- Sort Score
- Result 10 results
- Languages All
Results 221 - 230 of 352 for rejected (0.43 sec)
-
docs/features/interceptors.md
* Don't need to worry about intermediate responses like redirects and retries. * Are always invoked once, even if the HTTP response is served from the cache. * Observe the application's original intent. Unconcerned with OkHttp-injected headers like `If-None-Match`. * Permitted to short-circuit and not call `Chain.proceed()`. * Permitted to retry and make multiple calls to `Chain.proceed()`.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 8.1K bytes - Viewed (0) -
compat/maven-compat/src/test/java/org/apache/maven/repository/MirrorProcessorTest.java
void testMirrorStopOnFirstMatch() { // exact matches win first Mirror mirrorA2 = newMirror("a2", "a,b", "http://a2"); Mirror mirrorA = newMirror("a", "a", "http://a"); // make sure repeated entries are skipped Mirror mirrorA3 = newMirror("a", "a", "http://a3"); Mirror mirrorB = newMirror("b", "b", "http://b"); Mirror mirrorC = newMirror("c", "d,e", "http://de");
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 10.7K bytes - Viewed (0) -
helm-releases/minio-2.0.1.tgz
securityContext: runAsUser: {{ .Values.makeBucketJob.securityContext.runAsUser }} runAsGroup: {{ .Values.makeBucketJob.securityContext.runAsGroup }} fsGroup: {{ .Values.makeBucketJob.securityContext.fsGroup }} {{- end }} volumes: - name: minio-configuration projected: sources: - configMap: name: {{ template "minio.fullname" . }} - secret: name: {{ template "minio.secretName" . }} {{- if .Values.tls.enabled }} - name: cert-secret-volume-mc secret: secretName: {{ .Values.tls.certSecret }} items: - key: {{ .Values.tls.publicCrt...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 31 09:09:09 UTC 2021 - 13.6K bytes - Viewed (0) -
src/test/java/jcifs/dcerpc/DcerpcPipeHandleTest.java
// Setup buffer cache to return buffers for sendrecv operations lenient().when(mockBufferCache.getBuffer()).thenReturn(new byte[8192]); } /** * Helper method to create a DcerpcPipeHandle with injected mocks * Uses mock to avoid constructor issues while allowing real method calls */ private DcerpcPipeHandle createMockedDcerpcPipeHandle() throws Exception { // Create a mock without calling the constructor
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 21K bytes - Viewed (0) -
cmd/globals.go
diskMinInodes = 1000 // tlsClientSessionCacheSize is the cache size for client sessions. tlsClientSessionCacheSize = 100 ) func init() { // Injected to prevent circular dependency. pubsub.GetByteBuffer = grid.GetByteBuffer } type poolDisksLayout struct { cmdline string layout [][]string } type disksLayout struct { legacy bool
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 16.2K bytes - Viewed (1) -
src/main/java/jcifs/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA |
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/session/Smb2SessionSetupResponseTest.java
assertEquals(sessionFlags, resp.getSessionFlags(), "Session flags should decode"); assertTrue(resp.isLoggedInAsGuest(), "Guest/anonymous should be detected"); // prepare should propagate session id when received CIFSContext mockCtx = mock(CIFSContext.class); when(mockCtx.getConfig()).thenReturn(mock(Configuration.class));
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA |
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
src/test/java/jcifs/EmptyIteratorTest.java
assertFalse(emptyIterator.hasNext(), "hasNext should consistently return false"); assertFalse(emptyIterator.hasNext(), "hasNext should always return false on repeated calls"); } @Test @DisplayName("next should return null") void testNextReturnsNull() { // When SmbResource result = emptyIterator.next(); // Then
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 12K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
* collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is * detected, sacrificing the compactness guarantee in very rare cases in exchange for much * more reliable worst-case behavior.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0)