Search Options

Results per page
Sort
Preferred Languages
Advance

Results 391 - 400 of 559 for slashes (0.06 sec)

  1. src/test/java/org/codelibs/fess/helper/RelatedContentHelperTest.java

            RelatedContent entity = new RelatedContent();
            entity.setTerm(term);
            entity.setContent(content);
            entity.setVirtualHost(virtualHost);
            return entity;
        }
    
        // Mock classes
    
        static class MockRelatedContentBhv extends RelatedContentBhv {
            private List<RelatedContent> testData = new ArrayList<>();
    
            public void setTestData(List<RelatedContent> testData) {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 19 23:49:30 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  2. src/test/java/jcifs/internal/smb2/ServerMessageBlock2RequestTest.java

                    testRequest.encode(buffer, 0);
                });
    
                assertTrue(exception.getMessage().contains("Wrong size calculation"));
            }
        }
    
        // Test implementation classes
        private static class TestServerMessageBlock2Request extends ServerMessageBlock2Request<TestServerMessageBlock2Response> {
            private TestServerMessageBlock2Response testResponse;
            private int testSize = 64;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 15.7K bytes
    - Viewed (0)
  3. src/test/java/org/codelibs/fess/helper/NotificationHelperTest.java

            assertNotNull(result);
            assertTrue(result.contains("Subject with"));
            assertTrue(result.contains("Content with"));
            assertTrue(result.contains("backslash"));
        }
    
        // Mock classes
        private static class MockFessConfig extends FessConfig.SimpleImpl {
            private static final long serialVersionUID = 1L;
    
            @Override
            public String getSlackWebhookUrls() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 10 13:41:04 UTC 2025
    - 19.6K bytes
    - Viewed (0)
  4. src/test/java/org/codelibs/fess/helper/SearchHelperTest.java

        }
    
        // Helper methods for creating mock objects
        private SearchRequestParams createMockSearchRequestParams() {
            return new MockSearchRequestParams();
        }
    
        // Mock classes
        private static class MockFessConfig extends FessConfig.SimpleImpl {
            private static final long serialVersionUID = 1L;
    
            @Override
            public String getCookieSearchParameterRequiredKeys() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 19 23:49:30 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  5. src/test/java/org/codelibs/fess/entity/FacetQueryViewTest.java

            uniqueQueries.add("filetype:others");
    
            for (String query : uniqueQueries) {
                assertTrue(testFacetInfo.getAddedQueries().contains(query));
            }
        }
    
        // Helper classes for testing
        private static class TestFacetInfo extends FacetInfo {
            private final List<String> addedQueries = new ArrayList<>();
    
            @Override
            public void addQuery(String s) {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 17.6K bytes
    - Viewed (0)
  6. docs/en/docs/features.md

        * Because pydantic data structures are just instances of classes you define; auto-completion, linting, mypy and your intuition should all work properly with your validated data.
    * Validate **complex structures**:
        * Use of hierarchical Pydantic models, Python `typing`’s `List` and `Dict`, etc.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.5K bytes
    - Viewed (0)
  7. android/guava-tests/test/com/google/common/collect/SetsTest.java

      }
    
      private static <E> List<E> list(E... elements) {
        return ImmutableList.copyOf(elements);
      }
    
      /**
       * Utility method to verify that the given LinkedHashSet is equal to and hashes identically to a
       * set constructed with the elements in the given collection. Also verifies that the ordering in
       * the set is the same as the ordering of the given contents.
       */
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 45.3K bytes
    - Viewed (0)
  8. cmd/object-api-errors.go

    type ObjectNameInvalid GenericError
    
    // ObjectNameTooLong - object name too long.
    type ObjectNameTooLong GenericError
    
    // ObjectNamePrefixAsSlash - object name has a slash as prefix.
    type ObjectNamePrefixAsSlash GenericError
    
    // Error returns string an error formatted as the given text.
    func (e ObjectNameInvalid) Error() string {
    	return "Object name invalid: " + e.Bucket + "/" + e.Object
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 09 02:05:14 UTC 2024
    - 22.1K bytes
    - Viewed (0)
  9. docs/de/docs/tutorial/security/simple-oauth2.md

    Sie können jedoch nicht vom Kauderwelsch zurück zum Passwort konvertieren.
    
    ##### Warum Passwort-Hashing verwenden?
    
    Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes.
    
    Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  10. docs/es/docs/tutorial/security/simple-oauth2.md

    Pero no puedes convertir del galimatías al password.
    
    ##### Por qué usar hashing de passwords
    
    Si tu base de datos es robada, el ladrón no tendrá los passwords en texto plano de tus usuarios, solo los hashes.
    
    Entonces, el ladrón no podrá intentar usar esos mismos passwords en otro sistema (como muchos usuarios usan el mismo password en todas partes, esto sería peligroso).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 9.9K bytes
    - Viewed (0)
Back to top