Search Options

Results per page
Sort
Preferred Languages
Advance

Results 371 - 380 of 581 for BETWEEN (0.58 sec)

  1. scripts/docs.py

        message = template.render(sponsors=sponsors)
        pre_content = content[frontmatter_end:pre_end]
        post_content = content[post_start:]
        new_content = pre_content + message + post_content
        # Remove content between <!-- only-mkdocs --> and <!-- /only-mkdocs -->
        new_content = re.sub(
            r"<!-- only-mkdocs -->.*?<!-- /only-mkdocs -->",
            "",
            new_content,
            flags=re.DOTALL,
        )
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Dec 21 17:40:17 UTC 2025
    - 16.9K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/TreeRangeMap.java

        }
      }
    
      @Override
      public void putCoalescing(Range<K> range, V value) {
        // don't short-circuit if the range is empty - it may be between two ranges we can coalesce.
        if (entriesByLowerBound.isEmpty()) {
          put(range, value);
          return;
        }
    
        Range<K> coalescedRange = coalescedRange(range, checkNotNull(value));
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 17:50:58 UTC 2025
    - 22.7K bytes
    - Viewed (0)
  3. fastapi/security/oauth2.py

        collected using form data (instead of JSON) and that it should have the specific
        fields `username` and `password`.
    
        All the initialization parameters are extracted from the request.
    
        The only difference between `OAuth2PasswordRequestFormStrict` and
        `OAuth2PasswordRequestForm` is that `OAuth2PasswordRequestFormStrict` requires the
        client to send the form field `grant_type` with the value `"password"`, which
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 21:25:59 UTC 2025
    - 22K bytes
    - Viewed (0)
  4. helm-releases/minio-5.0.6.tgz

    $SCHEME://$MINIO_ENDPOINT:$MINIO_PORT $ACCESS $SECRET" ; $MC_COMMAND ; STATUS=$? ; until [ $STATUS = 0 ] do ATTEMPTS=`expr $ATTEMPTS + 1` ; echo \"Failed attempts: $ATTEMPTS\" ; if [ $ATTEMPTS -gt $LIMIT ]; then exit 1 ; fi ; sleep 2 ; # 1 second intervals between attempts $MC_COMMAND ; STATUS=$? ; done ; set -e ; # reset `e` as active return 0 } # checkBucketExists ($bucket) # Check if the bucket exists, by using the exit code of `mc ls` checkBucketExists() { BUCKET=$1 CMD=$(${MC} stat myminio/$BUCKET > /dev/null...
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Feb 13 06:53:06 UTC 2023
    - 20.3K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/graph/TraverserTest.java

       * {@snippet :
       * a
       * }
       */
      private static final SuccessorsFunction<Character> SINGLE_ROOT = createSingleRootGraph();
    
      /**
       * A graph that is not a tree (for example, it has two antiparallel edge between {@code e} and
       * {@code f} and thus has a cycle) but is a valid input to {@link Traverser#forTree} when starting
       * e.g. at node {@code a} (all edges without an arrow are directed facing downwards):
       *
       * {@snippet :
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 30 17:09:51 UTC 2025
    - 47.4K bytes
    - Viewed (2)
  6. helm-releases/minio-3.6.0.tgz

    $SCHEME://$MINIO_ENDPOINT:$MINIO_PORT $ACCESS $SECRET" ; $MC_COMMAND ; STATUS=$? ; until [ $STATUS = 0 ] do ATTEMPTS=`expr $ATTEMPTS + 1` ; echo \"Failed attempts: $ATTEMPTS\" ; if [ $ATTEMPTS -gt $LIMIT ]; then exit 1 ; fi ; sleep 2 ; # 1 second intervals between attempts $MC_COMMAND ; STATUS=$? ; done ; set -e ; # reset `e` as active return 0 } # checkBucketExists ($bucket) # Check if the bucket exists, by using the exit code of `mc ls` checkBucketExists() { BUCKET=$1 CMD=$(${MC} ls myminio/$BUCKET > /dev/null...
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Mar 13 22:44:21 UTC 2022
    - 17.9K bytes
    - Viewed (0)
  7. helm-releases/minio-3.4.3.tgz

    $SCHEME://$MINIO_ENDPOINT:$MINIO_PORT $ACCESS $SECRET" ; $MC_COMMAND ; STATUS=$? ; until [ $STATUS = 0 ] do ATTEMPTS=`expr $ATTEMPTS + 1` ; echo \"Failed attempts: $ATTEMPTS\" ; if [ $ATTEMPTS -gt $LIMIT ]; then exit 1 ; fi ; sleep 2 ; # 1 second intervals between attempts $MC_COMMAND ; STATUS=$? ; done ; set -e ; # reset `e` as active return 0 } # checkBucketExists ($bucket) # Check if the bucket exists, by using the exit code of `mc ls` checkBucketExists() { BUCKET=$1 CMD=$(${MC} ls myminio/$BUCKET > /dev/null...
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Dec 21 20:55:50 UTC 2021
    - 17.7K bytes
    - Viewed (0)
  8. cmd/site-replication.go

    		Code:  ErrSiteReplicationConfigMissing,
    	}
    }
    
    func errSRIAMConfigMismatch(peer1, peer2 string, s1, s2 madmin.IDPSettings) SRError {
    	return SRError{
    		Cause: fmt.Errorf("IAM/IDP settings mismatch between %s and %s: %#v vs %#v", peer1, peer2, s1, s2),
    		Code:  ErrSiteReplicationIAMConfigMismatch,
    	}
    }
    
    var errSRObjectLayerNotReady = SRError{
    	Cause: fmt.Errorf("object layer not ready"),
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 184.8K bytes
    - Viewed (1)
  9. src/main/java/org/codelibs/fess/sso/spnego/SpnegoAuthenticator.java

     *
     * This class provides Single Sign-On (SSO) authentication using the SPNEGO protocol,
     * which is commonly used for Kerberos-based authentication in Windows environments.
     * It handles the negotiation between client and server to establish a secure
     * authentication context without requiring users to explicitly enter credentials.
     *
     * The authenticator supports various configuration options including delegation,
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 17.8K bytes
    - Viewed (3)
  10. android/guava/src/com/google/common/hash/HashFunction.java

     *
     * <h3>Relationship to {@link Object#hashCode}</h3>
     *
     * <p>Java's baked-in concept of hash codes is constrained to 32 bits, and provides no separation
     * between hash algorithms and the data they act on, so alternate hash algorithms can't be easily
     * substituted. Also, implementations of {@code hashCode} tend to be poor-quality, in part because
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
Back to top