Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 677 for providers (0.04 sec)

  1. src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessTimeResourceProviderTest.java

            assertNotNull(provider2);
            assertNotNull(provider3);
    
            // Each should be a different instance
            assertNotSame(provider1, provider2);
            assertNotSame(provider2, provider3);
            assertNotSame(provider1, provider3);
        }
    
        // Test with special characters in time adjustment string
        public void test_specialCharactersInTimeAdjustment() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 17.4K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java

            FessSecurityResourceProvider provider1 = new FessSecurityResourceProvider(inver1, oneWay1);
            FessSecurityResourceProvider provider2 = new FessSecurityResourceProvider(inver2, oneWay2);
    
            assertNotSame(provider1, provider2);
            assertEquals(inver1, provider1.providePrimaryInvertibleCryptographer());
            assertEquals(inver2, provider2.providePrimaryInvertibleCryptographer());
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  3. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/ApiExtractor.java

         */
        public void setSoTimeout(final Integer soTimeout) {
            this.soTimeout = soTimeout;
        }
    
        /**
         * Sets the map of authentication scheme providers.
         * @param authSchemeProviderMap The map of authentication scheme providers.
         */
        public void setAuthSchemeProviderMap(final Map<String, AuthSchemeProvider> authSchemeProviderMap) {
            this.authSchemeProviderMap = authSchemeProviderMap;
        }
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Thu Aug 07 02:55:08 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/hash/MacHashFunctionTest.java

      @AndroidIncompatible // sun.security
      public void testNoProviders() {
        ProviderList providers = Providers.getProviderList();
        Providers.setProviderList(ProviderList.newList());
        try {
          Hashing.hmacMd5(MD5_KEY);
          fail("expected ISE");
        } catch (IllegalStateException expected) {
        } finally {
          Providers.setProviderList(providers);
        }
      }
    
      public void testMultipleUpdates() throws Exception {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Dec 27 16:19:35 UTC 2024
    - 13.8K bytes
    - Viewed (0)
  5. docs/sts/web-identity.md

    **NOTE**: When configuring multiple OpenID based authentication providers on a MinIO cluster, any number of Role Policy based providers may be configured, and at most one JWT Claim based provider may be configured.
    
    <details><summary>Example 1: Two role policy providers</summary>
    
    Sample environment variables:
    
    ```
    MINIO_IDENTITY_OPENID_DISPLAY_NAME="my first openid"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  6. docs/smb3-features/05-rdma-smb-direct-design.md

    private RdmaProvider selectRdmaProvider() {
        // Try providers in order of preference
        List<RdmaProvider> providers = Arrays.asList(
            new DisniRdmaProvider(),      // InfiniBand/RoCE
            new JxioRdmaProvider(),       // Alternative RDMA library
            new TcpRdmaProvider()         // TCP fallback
        );
        
        for (RdmaProvider provider : providers) {
            if (provider.isAvailable()) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  7. docs/em/docs/advanced/behind-a-proxy.md

    ⤴️ ✍ 📁 `traefik.toml` ⏮️:
    
    ```TOML hl_lines="3"
    [entryPoints]
      [entryPoints.http]
        address = ":9999"
    
    [providers]
      [providers.file]
        filename = "routes.toml"
    ```
    
    👉 💬 Traefik 👂 🔛 ⛴ 9️⃣9️⃣9️⃣9️⃣ &amp; ⚙️ ➕1️⃣ 📁 `routes.toml`.
    
    /// tip
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10K bytes
    - Viewed (0)
  8. docs/pt/docs/advanced/behind-a-proxy.md

    Então, crie um arquivo `traefik.toml` com:
    
    ```TOML hl_lines="3"
    [entryPoints]
      [entryPoints.http]
        address = ":9999"
    
    [providers]
      [providers.file]
        filename = "routes.toml"
    ```
    
    Isso diz ao Traefik para escutar na porta 9999 e usar outro arquivo `routes.toml`.
    
    /// tip | Dica
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sat Nov 09 16:39:20 UTC 2024
    - 12.2K bytes
    - Viewed (0)
  9. .github/workflows/build.yml

      testopenjsse:
        runs-on: ubuntu-latest
        if: contains(github.event.pull_request.labels.*.name, 'providers')
    
        steps:
          - name: Checkout
            uses: actions/checkout@v5
    
          - name: Configure JDK
            uses: actions/setup-java@v5
            with:
              distribution: 'zulu'
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Thu Aug 21 07:15:58 UTC 2025
    - 18.1K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top