Search Options

Results per page
Sort
Preferred Languages
Advance

Results 301 - 310 of 445 for impossible (0.04 sec)

  1. docs/en/docs/tutorial/security/oauth2-jwt.md

    But it provides you the tools to simplify the process as much as possible without compromising flexibility, robustness, or security.
    
    And you can use and implement secure, standard protocols, like OAuth2 in a relatively simple way.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  2. docs/security/README.md

    #### Secure Erasure and Locking
    
    The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  3. cmd/metrics.go

    	}
    }
    
    // minioCollector is the Custom Collector
    type minioCollector struct {
    	desc *prometheus.Desc
    }
    
    // Describe sends the super-set of all possible descriptors of metrics
    func (c *minioCollector) Describe(ch chan<- *prometheus.Desc) {
    	ch <- c.desc
    }
    
    // Collect is called by the Prometheus registry when collecting metrics.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Aug 15 12:04:40 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  4. cmd/erasure-healing.go

    			default:
    				hr.After.Drives[i].State = madmin.DriveStateCorrupt
    			}
    		}
    	}
    	return hr, nil
    }
    
    // Populates default heal result item entries with possible values when we are returning prematurely.
    // This is to ensure that in any circumstance we are not returning empty arrays with wrong values.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 34.6K bytes
    - Viewed (0)
  5. cmd/sts-handlers.go

    	// with the common name "foo" will be associated with the policy "foo".
    	// Other mapping functions - e.g. public-key hash based mapping - are
    	// possible but not implemented.
    	//
    	// Group mapping is not possible with standard X.509 certificates.
    	if certificate.Subject.CommonName == "" {
    		writeSTSErrorResponse(ctx, w, ErrSTSMissingParameter, errors.New("certificate subject CN cannot be empty"))
    		return
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  6. .bazelrc

    build:windows --copt=-D_ENABLE_EXTENDED_ALIGNED_STORAGE
    build:windows --host_copt=-D_ENABLE_EXTENDED_ALIGNED_STORAGE
    
    # Enable the runfiles symlink tree on Windows. This makes it possible to build
    # the pip package on Windows without an intermediate data-file archive, as the
    # build_pip_package script in its current form (as of Aug 2023) uses the
    # runfiles symlink tree to decide what to put into the Python wheel.
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Fri Aug 22 21:03:34 UTC 2025
    - 56K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

     *       deadlock situation, and the appropriate Policy is executed.
     * </ul>
     *
     * <p>Note that detection of potential deadlock does not necessarily indicate that deadlock will
     * happen, as it is possible that higher level application logic prevents the cyclic lock
     * acquisition from occurring. One example of a false positive is:
     *
     * <pre>
     * LockA -&gt; LockB -&gt; LockC
     * LockA -&gt; LockC -&gt; LockB
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Jul 18 15:05:43 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.24.md

    ### Container Images
    
    All container images are available as manifest lists and support the described
    architectures. It is also possible to pull a specific architecture directly by
    adding the "-$ARCH" suffix  to the container image name.
    
    name | architectures
    ---- | -------------
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.28.md

    ### Container Images
    
    All container images are available as manifest lists and support the described
    architectures. It is also possible to pull a specific architecture directly by
    adding the "-$ARCH" suffix  to the container image name.
    
    name | architectures
    ---- | -------------
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Oct 23 20:13:20 UTC 2024
    - 456.9K bytes
    - Viewed (1)
  10. android/guava-tests/test/com/google/common/math/QuantilesTest.java

        }
      }
    
      @AndroidIncompatible // slow
      public void testPercentiles_index_computeInPlace() {
        // Assert that the computation gives the correct result for all possible percentiles.
        for (int index = 0; index <= 100; index++) {
          double[] dataset = Doubles.toArray(PSEUDORANDOM_DATASET);
          assertWithMessage("quantile at index " + index)
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 29.8K bytes
    - Viewed (0)
Back to top