- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 1,070 for Staken (0.22 sec)
-
cni/pkg/install/testdata/token-bar
Sergei Gavrilov <******@****.***> 1657207540 +0200
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jul 07 15:25:40 GMT 2022 - 3 bytes - Viewed (0) -
cni/pkg/install/testdata/token-foo
Sergei Gavrilov <******@****.***> 1657207540 +0200
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jul 07 15:25:40 GMT 2022 - 3 bytes - Viewed (0) -
istioctl/pkg/workload/testdata/vmconfig/ipv4/istio-token.golden
Xiaopeng Han <******@****.***> 1686841337 +0800
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jun 15 15:02:17 GMT 2023 - Viewed (0) -
istioctl/pkg/workload/testdata/vmconfig/ipv6/istio-token.golden
Xiaopeng Han <******@****.***> 1686841337 +0800
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jun 15 15:02:17 GMT 2023 - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
#### Fix it with `secrets.compare_digest()` But in our code we are actually using `secrets.compare_digest()`. In short, it will take the same time to compare `stanleyjobsox` to `stanleyjobson` than it takes to compare `johndoe` to `stanleyjobson`. And the same for the password.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Jan 11 14:33:05 GMT 2024 - 5.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/index.md
# Security There are many ways to handle security, authentication and authorization. And it normally is a complex and "difficult" topic. In many frameworks and systems just handling security and authentication takes a big amount of effort and code (in many cases it can be 50% or more of all the code written).
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Jun 24 14:47:15 GMT 2023 - 4.3K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/SmoothRateLimiter.java
* maxPermits is equal to warmupPeriod. * <li>When _used_, the time it takes, as explained in the introductory class note, is equal to * the integral of our function, between X permits and X-K permits, assuming we want to * spend K saved permits. * </ol> *
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Tue Apr 04 09:45:04 GMT 2023 - 19.3K bytes - Viewed (0) -
cni/pkg/install/kubeconfig.go
caContents, err := os.ReadFile(caFile) if err != nil { return kubeconfig{}, err } cluster.CertificateAuthorityData = caContents } token, err := os.ReadFile(constants.ServiceAccountPath + "/token") if err != nil { return kubeconfig{}, err } const contextName = "istio-cni-context" const clusterName = "local" const userName = "istio-cni" kcfg := &api.Config{
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Fri Aug 11 01:19:03 GMT 2023 - 4.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/TopKSelector.java
if (iterations >= maxIterations) { @SuppressWarnings("nullness") // safe because we pass sort() a range that contains real Ts T[] castBuffer = (T[]) buffer; // We've already taken O(k log k), let's make sure we don't take longer than O(k log k). Arrays.sort(castBuffer, left, right + 1, comparator); break; } } bufferSize = k;
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Apr 01 16:15:01 GMT 2024 - 11.2K bytes - Viewed (0) -
istioctl/pkg/workload/testdata/vmconfig-nil-proxy-metadata/istio-token.golden
Xiaopeng Han <******@****.***> 1686841337 +0800
Others - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu Jun 15 15:02:17 GMT 2023 - Viewed (0)