Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 551 - 560 of 895 for veriyi (0.05 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. buildscripts/multipart-quorum-test.sh

    #!/bin/bash
    
    if [ -n "$TEST_DEBUG" ]; then
    	set -x
    fi
    
    WORK_DIR="$PWD/.verify-$RANDOM"
    MINIO_CONFIG_DIR="$WORK_DIR/.minio"
    MINIO=("$PWD/minio" --config-dir "$MINIO_CONFIG_DIR" server)
    
    if [ ! -x "$PWD/minio" ]; then
    	echo "minio executable binary not found in current directory"
    	exit 1
    fi
    
    if [ ! -x "$PWD/minio" ]; then
    	echo "minio executable binary not found in current directory"
    	exit 1
    fi
    
    trap 'catch $LINENO' ERR
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Sep 06 10:51:23 GMT 2024
    - 2.9K bytes
    - Click Count (0)
  2. docs/sts/keycloak.md

        - `Token Claim Name` is `policy`
        - `Claim JSON Type` is `string`
      - Save
    
    - Open <http://localhost:8080/auth/realms/{your-realm-name}/.well-known/openid-configuration> to verify OpenID discovery document, verify it has `authorization_endpoint` and `jwks_uri`
    
    ### Enable Keycloak Admin REST API support
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 8.1K bytes
    - Click Count (0)
  3. src/test/java/org/codelibs/fess/thumbnail/impl/CommandGeneratorTest.java

            // Test timeout configuration without triggering component dependencies
            generator.setCommandTimeout(100L); // Very short timeout
            generator.setCommandDestroyTimeout(50L);
    
            // Test that timeout values are set (we can't verify execution without components)
            assertTrue("Timeout values should be configurable", true);
    
            // Test edge cases
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Mar 13 23:01:26 GMT 2026
    - 27.8K bytes
    - Click Count (0)
  4. android/guava-tests/test/com/google/common/io/FilesTest.java

        byte[] bytes = newPreFilledByteArray(size);
    
        // Setup
        File file = createTempFile();
        Files.write(bytes, file);
    
        // Test
        MappedByteBuffer actual = Files.map(file);
    
        // Verify
        ByteBuffer expected = ByteBuffer.wrap(bytes);
        assertTrue("ByteBuffers should be equal.", expected.equals(actual));
      }
    
      public void testMap_noSuchFile() throws IOException {
        // Setup
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Mar 19 18:53:45 GMT 2026
    - 22.8K bytes
    - Click Count (0)
  5. docs_src/security/tutorial004_py310.py

    DUMMY_HASH = password_hash.hash("dummypassword")
    
    oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
    
    app = FastAPI()
    
    
    def verify_password(plain_password, hashed_password):
        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 18:10:35 GMT 2026
    - 4.1K bytes
    - Click Count (0)
  6. guava-tests/test/com/google/common/collect/IterablesTest.java

        // Test & Verify
        verifyMergeSorted(iterables, ImmutableList.<Integer>of());
      }
    
      public void testMergeSorted_single() {
        // Setup
        Iterable<Integer> iterable0 = ImmutableList.of(1, 2, 3);
        Iterable<Iterable<Integer>> iterables = ImmutableList.of(iterable0);
    
        // Test & Verify
        verifyMergeSorted(iterables, iterable0);
      }
    
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Fri Mar 13 13:01:07 GMT 2026
    - 47.5K bytes
    - Click Count (0)
  7. src/test/java/jcifs/BufferCacheTest.java

        @Test
        @DisplayName("BufferCache interface should define correct method signatures")
        void testInterfaceContract() {
            // Given
            BufferCache cache = mockBufferCache;
    
            // When & Then - verify interface methods exist and can be called
            assertDoesNotThrow(() -> {
                cache.getBuffer();
                cache.releaseBuffer(new byte[1024]);
            }, "All BufferCache interface methods should be callable");
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 4.3K bytes
    - Click Count (0)
  8. android/guava-testlib/src/com/google/common/collect/testing/testers/AbstractListTester.java

        return (List<E>) collection;
      }
    
      /**
       * {@inheritDoc}
       *
       * <p>The {@code AbstractListTester} implementation overrides {@link
       * AbstractCollectionTester#expectContents(Collection)} to verify that the order of the elements
       * in the list under test matches what is expected.
       */
      @Override
      protected void expectContents(Collection<E> expectedCollection) {
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 2.9K bytes
    - Click Count (0)
  9. src/test/java/jcifs/smb/MultiChannelManagerBasicTest.java

    import org.junit.jupiter.api.Test;
    import org.junit.jupiter.api.DisplayName;
    
    import jcifs.CIFSException;
    import jcifs.Configuration;
    import jcifs.config.BaseConfiguration;
    
    /**
     * Basic tests for MultiChannelManager to verify the createChannelTransport implementation.
     */
    public class MultiChannelManagerBasicTest {
    
        private MultiChannelManager multiChannelManager;
        private Configuration config;
    
        @BeforeEach
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 4K bytes
    - Click Count (0)
  10. SECURITY.md

    - If you receive no response: ******@****.***
    
    ### Disclosure Process
    
    MinIO uses the following disclosure process:
    
    1. Once the security report is received one member of the security team tries to verify and reproduce
       the issue and determines the impact it has.
    2. A member of the security team will respond and either confirm or reject the security report.
       If the report is rejected the response explains why.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 2.2K bytes
    - Click Count (0)
Back to Top