- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 55 for Jones (0.13 sec)
-
common-protos/k8s.io/api/batch/v1/generated.proto
// More information can be found in https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#time-zones // +optional optional string timeZone = 8; // Optional deadline in seconds for starting the job if it misses scheduled // time for any reason. Missed jobs executions will be counted as failed ones. // +optional optional int64 startingDeadlineSeconds = 2;
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 21.1K bytes - Viewed (0) -
mockwebserver-junit5/README.md
``` class MyTest( private val server: MockWebServer ) { @Test fun test() { ... } } ``` Multiple instances can be obtained by naming additional ones: ``` class MyTest( private val server: MockWebServer, @MockWebServerInstance("server2") private val server2: MockWebServer, @MockWebServerInstance("server3") private val server3: MockWebServer ) { @Test
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sun Jan 14 10:20:09 GMT 2024 - 1.3K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/CookieJar.kt
* * As persistence, implementations of this interface must also provide storage of cookies. Simple * implementations may store cookies in memory; sophisticated ones may use the file system or * database to hold accepted cookies. The [cookie storage model][rfc_6265_53] specifies policies for * updating and expiring cookies. * * [rfc_6265_53]: https://tools.ietf.org/html/rfc6265#section-5.3
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2.4K bytes - Viewed (0) -
docs/en/docs/advanced/security/index.md
# Advanced Security ## Additional Features There are some extra features to handle security apart from the ones covered in the [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}. !!! tip The next sections are **not necessarily "advanced"**. And it's possible that for your use case, the solution is in one of them. ## Read the Tutorial first
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Sun Mar 31 23:52:53 GMT 2024 - 633 bytes - Viewed (0) -
common-protos/k8s.io/api/apps/v1beta1/generated.proto
// zero and not specified. Defaults to 1. // +optional optional int32 replicas = 1; // selector is the label selector for pods. Existing ReplicaSets whose pods are // selected by this will be the ones affected by this deployment. // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector selector = 2; // Template describes the pods that will be created.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 24K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Create a PassLib "context". This is what will be used to hash and verify passwords. !!! tip The PassLib context also has functionality to use different hashing algorithms, including deprecated old ones only to allow verifying them, etc. For example, you could use it to read and verify passwords generated by another system (like Django) but hash any new passwords with a different algorithm like Bcrypt.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 13K bytes - Viewed (0) -
manifests/charts/README.md
### Install Control plane This can run in any cluster. A mesh should have at least one cluster should run Pilot or equivalent XDS server, and it is recommended to have Pilot running in each region and in multiple availability zones for multi cluster. ```bash iop istio-control istio-discovery $IBASE/istio-control/istio-discovery \ --set global.istioNamespace=istio-system # Second istio-discovery, using master version of istio
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Feb 07 17:53:24 GMT 2024 - 6.7K bytes - Viewed (0) -
common-protos/k8s.io/api/discovery/v1beta1/generated.proto
// +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; // items is the list of endpoint slices repeated EndpointSlice items = 2; } // ForZone provides information about which zones should consume this endpoint. message ForZone { // name represents the name of the zone. optional string name = 1;
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Mar 11 18:43:24 GMT 2024 - 8K bytes - Viewed (0) -
README.md
```sh firewall-cmd --get-active-zones ``` This command gets the active zone(s). Now, apply port rules to the relevant zones returned above. For example if the zone is `public`, use ```sh firewall-cmd --zone=public --add-port=9000/tcp --permanent ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Feb 14 17:51:34 GMT 2024 - 18.7K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
I'll tell you a bit more about these **concepts** here, and that would hopefully give you the **intuition** you would need to decide how to deploy your API in very different environments, possibly even in **future** ones that don't exist yet. By considering these concepts, you will be able to **evaluate and design** the best way to deploy **your own APIs**.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu May 02 22:37:31 GMT 2024 - 18K bytes - Viewed (0)