Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1151 - 1160 of 2,237 for setB (0.02 sec)

  1. android/guava/src/com/google/common/collect/ForwardingSortedSetMultimap.java

    import java.util.Comparator;
    import java.util.SortedSet;
    import javax.annotation.CheckForNull;
    import org.checkerframework.checker.nullness.qual.Nullable;
    
    /**
     * A sorted set multimap which forwards all its method calls to another sorted set multimap.
     * Subclasses should override one or more methods to modify the behavior of the backing multimap as
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jun 15 21:08:00 UTC 2021
    - 2.3K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/Tables.java

        Iterator<Cell<R, C, V2>> cellIterator() {
          return Iterators.transform(fromTable.cellSet().iterator(), cellFunction());
        }
    
        @Override
        public Set<R> rowKeySet() {
          return fromTable.rowKeySet();
        }
    
        @Override
        public Set<C> columnKeySet() {
          return fromTable.columnKeySet();
        }
    
        @Override
        Collection<V2> createValues() {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 16 21:21:17 UTC 2024
    - 26.3K bytes
    - Viewed (0)
  3. samples/slack/src/main/java/okhttp3/slack/SlackClient.java

        });
    
        System.out.printf("open this URL in a browser: %s\n", authorizeUrl);
      }
    
      /** Set the OAuth session for this client. */
      public synchronized void initOauthSession(OAuthSession session) {
        this.session = session;
        this.notifyAll();
      }
    
      /** Waits for an OAuth session for this client to be set. */
      public synchronized void awaitAccessToken(Timeout timeout) throws InterruptedIOException {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Jan 12 03:31:36 UTC 2019
    - 3.4K bytes
    - Viewed (0)
  4. compat/maven-compat/src/test/java/org/apache/maven/repository/metadata/TestMetadataSource.java

     */
    package org.apache.maven.repository.metadata;
    
    import javax.inject.Inject;
    import javax.inject.Named;
    import javax.inject.Singleton;
    
    import java.util.HashSet;
    import java.util.List;
    import java.util.Set;
    
    import org.apache.maven.artifact.Artifact;
    import org.apache.maven.artifact.factory.ArtifactFactory;
    import org.apache.maven.artifact.repository.ArtifactRepository;
    import org.apache.maven.artifact.versioning.ArtifactVersion;
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 3.7K bytes
    - Viewed (0)
  5. docs/iam/opa.md

    podman run -it \
        --name opa \
        --publish 8181:8181 \
        docker.io/openpolicyagent/opa:0.40.0-rootless \
           run --server \
               --log-format=json-pretty \
               --log-level=debug \
               --set=decision_logs.console=true
    ```
    
    ### 2. Create a sample OPA Policy
    
    In another terminal, create a policy that allows root user all access and for all other users denies `PutObject`:
    
    ```sh
    cat > example.rego <<EOF
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Jul 17 15:43:14 UTC 2022
    - 2.3K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/ImmutableMap.java

            @Nullable Object[] localAlternatingKeysAndValues, int size) {
          Set<Object> seenKeys = new HashSet<>();
          BitSet dups = new BitSet(); // slots that are overridden by a later duplicate key
          for (int i = size - 1; i >= 0; i--) {
            Object key = requireNonNull(localAlternatingKeysAndValues[2 * i]);
            if (!seenKeys.add(key)) {
              dups.set(i);
            }
          }
          if (dups.isEmpty()) {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 41.5K bytes
    - Viewed (0)
  7. ci/official/containers/linux_arm64/devel.bashrc

    # limitations under the License.
    #
    # ==============================================================================
    
    # Do not print anything if this is not being used interactively
    [ -z "$PS1" ] && return
    
    # Set up attractive prompt
    export PS1="\[\e[31m\]tf-docker\[\e[m\] \[\e[33m\]\w\[\e[m\] > "
    export TERM=xterm-256color
    alias grep="grep --color=auto"
    alias ls="ls --color=auto"
    # Fix nvidia-docker
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Mon Sep 18 14:52:45 UTC 2023
    - 988 bytes
    - Viewed (0)
  8. src/test/java/org/codelibs/core/collection/ArrayUtilTest.java

         * @throws Exception
         */
        @Test
        public void testSetArrayValue() throws Exception {
            final Object o = Array.newInstance(int.class, 3);
            Array.set(o, 0, new Integer(1));
            Array.set(o, 1, new Integer(2));
            Array.set(o, 2, new Integer(3));
            final int[] num = (int[]) o;
            assertArrayEquals(new int[] { 1, 2, 3 }, num);
        }
    
        /**
         * @throws Exception
         */
    Registered: Fri Nov 01 20:58:10 UTC 2024
    - Last Modified: Thu Mar 07 01:59:08 UTC 2024
    - 10.6K bytes
    - Viewed (0)
  9. common-protos/k8s.io/api/rbac/v1/generated.proto

      // +optional
      repeated string resources = 3;
    
      // ResourceNames is an optional white list of names that the rule applies to.  An empty set means that everything is allowed.
      // +optional
      repeated string resourceNames = 4;
    
      // NonResourceURLs is a set of partial urls that a user should have access to.  *s are allowed, but only as the full, final step in the path
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  10. docs/sts/client-grants.md

    # AssumeRoleWithClientGrants [![Slack](https://slack.min.io/slack?type=svg)](https://slack.min.io)
    
    ## Introduction
    
    Returns a set of temporary security credentials for applications/clients who have been authenticated through client credential grants provided by identity provider. Example providers include KeyCloak, Okta etc.
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 7.2K bytes
    - Viewed (0)
Back to top