- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 814 for reusing (0.05 sec)
-
src/test/java/org/codelibs/fess/dict/kuromoji/KuromojiFileTest.java
final KuromojiItem kuromojiItem = itemList.get(i); assertEquals("token" + (i + 1), kuromojiItem.getToken()); assertEquals("seg" + (i + 1), kuromojiItem.getSegmentation()); assertEquals("reading" + (i + 1), kuromojiItem.getReading()); assertEquals("pos" + (i + 1), kuromojiItem.getPos()); assertFalse(kuromojiItem.isUpdated()); assertFalse(kuromojiItem.isUpdated()); } }
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:37:57 UTC 2024 - 7.3K bytes - Viewed (0) -
cmd/dummy-data-generator_test.go
n2, e2 := io.ReadFull(r2, b2) if n1 != n2 { return false, fmt.Sprintf("Read %d != %d bytes from the readers", n1, n2) } if !bytes.Equal(b1[:n1], b2[:n2]) { return false, fmt.Sprintf("After reading %d equal buffers (32Kib each), we got the following two strings:\n%v\n%v\n", i, b1, b2) } // Check if stream has ended if (e1 == io.ErrUnexpectedEOF && e2 == io.ErrUnexpectedEOF) || (e1 == io.EOF && e2 == io.EOF) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jul 02 15:13:05 UTC 2024 - 4.7K bytes - Viewed (0) -
istioctl/pkg/authz/authz.go
the policy propagation from Istiod to Envoy and the final AuthorizationPolicy list merged from multiple sources (mesh-level, namespace-level and workload-level). The command also supports reading from a standalone config dump file with flag -f.`, Example: ` # Check AuthorizationPolicy applied to pod httpbin-88ddbcfdd-nt5jb: istioctl x authz check httpbin-88ddbcfdd-nt5jb
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Sat Apr 13 05:23:38 UTC 2024 - 5K bytes - Viewed (0) -
src/main/java/jcifs/pac/ASN1Util.java
length = 0; do { int octet = s.read(); if (octet < 0) { throw new EOFException("EOF found reading length"); } if ((length >>> 23) != 0) { throw new IOException("long form definite-length more than 31 bits"); }
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Mon Oct 02 12:02:06 UTC 2023 - 6.5K bytes - Viewed (0) -
common-protos/k8s.io/api/apidiscovery/v2beta1/generated.proto
// singularResource is the singular name of the resource. This allows clients to handle plural and singular opaquely. // For many clients the singular form of the resource will be more understandable to users reading messages and should be used when integrating the name of the resource into a sentence. // The command line tool kubectl, for example, allows use of the singular resource name in place of plurals.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 7.8K bytes - Viewed (0) -
common-protos/k8s.io/api/discovery/v1beta1/generated.proto
} // EndpointHints provides hints describing how an endpoint should be consumed. message EndpointHints { // forZones indicates the zone(s) this endpoint should be consumed by to // enable topology aware routing. May contain a maximum of 8 entries. // +listType=atomic repeated ForZone forZones = 1; } // EndpointPort represents a Port used by an EndpointSlice message EndpointPort {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8K bytes - Viewed (0) -
cmd/erasure-object.go
} if !fi.Deleted && len(fi.Erasure.Distribution) != len(onlineDisks) { err := fmt.Errorf("unexpected file distribution (%v) from online disks (%v), looks like backend disks have been manually modified refusing to heal %s/%s(%s)", fi.Erasure.Distribution, onlineDisks, bucket, object, opts.VersionID) storageLogOnceIf(ctx, err, "get-object-file-info-manually-modified")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 78.8K bytes - Viewed (0) -
docs/security/README.md
- Delete one/some master keys. From a security standpoint, this is equal to erasing all SSE-S3 encrypted objects protected by these master keys. All these objects are lost forever as they cannot be decrypted. Especially deleting all master keys at the KMS is equivalent to secure erasing all SSE-S3 encrypted objects. ## Acronyms - **AEAD**: Authenticated Encryption with Associated Data
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
architecture/networking/controllers.md
# Controllers Istio has a variety of [controllers](https://kubernetes.io/docs/concepts/architecture/controller/), which basically watch some inputs and do something. This can be reading from Kubernetes and writing other objects back, writing to proxies over XDS, etc. Unfortunately, writing controllers is very error prone, even for seemingly simple cases. To work around this, Istio has a variety of abstractions meant to make writing controllers easier. ## Clients
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Feb 09 17:41:25 UTC 2024 - 4.9K bytes - Viewed (0) -
cmd/tier.go
r := rand.New(rand.NewSource(time.Now().UnixNano())) randInterval := func() time.Duration { return time.Duration(r.Float64() * 5 * float64(time.Second)) } // To avoid all MinIO nodes reading the tier config object at the same // time. t := time.NewTimer(tierCfgRefresh + randInterval()) defer t.Stop() for { select { case <-ctx.Done(): return case <-t.C:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 20:44:05 UTC 2024 - 15.7K bytes - Viewed (0)