Search Options

Results per page
Sort
Preferred Languages
Advance

Results 101 - 110 of 808 for points (0.06 sec)

  1. docs/en/docs/advanced/security/oauth2-scopes.md

    We create an `HTTPException` that we can reuse (`raise`) later at several points.
    
    In this exception, we include the scopes required (if any) as a string separated by spaces (using `scope_str`). We put that string containing the scopes in the `WWW-Authenticate` header (this is part of the spec).
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Oct 29 11:02:16 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  2. cmd/metacache-server-pool.go

    	if err := checkListObjsArgs(ctx, o.Bucket, o.Prefix, o.Marker); err != nil {
    		return entries, err
    	}
    
    	// Marker points to before the prefix, just ignore it.
    	if o.Marker < o.Prefix {
    		o.Marker = ""
    	}
    
    	// Marker is set validate pre-condition.
    	if o.Marker != "" && o.Prefix != "" {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jul 12 16:23:16 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/autoscaling/v2beta2/generated.proto

      repeated HorizontalPodAutoscaler items = 2;
    }
    
    // HorizontalPodAutoscalerSpec describes the desired functionality of the HorizontalPodAutoscaler.
    message HorizontalPodAutoscalerSpec {
      // scaleTargetRef points to the target resource to scale, and is used to the pods for which metrics
      // should be collected, as well as to actually change the replica count.
      optional CrossVersionObjectReference scaleTargetRef = 1;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 21K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/flowcontrol/v1beta3/generated.proto

      // `items` is a list of request-priorities.
      repeated PriorityLevelConfiguration items = 2;
    }
    
    // PriorityLevelConfigurationReference contains information that points to the "request-priority" being used.
    message PriorityLevelConfigurationReference {
      // `name` is the name of the priority level configuration being referenced
      // Required.
      optional string name = 1;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.5K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/storage/v1/generated.proto

      // volume. This field defaults to false.
      //
      // Note: After a successful initial NodePublishVolume call, subsequent calls
      // to NodePublishVolume should only update the contents of the volume. New
      // mount points will not be seen by a running container.
      //
      // +optional
      optional bool requiresRepublish = 7;
    
      // seLinuxMount specifies if the CSI driver supports "-o context"
      // mount option.
      //
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 24.7K bytes
    - Viewed (0)
  6. istioctl/pkg/precheck/precheck.go

    		if err != nil {
    			fmt.Printf("Error getting configmap %s: %v\n", configMapName, err)
    		}
    		meshData := make(map[string]interface{})
    		if data, exists := configMap.Data["mesh"]; exists {
    			if err := yaml.Unmarshal([]byte(data), &meshData); err != nil {
    				fmt.Printf("Error parsing meshConfig: %v\n", err)
    				return err
    			}
    		}
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Oct 24 02:31:32 UTC 2024
    - 15.3K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/HashBiMap.java

           * shouldn't change now for fear of breaking people.)
           *
           * If the entry is still in the map, then updateIndex ensured that `index` points to the right
           * element. Because that element is present, uncheckedCastNullableTToT is safe.
           */
          return (index == ABSENT) ? unsafeNull() : uncheckedCastNullableTToT(values[index]);
        }
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Mar 06 16:06:58 UTC 2023
    - 36.4K bytes
    - Viewed (0)
  8. android/guava-tests/test/com/google/common/graph/AbstractStandardUndirectedNetworkTest.java

       * will silently add the missing nodes to the graph, then add the edge connecting them. We are not
       * using the proxy methods here as we want to test {@code addEdge} when the end-points are not
       * elements of the graph.
       */
      @Test
      public void addEdge_nodesNotInGraph() {
        assume().that(graphIsMutable()).isTrue();
    
        networkAsMutableNetwork.addNode(N1);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 02 18:21:29 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  9. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/TikaExtractor.java

            }
    
            if (logger.isDebugEnabled()) {
                logger.debug("metadata: {}", metadata);
            }
    
            return metadata;
        }
    
        // workaround: Tika does not have extention points.
        protected class TikaDetectParser extends CompositeParser {
            private static final long serialVersionUID = 1L;
    
            /**
             * The type detector used by this parser to auto-detect the type of a
    Registered: Sun Nov 10 03:50:12 UTC 2024
    - Last Modified: Sat Oct 12 01:41:37 UTC 2024
    - 25K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/hash/HashFunction.java

     *       to <i>some</i> degree to make this unlikely. (Without this condition, a function that
     *       always returns zero could be called a hash function. It is not.)
     * </ul>
     *
     * <p>Summarizing the last two points: "equal yield equal <i>always</i>; unequal yield unequal
     * <i>often</i>." This is the most important characteristic of all hash functions.
     *
     * <h3>Desirable properties</h3>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
Back to top