- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 17 for forRetry (0.06 seconds)
-
src/main/java/jcifs/smb/SmbOperationException.java
* * @param original the original exception * @param attemptNumber the current attempt number * @return new exception with updated attempt information */ public static SmbOperationException forRetry(SmbOperationException original, int attemptNumber) { SmbOperationException retry = new SmbOperationException(original.errorCode, original.originalMessage, original.getCause(),Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 16.5K bytes - Click Count (0) -
src/test/java/jcifs/smb/SmbOperationExceptionTest.java
original.withContext("attempt", 1); // When SmbOperationException retry = SmbOperationException.forRetry(original, 2); // Then assertEquals(original.getErrorCode(), retry.getErrorCode()); assertEquals(original.getMessage(), retry.getMessage());
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 16.1K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/HashBiMap.java
} private final class KeySet extends View<K, V, K> { KeySet() { super(HashBiMap.this); } @Override @ParametricNullness K forEntry(int entry) { // The cast is safe because we call forEntry only for indexes that contain entries. return uncheckedCastNullableTToT(keys[entry]); } @Override public boolean contains(@Nullable Object o) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Mar 08 16:16:42 GMT 2026 - 37K bytes - Click Count (0) -
docs/ru/docs/advanced/strict-content-type.md
## Риск CSRF { #csrf-risk } Такое поведение по умолчанию обеспечивает защиту от класса атак **Cross-Site Request Forgery (CSRF)** в очень специфическом сценарии. Эти атаки используют то, что браузеры позволяют скриптам отправлять запросы без выполнения CORS preflight, когда они:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 5.6K bytes - Click Count (0) -
docs/es/docs/advanced/strict-content-type.md
## Riesgo de CSRF { #csrf-risk } Este comportamiento por defecto provee protección contra una clase de ataques de **Cross-Site Request Forgery (CSRF)** en un escenario muy específico. Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:12:26 GMT 2026 - 3.4K bytes - Click Count (0) -
docs/tr/docs/advanced/strict-content-type.md
## CSRF Riski { #csrf-risk } Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar. Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:51:35 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
## Ризик CSRF { #csrf-risk } Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
## CSRF-Risiko { #csrf-risk } Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario. Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario. These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
## Risco de CSRF { #csrf-risk } Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico. Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0)