Search Options

Results per page
Sort
Preferred Languages
Advance

Results 651 - 660 of 1,040 for each (0.04 sec)

  1. android/guava/src/com/google/common/xml/XmlEscapers.java

     */
    @GwtCompatible
    public class XmlEscapers {
      private XmlEscapers() {}
    
      private static final char MIN_ASCII_CONTROL_CHAR = 0x00;
      private static final char MAX_ASCII_CONTROL_CHAR = 0x1F;
    
      // For each xxxEscaper() method, please add links to external reference pages
      // that are considered authoritative for the behavior of that escaper.
    
      /**
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Jun 20 17:15:33 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  2. guava-gwt/src-super/com/google/common/collect/super/com/google/common/collect/ForwardingSortedMultiset.java

       * #descendingMultiset()} will not reflect any changes you make to the behavior of methods such as
       * {@link #add(Object)} or {@link #pollFirstEntry}. This skeleton implementation correctly
       * delegates each of its operations to the appropriate methods of this {@code
       * ForwardingSortedMultiset}.
       *
       * <p>In many cases, you may wish to override {@link #descendingMultiset()} to return an instance
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 8K bytes
    - Viewed (0)
  3. guava-tests/test/com/google/common/collect/FauxveridesTest.java

    import junit.framework.TestCase;
    import org.jspecify.annotations.NullUnmarked;
    import org.jspecify.annotations.Nullable;
    
    /**
     * Tests that all {@code public static} methods "inherited" from superclasses are "overridden" in
     * each immutable-collection class. This ensures, for example, that a call written "{@code
     * ImmutableSortedSet.copyOf()}" cannot secretly be a call to {@code ImmutableSet.copyOf()}.
     *
     * @author Chris Povirk
     */
    @NullUnmarked
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  4. guava/src/com/google/common/util/concurrent/ExecutionList.java

    import java.util.logging.Level;
    import org.jspecify.annotations.Nullable;
    
    /**
     * A support class for {@code ListenableFuture} implementations to manage their listeners. An
     * instance contains a list of listeners, each with an associated {@code Executor}, and guarantees
     * that every {@code Runnable} that is {@linkplain #add added} will be executed after {@link
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  5. src/test/java/jcifs/smb/SmbTreeConnectionTraceTest.java

        }
    
        @ParameterizedTest(name = "Invalid usage causes NPE: {0}")
        @MethodSource("npePublicGetters")
        void getters_withoutTree_throwNPE(String name, org.junit.jupiter.api.function.Executable call) {
            // Each call is invalid without a held tree and should throw NPE
            assertThrows(NullPointerException.class, call);
        }
    
        static java.util.stream.Stream<Arguments> wrapExceptions() {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  6. docs/sts/README.md

    - [Configuring etcd](https://github.com/minio/minio/blob/master/docs/sts/etcd.md)
    
    ### Setup MinIO with Identity Provider
    
    Make sure we have followed the previous step and configured each software independently, once done we can now proceed to use MinIO STS API and MinIO server to use these credentials to perform object API operations.
    
    #### KeyCloak
    
    ```
    export MINIO_ROOT_USER=minio
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  7. docs/kms/IAM.md

    > Please note that losing the `MINIO_KMS_SECRET_KEY` will cause data loss
    > since you will not be able to decrypt the IAM/configuration data anymore.
    For distributed MinIO deployments, specify the *same* `MINIO_KMS_SECRET_KEY` for each MinIO server process.
    
    At any point in time you can switch from `MINIO_KMS_SECRET_KEY` to a full KMS
    deployment. You just need to import the generated key into KES - for example via
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  8. src/main/webapp/js/admin/plugins/daterangepicker/daterangepicker.js

                // add week number label
                if (this.showWeekNumbers || this.showISOWeekNumbers)
                    html += '<th class="week">' + this.locale.weekLabel + '</th>';
    
                $.each(this.locale.daysOfWeek, function(index, dayOfWeek) {
                    html += '<th>' + dayOfWeek + '</th>';
                });
    
                html += '</tr>';
                html += '</thead>';
                html += '<tbody>';
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 64.8K bytes
    - Viewed (0)
  9. guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java

       */
      @AndroidIncompatible // slow. TODO(cpovirk): Maybe just reduce iterations under Android.
      public void testExhaustive() throws Exception {
        Random random = new Random(0); // will iteratively make more debuggable, each time it breaks
        for (int totalInsertions = 0; totalInsertions < 200; totalInsertions++) {
    
          List<Sink> sinks = new ArrayList<>();
          for (int chunkSize = 4; chunkSize <= 32; chunkSize++) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 17:27:14 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  10. src/main/java/jcifs/ACE.java

     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
Back to top