- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 321 for System (0.17 sec)
-
okhttp/src/test/java/okhttp3/internal/connection/ConnectionPoolTest.kt
t.interrupt() } } Thread.sleep(100) assertThat(realTaskRunner.activeQueues()).isEmpty() } @Test fun connectionPreWarmingHttp1() { taskFaker.advanceUntil(System.nanoTime()) val expireTime = taskFaker.nanoTime + 1_000_000_000_000 routePlanner.autoGeneratePlans = true routePlanner.defaultConnectionIdleAtNanos = expireTime val address = routePlanner.address
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Wed Apr 24 04:40:49 GMT 2024 - 12.7K bytes - Viewed (0) -
docs/config/README.md
``` > NOTE: if you set any of the following sub-system configuration using ENVs, dynamic behavior is not supported. ### Usage scanner
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 11 21:48:54 GMT 2023 - 17.7K bytes - Viewed (0) -
docs/en/docs/deployment/docker.md
Linux containers run using the same Linux kernel of the host (machine, virtual machine, cloud server, etc). This just means that they are very lightweight (compared to full virtual machines emulating an entire operating system).
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu May 02 22:37:31 GMT 2024 - 34K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Auf diese Weise können Sie einen Token mit einer Gültigkeitsdauer von beispielsweise einer Woche erstellen. Und wenn der Benutzer am nächsten Tag mit dem Token zurückkommt, wissen Sie, dass der Benutzer immer noch bei Ihrem System angemeldet ist.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 20:27:06 GMT 2024 - 15.1K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Lassen Sie uns diese Daten zunächst in das Pydantic-Modell `UserInDB` einfügen. Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System. Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück. #### Passwort-Hashing
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 18:08:44 GMT 2024 - 14.3K bytes - Viewed (0) -
docs/de/docs/tutorial/dependencies/index.md
## Einfach und leistungsstark Obwohl das hierarchische Dependency Injection System sehr einfach zu definieren und zu verwenden ist, ist es dennoch sehr mächtig. Sie können Abhängigkeiten definieren, die selbst wiederum Abhängigkeiten definieren können.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sat Mar 30 18:01:10 GMT 2024 - 13.1K bytes - Viewed (0) -
common-protos/k8s.io/api/batch/v1/generated.proto
// The set of valid time zone names and the time zone offset is loaded from the system-wide time zone // database by the API server during CronJob validation and the controller manager during execution. // If no system-wide time zone database can be found a bundled version of the database is used instead.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 21.1K bytes - Viewed (0) -
operator/README.md
kubectl create ns istio-system kubectl apply -f operator/samples/default-install.yaml ``` This installs the controller into the cluster in the istio-operator namespace. The controller in turns installs the Istio control plane into the istio-system namespace by default. ### Controller (running locally)
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sun Sep 17 08:27:52 GMT 2023 - 17.5K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/platform/Platform.kt
try { return newSSLContext().apply { init(null, arrayOf<TrustManager>(trustManager), null) }.socketFactory } catch (e: GeneralSecurityException) { throw AssertionError("No System TLS: $e", e) // The system has no TLS. Just give up. } } override fun toString(): String = javaClass.simpleName companion object { @Volatile private var platform = findPlatform()
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 9.8K bytes - Viewed (1) -
LICENSE
integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
Plain Text - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Mon Jan 18 20:25:38 GMT 2016 - 25.8K bytes - Viewed (0)