- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 677 for providers (0.04 sec)
-
src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessTimeResourceProviderTest.java
assertNotNull(provider2); assertNotNull(provider3); // Each should be a different instance assertNotSame(provider1, provider2); assertNotSame(provider2, provider3); assertNotSame(provider1, provider3); } // Test with special characters in time adjustment string public void test_specialCharactersInTimeAdjustment() {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 17.4K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java
FessSecurityResourceProvider provider1 = new FessSecurityResourceProvider(inver1, oneWay1); FessSecurityResourceProvider provider2 = new FessSecurityResourceProvider(inver2, oneWay2); assertNotSame(provider1, provider2); assertEquals(inver1, provider1.providePrimaryInvertibleCryptographer()); assertEquals(inver2, provider2.providePrimaryInvertibleCryptographer());
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 12.8K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/ApiExtractor.java
*/ public void setSoTimeout(final Integer soTimeout) { this.soTimeout = soTimeout; } /** * Sets the map of authentication scheme providers. * @param authSchemeProviderMap The map of authentication scheme providers. */ public void setAuthSchemeProviderMap(final Map<String, AuthSchemeProvider> authSchemeProviderMap) { this.authSchemeProviderMap = authSchemeProviderMap; }
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Aug 07 02:55:08 UTC 2025 - 12.2K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/MacHashFunctionTest.java
@AndroidIncompatible // sun.security public void testNoProviders() { ProviderList providers = Providers.getProviderList(); Providers.setProviderList(ProviderList.newList()); try { Hashing.hmacMd5(MD5_KEY); fail("expected ISE"); } catch (IllegalStateException expected) { } finally { Providers.setProviderList(providers); } } public void testMultipleUpdates() throws Exception {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Dec 27 16:19:35 UTC 2024 - 13.8K bytes - Viewed (0) -
docs/sts/web-identity.md
**NOTE**: When configuring multiple OpenID based authentication providers on a MinIO cluster, any number of Role Policy based providers may be configured, and at most one JWT Claim based provider may be configured. <details><summary>Example 1: Two role policy providers</summary> Sample environment variables: ``` MINIO_IDENTITY_OPENID_DISPLAY_NAME="my first openid"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
docs/smb3-features/05-rdma-smb-direct-design.md
private RdmaProvider selectRdmaProvider() { // Try providers in order of preference List<RdmaProvider> providers = Arrays.asList( new DisniRdmaProvider(), // InfiniBand/RoCE new JxioRdmaProvider(), // Alternative RDMA library new TcpRdmaProvider() // TCP fallback ); for (RdmaProvider provider : providers) { if (provider.isAvailable()) {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 02:53:50 UTC 2025 - 35.9K bytes - Viewed (0) -
docs/em/docs/advanced/behind-a-proxy.md
⤴️ ✍ 📁 `traefik.toml` ⏮️: ```TOML hl_lines="3" [entryPoints] [entryPoints.http] address = ":9999" [providers] [providers.file] filename = "routes.toml" ``` 👉 💬 Traefik 👂 🔛 ⛴ 9️⃣9️⃣9️⃣9️⃣ & ⚙️ ➕1️⃣ 📁 `routes.toml`. /// tip
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10K bytes - Viewed (0) -
docs/pt/docs/advanced/behind-a-proxy.md
Então, crie um arquivo `traefik.toml` com: ```TOML hl_lines="3" [entryPoints] [entryPoints.http] address = ":9999" [providers] [providers.file] filename = "routes.toml" ``` Isso diz ao Traefik para escutar na porta 9999 e usar outro arquivo `routes.toml`. /// tip | Dica
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sat Nov 09 16:39:20 UTC 2024 - 12.2K bytes - Viewed (0) -
.github/workflows/build.yml
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Thu Aug 21 07:15:58 UTC 2025 - 18.1K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0)