Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1221 - 1230 of 1,781 for Source (0.09 sec)

  1. architecture/security/istio-agent.md

    * If a socket is found, istio-agent will not start its own SDS Server and Envoy will be configured to use that socket as its source of cryptographic material.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Jul 18 23:11:18 UTC 2024
    - 7.2K bytes
    - Viewed (0)
  2. fess-crawler/pom.xml

    		<relativePath>../pom.xml</relativePath>
    	</parent>
    	<build>
    		<plugins>
    			<plugin>
    				<artifactId>maven-compiler-plugin</artifactId>
    			</plugin>
    			<plugin>
    				<artifactId>maven-source-plugin</artifactId>
    			</plugin>
    			<plugin>
    				<artifactId>maven-surefire-plugin</artifactId>
    				<configuration>
    					<excludes>
    						<exclude>**/JodExtractorTest.java</exclude>
    					</excludes>
    Registered: Sun Nov 10 03:50:12 UTC 2024
    - Last Modified: Thu Feb 22 01:47:13 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  3. cmd/bucket-object-lock.go

    		}
    		if retentionPermErr != ErrNone {
    			return mode, retainDate, legalHold, retentionPermErr
    		}
    		return rMode, rDate, legalHold, ErrNone
    	}
    	if replica { // replica inherits retention metadata only from source
    		return "", objectlock.RetentionDate{}, legalHold, ErrNone
    	}
    	if !retentionRequested && retentionCfg.Validity > 0 {
    		if retentionPermErr != ErrNone {
    			return mode, retainDate, legalHold, retentionPermErr
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 13.2K bytes
    - Viewed (0)
  4. architecture/environments/operator.md

    in-cluster CR is updated and the controller acts upon it to generate a new manifest to apply to the cluster. Note that
    both the charts and configuration profiles can come from three different sources: compiled-in, local filesystem.
    The source may be selected independently for the charts and profiles. The different steps in creating the manifest are
    as follows:
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Jul 29 21:11:35 UTC 2024
    - 13.2K bytes
    - Viewed (0)
  5. guava/src/com/google/common/collect/TreeMultimap.java

        setMap(new TreeMap<K, Collection<V>>(keyComparator));
        Serialization.populateMultimap(this, stream);
      }
    
      @GwtIncompatible // not needed in emulated source
      @J2ktIncompatible
      private static final long serialVersionUID = 0;
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Mar 09 00:21:17 UTC 2024
    - 8.7K bytes
    - Viewed (0)
  6. cmd/encryption-v1.go

    	}
    
    	// In case of SSE-C, we have to decrypt the OEK using the client-provided key.
    	// In case of a SSE-C server-side copy, the client might provide two keys,
    	// one for the source and one for the target. This reader is the source.
    	var ssecClientKey []byte
    	if crypto.SSEC.IsEncrypted(oi.UserDefined) {
    		if copySource && crypto.SSECopy.IsRequested(h) {
    			key, err := crypto.SSECopy.ParseHTTP(h)
    			if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  7. guava-tests/test/com/google/common/collect/TreeMultimapNaturalTest.java

      private static final Comparator<Double> VALUE_COMPARATOR =
          Ordering.<Double>natural().reverse().nullsFirst();
    
      /**
       * Test that creating one TreeMultimap from another does not copy the comparators from the source
       * TreeMultimap.
       */
      public void testCreateFromTreeMultimap() {
        Multimap<Double, Double> tree = TreeMultimap.create(KEY_COMPARATOR, VALUE_COMPARATOR);
        tree.put(1.0, 2.0);
        tree.put(2.0, 3.0);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 22.3K bytes
    - Viewed (0)
  8. src/cmd/api/main_test.go

    // Copyright 2011 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    // This package computes the exported API of a set of Go packages.
    // It is only a test, not a command, nor a usefully importable package.
    
    package main
    
    import (
    	"bufio"
    	"bytes"
    	"encoding/json"
    	"fmt"
    	"go/ast"
    	"go/build"
    	"go/parser"
    	"go/token"
    	"go/types"
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Wed Sep 04 18:16:59 UTC 2024
    - 31.4K bytes
    - Viewed (0)
  9. okhttp-dnsoverhttps/src/main/kotlin/okhttp3/dnsoverhttps/DnsOverHttps.kt

            throw IOException(
              "response size exceeds limit ($MAX_RESPONSE_SIZE bytes): ${body.contentLength()} bytes",
            )
          }
    
          val responseBytes = body.source().readByteString()
    
          return DnsRecordCodec.decodeAnswers(hostname, responseBytes)
        }
      }
    
      private fun buildRequest(
        hostname: String,
        type: Int,
      ): Request =
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Thu Oct 31 09:27:31 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/body-nested-models.md

    ```
    
    ////
    
    With this, even if you receive a request with duplicate data, it will be converted to a set of unique items.
    
    And whenever you output that data, even if the source had duplicates, it will be output as a set of unique items.
    
    And it will be annotated / documented accordingly too.
    
    ## Nested Models
    
    Each attribute of a Pydantic model has a type.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 9.4K bytes
    - Viewed (0)
Back to top