- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for _isHovered (0.11 sec)
-
src/main/java/org/codelibs/fess/helper/CrawlerStatsHelper.java
ACCESSED, /** Indicates that an exception occurred during URL access. */ ACCESS_EXCEPTION, /** Indicates that a child URL was discovered. */ CHILD_URL, /** Indicates that multiple child URLs were discovered. */ CHILD_URLS, /** Indicates that a URL was evaluated for crawling eligibility. */ EVALUATED,
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 17.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ds/callback/FileListIndexUpdateCallbackImpl.java
* Adds a document to the search index by crawling the specified URL and processing the content. * This method handles recursive crawling with depth and access count limits, follows redirects, * and processes child URLs discovered during crawling. * * @param paramMap the data store parameters containing crawling configuration * @param dataMap the data map containing the document information including the URL */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 28.9K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnectionPool.kt
var i = 0 while (i < references.size) { val reference = references[i] if (reference.get() != null) { i++ continue } // We've discovered a leaked call. This is an application bug. val callReference = reference as CallReference val message = "A connection to ${connection.route().address.url} was leaked. " +
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue Jun 03 17:10:08 UTC 2025 - 16.1K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
} else -> throw expected } } } /** * Not checking the CA bit created a vulnerability in old OkHttp releases. It is exploited by * triggering different chains to be discovered by the TLS engine and our chain cleaner. In this * attack there's several different chains. * * * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1)