Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 45 for evaluated (0.16 sec)

  1. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 5.4K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/imagepolicy/v1alpha1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the pod being evaluated
      optional ImageReviewSpec spec = 2;
    
      // Status is filled in by the backend and indicates whether the pod should be allowed.
      // +optional
      optional ImageReviewStatus status = 3;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  4. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 6.5K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/authentication/v1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the request being evaluated
      optional TokenRequestSpec spec = 2;
    
      // Status is filled in by the server and indicates whether the token can be authenticated.
      // +optional
      optional TokenRequestStatus status = 3;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 6.7K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 7.2K bytes
    - Viewed (0)
  7. src/cmd/asm/internal/asm/expr_test.go

    	for i, test := range exprTests {
    		p.start(lex.Tokenize(test.input))
    		result := int64(p.expr())
    		if result != test.output {
    			t.Errorf("%d: %q evaluated to %d; expected %d", i, test.input, result, test.output)
    		}
    		tok := p.next()
    		if test.atEOF && tok.ScanToken != scanner.EOF {
    			t.Errorf("%d: %q: at EOF got %s", i, test.input, tok)
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Aug 29 07:48:38 UTC 2023
    - 3.2K bytes
    - Viewed (0)
  8. ci/official/utilities/setup.sh

      # Assumes variables will resolve themselves correctly.
      set +u
      for env_file in ${TFCI//,/ }; do
        source "./ci/official/envs/$env_file"
      done
      set -u
      echo '==TFCI==: Evaluated the following TFCI variables from $TFCI:'
      export -p | grep TFCI
    
      # Load those stored pre-existing TFCI_ vars, if any
      if [[ -s "$FROM_ENV" ]]; then
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Aug 07 23:01:25 UTC 2024
    - 6K bytes
    - Viewed (0)
  9. docs/batch-jobs/README.md

    ## Batch Jobs Terminology
    
    ### Job
    A job is the basic unit of work for MinIO Batch Job. A job is a self describing YAML, once this YAML is submitted and evaluated - MinIO performs the requested actions on each of the objects obtained under the described criteria in job YAML file.
    
    ### Type
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 06 06:00:43 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  10. common-protos/k8s.io/api/authentication/v1beta1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the request being evaluated
      optional TokenReviewSpec spec = 2;
    
      // Status is filled in by the server and indicates whether the token can be authenticated.
      // +optional
      optional TokenReviewStatus status = 3;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 5.2K bytes
    - Viewed (0)
Back to top