- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for delicious (0.05 sec)
-
src/test/java/org/codelibs/fess/suggest/SuggesterTest.java
assertEquals(0, response3.getTotal()); SuggestResponse response4 = suggester.suggest().setQuery("delicious").setSuggestDetail(true).execute().getResponse(); assertEquals(1, response4.getNum()); assertEquals(1, response4.getTotal()); assertEquals("delicious", response4.getWords().get(0)); } @Test @SuppressWarnings("unchecked")
Registered: Sat Dec 20 13:04:59 UTC 2025 - Last Modified: Mon Nov 24 03:40:05 UTC 2025 - 37.4K bytes - Viewed (0) -
README.md
otherwise. Do not persist these and assume they can be read by a future version of the library. 5. Our classes are not designed to protect against a malicious caller. You should not use them for communication between trusted and untrusted code. 6. For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 16 22:01:32 UTC 2025 - 6.2K bytes - Viewed (0) -
cmd/generic-handlers.go
return true case segmentEnd-segmentStart == 1 && path[segmentStart] == '.': return true } i++ } return false } // Check if client is sending a malicious request. func hasMultipleAuth(r *http.Request) bool { authTypeCount := 0 for _, hasValidAuth := range []func(*http.Request) bool{ isRequestSignatureV2, isRequestPresignedSignatureV2,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 20.7K bytes - Viewed (1) -
cmd/iam.go
if ok { parentInClaim, ok := p.(string) if !ok { // Reject malformed/malicious requests. return false } // The parent claim in the session token should be equal // to the parent detected in the backend if parentInClaim != parentUser { return false } } else { // This is needed so a malicious user cannot // use a leaked session key of another user // to widen its privileges.Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 76.5K bytes - Viewed (0) -
android/guava/src/com/google/common/io/ByteSource.java
* * <p>Note that the given byte array may be passed directly to methods on, for example, {@code * OutputStream} (when {@code copyTo(OutputStream)} is called on the resulting {@code * ByteSource}). This could allow a malicious {@code OutputStream} implementation to modify the * contents of the array, but provides better performance in the normal case. * * @since 15.0 (since 14.0 as {@code ByteStreams.asByteSource(byte[])}). */Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 08 18:35:13 UTC 2025 - 25.7K bytes - Viewed (0) -
cmd/server_test.go
"User-Agent": []string{"A malicious request"}, "X-Amz-Decoded-Content-Length": []string{"8"}, "Content-Encoding": []string{"aws-chunked"}, "X-Amz-Trailer": []string{"x-amz-checksum-crc32"},Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0) -
docs/en/docs/release-notes.md
* 📝 Reword in docs, from "have in mind" to "keep in mind". PR [#10376](https://github.com/tiangolo/fastapi/pull/10376) by [@malicious](https://github.com/malicious). * 📝 Add External Link: Talk by Jeny Sadadia. PR [#10265](https://github.com/tiangolo/fastapi/pull/10265) by [@JenySadadia](https://github.com/JenySadadia).
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 19:06:15 UTC 2025 - 586.7K bytes - Viewed (0)