- Sort Score
- Result 10 results
- Languages All
Results 111 - 120 of 133 for discovery (0.22 sec)
-
docs/sts/README.md
2018/12/26 17:49:36 listening on http://localhost:8888/ ``` This will open the login page of keycloak, upon successful login, STS credentials along with any buckets discovered using the credentials will be printed on the screen, for example: ``` { "buckets": [ "bucket-x" ], "credentials": { "AccessKeyID": "6N2BALX7ELO827DXS3GK",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 7.8K bytes - Viewed (0) -
impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/mvn/ProtoSession.java
injector.bindInstance(Injector.class, injector); injector.bindInstance(Context.class, new Context(userProperties, systemProperties)); injector.bindImplicit(Providers.class); injector.discover(ProtoSession.class.getClassLoader()); Session session = injector.getInstance(Session.class); SessionScope scope = new SessionScope(); scope.enter(); scope.seed(Session.class, session);
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 15.4K bytes - Viewed (0) -
src/main/webapp/js/admin/plugins/form-validator/security.js
onSetup",function(){i[0].hasValidationCallback=!1,i.off("keyup",j)})}return b===g},errorMessage:"",errorMessageKey:"notConfirmed"});var c={amex:[15,15],diners_club:[14,14],cjb:[16,16],laser:[16,19],visa:[16,16],mastercard:[16,16],maestro:[12,19],discover:[16,16]},d=!1,e=!1;a.formUtils.addValidator({name:"creditcard",validatorFunction:function(b,f){var g=a.split(f.valAttr("allowing")||"");if(e=a.inArray("amex",g)>-1,d=e&&1===g.length,g.length>0){var h=!1;if(a.each(g,function(d,e){if(e in c){if(b....
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Mon Jan 01 05:12:47 UTC 2018 - 10.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
- Fix kubectl config flags incorrectly setting burst and discovery limits ([#108401](https://github.com/kubernetes/kubernetes/pull/108401), [@ulucinar](https://github.com/ulucinar)) [SIG CLI]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/connection/RealConnectionPool.kt
var i = 0 while (i < references.size) { val reference = references[i] if (reference.get() != null) { i++ continue } // We've discovered a leaked call. This is an application bug. val callReference = reference as CallReference val message = "A connection to ${connection.route().address.url} was leaked. " +
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Apr 20 17:03:43 UTC 2024 - 16.2K bytes - Viewed (0) -
android/guava/src/com/google/common/escape/UnicodeEscaper.java
} return index; } /** * Returns the escaped form of a given literal string, starting at the given index. This method is * called by the {@link #escape(String)} method when it discovers that escaping is required. It is * protected to allow subclasses to override the fastpath escaping function to inline their * escaping test. See {@link CharEscaperBuilder} for an example usage. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jan 18 20:55:09 UTC 2022 - 13.2K bytes - Viewed (0) -
CONTRIBUTING.md
Tasks known to have problems are listed in the build logic. You can find this list at: build-logic/root-build/src/main/kotlin/gradlebuild.internal.cc-experiment.gradle.kts If you discover a task that doesn't work with the configuration but it not in this list, please add it. For more information on the configuration cache, see the [user manual](https://docs.gradle.org/current/userguide/configuration_cache.html).
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Nov 05 15:15:33 UTC 2024 - 15.6K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash * code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to * make it as infeasible as possible to reverse-engineer the input that produced a given hash * code, or even to discover <i>any</i> two distinct inputs that yield the same result. These * are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match. If you want to play with JWT tokens and see how they work, check <a href="https://jwt.io/" class="external-link" target="_blank">https://jwt.io</a>. ## Install `PyJWT`
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0)