- Sort Score
- Num 10 results
- Language All
Results 191 - 200 of 346 for unlink (0.08 seconds)
-
cmd/erasure-heal_test.go
"testing" ) var erasureHealTests = []struct { dataBlocks, disks int // number of offline disks is also number of staleDisks for // erasure reconstruction in this test offDisks int // bad disks are online disks which return errors badDisks, badStaleDisks int blocksize, size int64 algorithm BitrotAlgorithm shouldFail bool }{
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 7.9K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
cmd/bootstrap-peer-server.go
defer wg.Done() if clnt.gridConn.State() != grid.StateConnected { mu.Lock() offlineEndpoints = append(offlineEndpoints, fmt.Errorf("%s is unreachable: %w", clnt, grid.ErrDisconnected)) mu.Unlock() return } ctx, cancel := context.WithTimeout(ctx, 2*time.Second) defer cancel() err := clnt.Verify(ctx, srcCfg) mu.Lock() if err != nil {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Oct 01 22:13:18 GMT 2024 - 8.4K bytes - Click Count (0) -
cmd/metacache-walk.go
ForwardTo string // Limit the number of returned objects if > 0. Limit int // DiskID contains the disk ID of the disk. // Leave empty to not check disk ID. DiskID string } // supported FS for Nlink optimization in readdir. const ( xfs = "XFS" ext4 = "EXT4" ) // WalkDir will traverse a directory and return all entries found. // On success a sorted meta cache stream will be returned.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon May 26 07:06:43 GMT 2025 - 12.6K bytes - Click Count (0) -
compat/maven-compat/src/main/java/org/apache/maven/artifact/repository/LegacyLocalRepositoryManager.java
* repository's layout to allow pointing at artifacts within the repository. Unfortunately, * DefaultRepositoryLayout does not correctly describe the layout of a local repository which unlike a remote * repository never uses timestamps in the filename of a snapshot artifact. The discrepancy gets notable when a
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Jun 06 14:28:57 GMT 2025 - 13.1K bytes - Click Count (0) -
futures/listenablefuture1/src/com/google/common/util/concurrent/ListenableFuture.java
* more futures or adding more {@code directExecutor()} listeners inline -- consider {@link * MoreExecutors#directExecutor}. Otherwise, avoid it: See the warnings on the docs for {@code * directExecutor}. * * <p>This is the most general listener interface. For common operations performed using * listeners, see {@link Futures}. For a simplified but general listener interface, see {@link * Futures#addCallback addCallback()}. *Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 8K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/ListenableFuture.java
* more futures or adding more {@code directExecutor()} listeners inline -- consider {@link * MoreExecutors#directExecutor}. Otherwise, avoid it: See the warnings on the docs for {@code * directExecutor}. * * <p>This is the most general listener interface. For common operations performed using * listeners, see {@link Futures}. For a simplified but general listener interface, see {@link * Futures#addCallback addCallback()}. *Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 8K bytes - Click Count (0) -
api/maven-api-toolchain/src/main/mdo/toolchains.mdo
<code> <![CDATA[ /** * Computes a hash value based on {@link #getType()} and {@link #getProvides()} values. */ public int hashCode() { return java.util.Objects.hash(getType(), getProvides()); } //-- int hashCode() /** * Checks equality based on {@link #getType()} and {@link #getProvides()} values. */ public boolean equals(Object other) {
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Sun May 18 09:15:56 GMT 2025 - 9.5K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0) -
guava/src/com/google/common/base/Stopwatch.java
* successive readings of "now" in the same process. * * <p>In contrast, <i>wall time</i> is a reading of "now" as given by a method like * {@link System#currentTimeMillis()}, best represented as an {@link java.time.Instant}. Such values * <i>can</i> be subtracted to obtain a {@link Duration} (such as by {@link Duration#between}), but * doing so does <i>not</i> give a reliable measurement of elapsed time, because wall time readings
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Oct 08 18:55:33 GMT 2025 - 9.2K bytes - Click Count (0)