Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 264 for splice (0.13 sec)

  1. src/main/webapp/js/admin/jquery-3.7.1.min.js

    G(){}function Y(e,t){var n,r,i,o,a,s,u,l=c[e+" "];if(l)return t?0:l.slice(0);a=e,s=[],u=b.preFilter;while(a){for(o in n&&!(r=y.exec(a))||(r&&(a=a.slice(r[0].length)||a),s.push(i=[])),n=!1,(r=m.exec(a))&&(n=r.shift(),i.push({value:n,type:r[0].replace(ve," ")}),a=a.slice(n.length)),b.filter)!(r=D[o].exec(a))||u[o]&&!(r=u[o](r))||(n=r.shift(),i.push({value:n,type:o,matches:r}),a=a.slice(n.length));if(!n)break}return t?a.length:a?I.error(e):c(e,s).slice(0)}function Q(e){for(var t=0,n=e.length,r="";t<n;t++)r+=e[t].value;return...
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 85.5K bytes
    - Viewed (0)
  2. src/main/webapp/js/jquery-3.7.1.min.js

    G(){}function Y(e,t){var n,r,i,o,a,s,u,l=c[e+" "];if(l)return t?0:l.slice(0);a=e,s=[],u=b.preFilter;while(a){for(o in n&&!(r=y.exec(a))||(r&&(a=a.slice(r[0].length)||a),s.push(i=[])),n=!1,(r=m.exec(a))&&(n=r.shift(),i.push({value:n,type:r[0].replace(ve," ")}),a=a.slice(n.length)),b.filter)!(r=D[o].exec(a))||u[o]&&!(r=u[o](r))||(n=r.shift(),i.push({value:n,type:o,matches:r}),a=a.slice(n.length));if(!n)break}return t?a.length:a?I.error(e):c(e,s).slice(0)}function Q(e){for(var t=0,n=e.length,r="";t<n;t++)r+=e[t].value;return...
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 85.5K bytes
    - Viewed (0)
  3. architecture/ambient/ztunnel.md

    For traffic to unknown addresses, or to workloads that are not a part of the mesh, the traffic will just be passed through as is.
    To make ztunnel more transparent, the original source IP address will be spoofed.
    Additionally, `splice` will be used to make this proxying more efficient when possible.
    
    For traffic in the mesh, things are a bit more complex:
    
    1. If the destination has a waypoint proxy, we must send to it to the waypoint (using HBONE).
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  4. src/bytes/bytes.go

    	return genSplit(s, sep, len(sep), n)
    }
    
    // Split slices s into all subslices separated by sep and returns a slice of
    // the subslices between those separators.
    // If sep is empty, Split splits after each UTF-8 sequence.
    // It is equivalent to SplitN with a count of -1.
    //
    // To split around the first instance of a separator, see [Cut].
    func Split(s, sep []byte) [][]byte { return genSplit(s, sep, 0, -1) }
    
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Sep 03 20:55:15 UTC 2024
    - 35.6K bytes
    - Viewed (0)
  5. src/main/webapp/js/jquery-3.7.1.min.map

    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 131.6K bytes
    - Viewed (0)
  6. guava-tests/test/com/google/common/io/ByteSourceTester.java

      public void testSlice_constrainedRange() throws IOException {
        long size = source.read().length;
        if (size >= 2) {
          ByteSource sliced = source.slice(1, size - 2);
          assertEquals(size - 2, sliced.read().length);
          ByteSource resliced = sliced.slice(0, size - 1);
          assertTrue(sliced.contentEquals(resliced));
        }
      }
    
      private void assertExpectedBytes(byte[] readBytes) {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 8.6K bytes
    - Viewed (0)
  7. src/main/webapp/js/admin/jquery-3.7.1.min.map

    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 131.6K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/discovery/v1beta1/generated.proto

      optional string addressType = 4;
    
      // endpoints is a list of unique endpoints in this slice. Each slice may
      // include a maximum of 1000 endpoints.
      // +listType=atomic
      repeated Endpoint endpoints = 2;
    
      // ports specifies the list of network ports exposed by each endpoint in
      // this slice. Each port must have a unique name. When ports is empty, it
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 8K bytes
    - Viewed (0)
  9. cmd/erasure-healing-common.go

    		// the etag.
    		if count >= quorum {
    			return etags
    		}
    	}
    
    	return make([]string, len(partsMetadata))
    }
    
    // Extracts list of times from FileInfo slice and returns, skips
    // slice elements which have errors.
    func listObjectModtimes(partsMetadata []FileInfo, errs []error) (modTimes []time.Time) {
    	modTimes = bootModtimes(len(partsMetadata))
    	for index, metadata := range partsMetadata {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  10. src/bytes/bytes_test.go

    }
    
    func TestLines(t *testing.T) {
    	for _, s := range linesTests {
    		result := sliceOfString(slices.Collect(Lines([]byte(s.a))))
    		if !slices.Equal(result, s.b) {
    			t.Errorf(`slices.Collect(Lines(%q)) = %q; want %q`, s.a, result, s.b)
    		}
    	}
    }
    
    // For ease of reading, the test cases use strings that are converted to byte
    // slices before invoking the functions.
    
    var abcd = "abcd"
    var faces = "☺☻☹"
    var commas = "1,2,3,4"
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Aug 19 19:09:04 UTC 2024
    - 61.2K bytes
    - Viewed (0)
Back to top