- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 69 for moet (0.38 sec)
-
src/main/java/org/codelibs/fess/util/RenderDataUtil.java
data.register(key, BeanUtil.copyBeanToNewMap(value)); } else { if (value instanceof final Collection<?> coll && !coll.isEmpty()) { // care performance for List that the most frequent pattern final Object first = coll instanceof List<?> ? ((List<?>) coll).get(0) : coll.iterator().next(); if (first instanceof Entity) {
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 2.6K bytes - Viewed (0) -
src/test/java/jcifs/smb/SmbSessionImplTest.java
// Context and credentials wiring - used by most tests when(cifsContext.getCredentials()).thenReturn(credentials); when(credentials.unwrap(CredentialsInternal.class)).thenReturn(credentialsInternal); when(credentialsInternal.clone()).thenReturn(credentialsInternal); // Transport wiring - used by most tests when(transport.acquire()).thenReturn(transport);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 12.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/service/CrawlingInfoService.java
}); } /** * Retrieves the most recent crawling information record for a given session ID. * Orders by creation time in descending order and returns only the first result. * * @param sessionId the session identifier to find the latest crawling information for * @return the most recent CrawlingInfo entity for the session, or null if none found */Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 19.9K bytes - Viewed (0) -
LICENSE
(This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.) Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and changeRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/AbstractExtractor.java
throw new CrawlerSystemException("Could not create a temp file.", e); } } /** * Validates that the input stream is not null. * This is a common validation performed by most extractors. * * @param in The input stream to validate * @throws CrawlerSystemException if the input stream is null */ protected void validateInputStream(final InputStream in) {
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Wed Nov 19 08:55:01 UTC 2025 - 4.6K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/com/SmbComQueryInformationTest.java
import jcifs.Configuration; /** * Unit tests for {@link SmbComQueryInformation}. The class is very small and * mainly focuses on serialising a command header that contains a file name. * <p> * Because most of the logic lives in {@link jcifs.internal.smb1.ServerMessageBlock} * the tests create a mock {@link Configuration} and instantiate SmbComQueryInformation * directly. Since the byte‑encoding logic is located in the superclass, theRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 4.9K bytes - Viewed (0) -
src/test/java/jcifs/smb1/dcerpc/ndr/NdrShortTest.java
assertEquals((byte) 0xCD, bufferData[startIndex + alignmentBytes], "Least significant byte should be first"); assertEquals((byte) 0x00, bufferData[startIndex + alignmentBytes + 1], "Most significant byte should be second"); } /** * When given a buffer with sufficient length, decode performs * the inverse of encode. */ @Test
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 5.1K bytes - Viewed (0) -
src/test/java/jcifs/internal/dtyp/SecurityInfoTest.java
} } } @Test @DisplayName("Test constant values follow bit flag pattern") void testConstantsBitFlagPattern() { // Most values should be powers of 2 for bit flag usage assertTrue(isPowerOfTwo(SecurityInfo.OWNER_SECURITY_INFO)); assertTrue(isPowerOfTwo(SecurityInfo.GROUP_SECURITY_INFO));Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 7.5K bytes - Viewed (0) -
LICENSE
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent noticesRegistered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Jan 11 04:26:17 UTC 2021 - 11.1K bytes - Viewed (0) -
LICENSE
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent noticesRegistered: Sat Dec 20 08:54:13 UTC 2025 - Last Modified: Thu Feb 20 19:53:57 UTC 2020 - 11.1K bytes - Viewed (0)