- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 1,026 for passing (0.12 sec)
-
android/guava/src/com/google/common/util/concurrent/ClosingFuture.java
} @Override public String toString() { return function.toString(); } }; // TODO(dpb): Switch to future.transformSync when that exists (passing a throwing function). return derive(future.transformAsync(applyFunction, executor)); } /** * Returns a new {@code ClosingFuture} pipeline step derived from this one by applying a functionRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Sep 11 13:51:27 UTC 2025 - 96.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Ordering.java
return explicit(Lists.asList(leastValue, remainingValuesInOrder)); } // Ordering<Object> singletons /** * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements. * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 17:50:58 UTC 2025 - 39.5K bytes - Viewed (0) -
android/guava/src/com/google/common/math/Quantiles.java
* worst case time complexity of O(N^2). You are extremely unlikely to hit this quadratic case on * randomly ordered data (the probability decreases faster than exponentially in N), but if you are * passing in unsanitized user data then a malicious user could force it. A light shuffle of the * data using an unpredictable seed should normally be enough to thwart this attack. *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 30.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.10.md
* Use inline func to ensure unlock is executed ([#61644](https://github.com/kubernetes/kubernetes/pull/61644), [@resouer](https://github.com/resouer))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Multimaps.java
} /** * Support removal operations when filtering a filtered multimap. Since a filtered multimap has * iterators that don't support remove, passing one to the FilteredEntryMultimap constructor would * lead to a multimap whose removal operations would fail. This method combines the predicates to * avoid that problem. */
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 18:35:44 UTC 2025 - 86.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/Iterators.java
* * <p>The returned lists implement {@link java.util.RandomAccess}. * * <p><b>Note:</b> The current implementation eagerly allocates storage for {@code size} elements. * As a consequence, passing values like {@code Integer.MAX_VALUE} can lead to {@link * OutOfMemoryError}. * * @param iterator the iterator to return a partitioned view ofRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 16 12:42:11 UTC 2025 - 51.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.27.md
- [Changelog since v1.27.12](#changelog-since-v12712) - [Important Security Information](#important-security-information-1) - [CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin](#cve-2024-3177-bypassing-mountable-secrets-policy-imposed-by-the-serviceaccount-admission-plugin) - [Changes by Kind](#changes-by-kind-3) - [Feature](#feature-2)Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Jul 17 07:48:22 UTC 2024 - 466.3K bytes - Viewed (2) -
cmd/test-utils_test.go
// passing InsecureSkipVerify flag. This code is a simplified version of // https://golang.org/src/crypto/tls/generate_cert.go func generateTLSCertKey(host string) ([]byte, []byte, error) { validFor := 365 * 24 * time.Hour rsaBits := 2048 if len(host) == 0 { return nil, nil, fmt.Errorf("Missing host parameter") } publicKey := func(priv any) any {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.35.md
- Introduced the `--as-user-extra` persistent flag in `kubectl`, which allows passing extra arguments during impersonation. ([#134378](https://github.com/kubernetes/kubernetes/pull/134378), [@ardaguclu](https://github.com/ardaguclu)) [SIG CLI and Testing]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 17 13:01:55 UTC 2025 - 228.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.6.md
affinity/anti-affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/) and **[beta]** [pod affinity/anti-affinity](https://kubernetes.io/docs/concepts/configuration/assign-pod-node/). Node affinity/anti-affinity allow you to specify rules for restricting which node(s) a pod can schedule onto, based on the labels on the node. Pod affinity/anti-affinity allow you to specify rules for spreading and packing pods relative to one another, across arbitrary topologies (node, zone, etc.)...
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0)