- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 202 for pushes (0.06 sec)
-
.github/workflows/check-markdown-links.yml
name: "Check markdown links" on: push: branches: - master pull_request: workflow_dispatch: permissions: {} jobs: check-links: permissions: contents: read runs-on: ubuntu-latest steps: - name: Checkout uses: actions/checkout@v4 - name: Check links uses: lycheeverse/lychee-action@v2.0.0 with: # excluded:
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Mon Oct 14 07:50:42 UTC 2024 - 920 bytes - Viewed (0) -
.github/workflows/docs.yml
steps: - name: Checkout uses: actions/checkout@v4 with: fetch-depth: 0 - name: Configure JDK uses: actions/setup-java@v4 with: distribution: 'zulu' java-version: 17 - uses: actions/setup-python@v5 with: python-version: 3.x
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Mar 04 06:13:36 UTC 2024 - 1K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java
* (i.e. cycles that will not actually result in deadlock), it simplifies the algorithm and * implementation considerably. The assumption is that a user of this factory wishes to eliminate * any cyclic acquisition ordering. * * <p><strong>Explicit Lock Acquisition Ordering</strong> * * <p>The {@link CycleDetectingLockFactory.WithExplicitOrdering} class can be used to enforce an
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Dec 15 19:31:54 UTC 2023 - 35.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
But you cannot convert from the gibberish back to the password. ##### Why use password hashing If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous). //// tab | Python 3.10+ ```Python hl_lines="82-85"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.3K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Sie können jedoch nicht vom Kauderwelsch zurück zum Passwort konvertieren. ##### Warum Passwort-Hashing verwenden? Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes. Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich). //// tab | Python 3.10+
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 14.1K bytes - Viewed (0) -
.github/workflows/cffconvert.yml
name: cffconvert on: push: paths: - CITATION.cff permissions: contents: read jobs: validate: if: github.repository == 'tensorflow/tensorflow' # Don't do this in forks name: "validate" runs-on: ubuntu-latest steps: - name: Check out a copy of the repository uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Fri Nov 01 08:40:10 UTC 2024 - 1.3K bytes - Viewed (0) -
compat/maven-artifact/src/main/java/org/apache/maven/artifact/versioning/ComparableVersion.java
items = new ListItem(); version = version.toLowerCase(Locale.ENGLISH); ListItem list = items; Deque<Item> stack = new ArrayDeque<>(); stack.push(list); boolean isDigit = false; boolean isCombination = false; int startIndex = 0; for (int i = 0; i < version.length(); i++) {
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 26K bytes - Viewed (0) -
src/cmd/asm/internal/lex/lex_test.go
"#define A #define B (x) x", "A", "B(THIS)", ), "x.\n", }, */ } func TestLex(t *testing.T) { for _, test := range lexTests { input := NewInput(test.name) input.Push(NewTokenizer(test.name, strings.NewReader(test.input), nil)) result := drain(input) if result != test.output { t.Errorf("%s: got %q expected %q", test.name, result, test.output) } } }
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Aug 29 07:48:38 UTC 2023 - 5.8K bytes - Viewed (0) -
build-logic/binary-compatibility/src/main/groovy/gradlebuild/EnrichedReportRenderer.groovy
var result = []; changeElements.each((idx, val) => result.push(JSON.parse(val.textContent))); return result; } function appendErrorCorrections(reason) { var result = JSON.parse('${currentApiChanges.replace('\n', '')}'); // JSON string from report uses double quotes, contain it within single quotes
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Feb 07 20:38:43 UTC 2023 - 7.2K bytes - Viewed (0) -
common-protos/k8s.io/api/admissionregistration/v1/generated.proto
// sideEffects == Unknown or Some. optional string sideEffects = 6; // TimeoutSeconds specifies the timeout for this webhook. After the timeout passes, // the webhook call will be ignored or the API call will fail based on the // failure policy. // The timeout value must be between 1 and 30 seconds. // Default to 10 seconds. // +optional
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 24.4K bytes - Viewed (0)