Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 134 for evaluated (0.07 sec)

  1. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/ModelInterpolationException.java

            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message, cause);
    
            this.expression = expression;
            this.originalMessage = message;
        }
    
        public ModelInterpolationException(String expression, String message) {
            super("The POM expression: " + expression + " could not be evaluated. Reason: " + message);
    
            this.expression = expression;
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/authorization/v1beta1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the request being evaluated.  spec.namespace must be equal to the namespace
      // you made the request against.  If empty, it is defaulted.
      optional SubjectAccessReviewSpec spec = 2;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 11.9K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/admissionregistration/v1alpha1/generated.proto

      // Required.
      optional string key = 1;
    
      // valueExpression represents the expression which is evaluated by CEL to
      // produce an audit annotation value. The expression must evaluate to either
      // a string or null value. If the expression evaluates to a string, the
      // audit annotation is included with the string value. If the expression
      // evaluates to null or empty string the audit annotation will be omitted.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 25.7K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/authorization/v1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the request being evaluated.  spec.namespace must be equal to the namespace
      // you made the request against.  If empty, it is defaulted.
      optional SubjectAccessReviewSpec spec = 2;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 11.9K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/admissionregistration/v1beta1/generated.proto

      // There are a maximum of 64 match conditions allowed.
      //
      // The exact matching logic is (in order):
      //   1. If ANY matchCondition evaluates to FALSE, the webhook is skipped.
      //   2. If ALL matchConditions evaluate to TRUE, the webhook is called.
      //   3. If any matchCondition evaluates to an error (but none are FALSE):
      //      - If failurePolicy=Fail, reject the request
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 22.6K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/dtyp/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 5.4K bytes
    - Viewed (0)
  7. src/main/java/jcifs/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 6.5K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/imagepolicy/v1alpha1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the pod being evaluated
      optional ImageReviewSpec spec = 2;
    
      // Status is filled in by the backend and indicates whether the pod should be allowed.
      // +optional
      optional ImageReviewStatus status = 3;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  9. common-protos/k8s.io/api/authentication/v1/generated.proto

      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
      // Spec holds information about the request being evaluated
      optional TokenRequestSpec spec = 2;
    
      // Status is filled in by the server and indicates whether the token can be authenticated.
      // +optional
      optional TokenRequestStatus status = 3;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 6.7K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 7.2K bytes
    - Viewed (0)
Back to top