1,14,47,75 'sudo':49,69,88 'suppos':87 'thank':101 'u':89 'user':29,80 'way':63 'wonder':58 'work':10"
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699037071
    +visibility: "visible             "
    +apId: "https://social.vivaldi.net/users/nirogu/statuses/111342431186356628"
    +editedAt: null
    +createdAt: DateTimeImmutable @1698950671 {#2385
      date: 2023-11-02 19:44:31.0 +01:00
    }
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1910 …}
  +parent: App\Entity\PostComment {#3701 …}
  +root: App\Entity\PostComment {#3254 …}
  +image: null
  +body: "You’ll thank yourself for it later. Things like this take a little longer up front but putting them off has a way of making you have to work around it again and again until, when you get around to correcting it, it takes far more time to undo the workarounds than it would’ve taken to correct it the first time."
  +lang: "en"
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1699069034 {#3729
    date: 2023-11-04 04:37:14.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@linux@lemmy.ml"
    "@nirogu@vivaldi.net"
    "@astray@lemm.ee"
    "@elscallr@lemmy.world"
  ]
  +isAdult: false
  +updateMark: false
  +children: Doctrine\ORM\PersistentCollection {#3732 …}
  +nested: Doctrine\ORM\PersistentCollection {#3734 …}
  +votes: Doctrine\ORM\PersistentCollection {#3736 …}
  +reports: Doctrine\ORM\PersistentCollection {#3738 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3740 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3742 …}
  -id: 636
  -bodyTs: "'around':30,39 'correct':41,58 'far':45 'first':61 'front':16 'get':38 'later':7 'like':9 'littl':13 'll':2 'longer':14 'make':25 'put':18 'take':11,44 'taken':56 'thank':3 'thing':8 'time':47,62 'undo':49 've':55 'way':23 'work':29 'workaround':51 'would':54"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.world/comment/5050298"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699069034 {#3730
    date: 2023-11-04 04:37:14.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS DENIED
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details