- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 409 for preferGo (0.19 sec)
-
src/net/conf_test.go
hostTests: []nssHostTest{{"google.com", "myhostname", hostLookupCgo}}, }, // Issue 24393: make sure "Resolver.PreferGo = true" acts like netgo. { name: "resolver-prefergo", resolver: &Resolver{PreferGo: true}, c: &conf{ preferCgo: true, netCgo: true, }, resolv: defaultResolvConf, nss: nssStr(t, ""), hostTests: []nssHostTest{
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 20:46:36 UTC 2024 - 12.3K bytes - Viewed (0) -
src/net/dnsclient_unix_test.go
Response: true, RCode: dnsmessage.RCodeSuccess, }, Questions: q.Questions, } if n == "udp" { r.Header.Truncated = true } return r, nil }, } r := Resolver{PreferGo: true, Dial: fake.DialContext} for _, tt := range dnsTransportFallbackTests { ctx, cancel := context.WithCancel(context.Background()) defer cancel()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sun Apr 14 18:23:45 UTC 2024 - 72.4K bytes - Viewed (0) -
src/net/conf.go
// // Adding netdns=go to GODEBUG will prefer the go resolver. // Adding netdns=cgo to GODEBUG will prefer the cgo resolver. // // The Resolver struct has a PreferGo field that user code // may set to prefer the go resolver. It is documented as being // equivalent to adding netdns=go to GODEBUG. // // When deciding which resolver to use, we first check the PreferGo field. // If that is not set, we check the GODEBUG setting.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat May 18 03:13:26 UTC 2024 - 15.5K bytes - Viewed (0) -
src/net/lookup_test.go
t.Skip("skipping on plan9") } rDeadlineExcceeded := &Resolver{PreferGo: true, Dial: func(ctx context.Context, network, address string) (Conn, error) { return nil, context.DeadlineExceeded }} rCancelled := &Resolver{PreferGo: true, Dial: func(ctx context.Context, network, address string) (Conn, error) { return nil, context.Canceled }}
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 01:00:11 UTC 2024 - 41.4K bytes - Viewed (0) -
src/net/lookup.go
// A Resolver looks up names and numbers. // // A nil *Resolver is equivalent to a zero Resolver. type Resolver struct { // PreferGo controls whether Go's built-in DNS resolver is preferred // on platforms where it's available. It is equivalent to setting // GODEBUG=netdns=go, but scoped to just this resolver. PreferGo bool // StrictErrors controls the behavior of temporary errors
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sun Apr 14 18:23:45 UTC 2024 - 28.6K bytes - Viewed (0) -
src/net/resolverdialfunc_test.go
import ( "bytes" "context" "errors" "fmt" "reflect" "slices" "testing" "time" "golang.org/x/net/dns/dnsmessage" ) func TestResolverDialFunc(t *testing.T) { r := &Resolver{ PreferGo: true, Dial: newResolverDialFunc(&resolverDialHandler{ StartDial: func(network, address string) error { t.Logf("StartDial(%q, %q) ...", network, address) return nil },
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 01:00:11 UTC 2024 - 8.3K bytes - Viewed (0) -
src/net/lookup_windows_test.go
var name string if def { name = "default/" } else { name = "go/" } t.Run(name+server, func(t *testing.T) { t.Parallel() r := DefaultResolver if !def { r = &Resolver{PreferGo: true} } fn(t, r, server) }) } } } func TestNSLookupMX(t *testing.T) { testenv.MustHaveExternalNetwork(t) testLookup(t, func(t *testing.T, r *Resolver, server string) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 01:00:11 UTC 2024 - 8.7K bytes - Viewed (0) -
src/net/addrselect.go
return preferDA } if !SourceDA.IsValid() { return preferDB } // Rule 2: Prefer matching scope. // If Scope(DA) = Scope(Source(DA)) and Scope(DB) <> Scope(Source(DB)), // then prefer DA. Similarly, if Scope(DA) <> Scope(Source(DA)) and // Scope(DB) = Scope(Source(DB)), then prefer DB. if attrDA.Scope == attrSourceDA.Scope && attrDB.Scope != attrSourceDB.Scope { return preferDA }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 09 00:24:06 UTC 2024 - 9.7K bytes - Viewed (0) -
tensorflow/compiler/mlir/tf2xla/tests/legalize-tf-prefer-tf2xla.mlir
// RUN: tf-opt "-xla-legalize-tf=device-type=XLA_CPU_JIT legalize-chlo=false use-tf2xla-fallback=true prefer-tf2xla=true" %s | FileCheck %s // RUN: tf-opt "-xla-legalize-tf=device-type=XLA_CPU_JIT legalize-chlo=false prefer-tf2xla=true" %s | FileCheck --check-prefix NOFALLBACK %s module attributes {tf.versions = {bad_consumers = [], min_consumer = 0 : i32, producer = 268 : i32}} { // CHECK-LABEL: @abs func.func @abs(%arg0: tensor<2xf32>) -> tensor<2xf32> {
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Sat Apr 06 15:32:52 UTC 2024 - 15.8K bytes - Viewed (0) -
hack/verify-shellcheck.sh
1090 # this lint warns when shellcheck cannot find a sourced file # this wouldn't be a bad idea to warn on, but it fails on lots of path # dependent sourcing, so just disable enforcing it 1091 # this lint prefers command -v to which, they are not the same 2230 ) # comma separate for passing to shellcheck join_by() { local IFS="$1"; shift; echo "$*"; } SHELLCHECK_DISABLED="$(join_by , "${disabled[@]}")"
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Mar 01 06:07:05 UTC 2024 - 4.9K bytes - Viewed (0)