- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 2,045 for we (0.01 sec)
-
cni/pkg/plugin/plugin.go
// Defer a panic recover, so that in case if panic we can still return // a proper error to the runtime. defer func() { if e := recover(); e != nil { msg := fmt.Sprintf("istio-cni panicked during cmdAdd: %v\n%v", e, string(debug.Stack())) if err != nil { // If we're recovering and there was also an error, then we need to // present both. msg = fmt.Sprintf("%s: %v", msg, err) }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Aug 14 19:36:19 UTC 2024 - 10.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 9.8K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AbstractService.java
} finally { monitor.leave(); } } else { // It is possible due to races that we are currently in the expected state even though we // timed out. e.g. if we weren't event able to grab the lock within the timeout we would never // even check the guard. I don't think we care too much about this use case but it could lead // to a confusing error message.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri May 12 18:32:03 UTC 2023 - 20.7K bytes - Viewed (0) -
internal/handlers/proxy.go
// specified in the Forwarded header. The first element will always be // the 'for=', which we ignore, subsequently we proceed to look for // 'proto=' which should precede right after `for=` if not // we simply ignore the values and return empty. This is in line // with the approach we took for returning first ip from multiple // params. if match := forRegex.FindStringSubmatch(proto); len(match) > 1 {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Dec 22 00:56:55 UTC 2023 - 5.1K bytes - Viewed (0) -
proguard/base.pro
# Note: We intentionally don't add the flags we'd need to make Flags and Enums # work. That's because the Proguard configuration required to make them work on # optimized code would preclude lots of optimization, like converting enums # into ints. # Throwables uses internal APIs for lazy stack trace resolution -dontnote sun.misc.SharedSecrets -keep class sun.misc.SharedSecrets { *** getJavaLangAccess(...); } -dontnote sun.misc.JavaLangAccess
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 09 00:29:01 UTC 2023 - 1.2K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/AbstractNonStreamingHashFunctionTest.java
// we pad because the dummy hash function we use to test this, merely copies the input into // the output, so the input must be at least 32 bits, since the output has to be that long assertPutString(new char[] {'p', HashTestUtils.randomLowSurrogate(new Random())}); } public void testPutStringWithHighSurrogate() { // we pad because the dummy hash function we use to test this, merely copies the input into
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Dec 04 17:37:03 UTC 2017 - 4.4K bytes - Viewed (0) -
istioctl/pkg/proxyconfig/proxyconfig_test.go
{ // supplying valid pod name retrieves Envoy config (fails because we don't check in Envoy config unit tests) execClientConfig: loggingConfig, args: strings.Split("clusters httpbin-794b576b6c-qx6pf", " "), expectedString: `config dump has no configuration type`, wantException: true, }, { // supplying valid pod name retrieves Envoy config (fails because we don't check in Envoy config unit tests)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Apr 10 21:51:29 UTC 2024 - 8.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
* The API checks that `username` and `password`, and responds with a "token" (we haven't implemented any of this yet). * A "token" is just a string with some content that we can use later to verify this user. * Normally, a token is set to expire after some time. * So, the user will have to log in again at some point later.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0) -
SECURITY.md
whether these uses were recommended or considered safe, or where we recommend some form of isolation when dealing with untrusted data. As a result, this document also outlines what issues we consider as TensorFlow security vulnerabilities. We recognize issues as vulnerabilities only when they occur in scenarios that we outline as safe; issues that have a security impact only when TensorFlow is used
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
okhttp-java-net-cookiejar/src/main/kotlin/okhttp3/java/net/cookiejar/JavaNetCookieJar.kt
} } override fun loadForRequest(url: HttpUrl): List<Cookie> { val cookieHeaders = try { // The RI passes all headers. We don't have 'em, so we don't pass 'em! cookieHandler.get(url.toUri(), emptyMap<String, List<String>>()) } catch (e: IOException) { Platform.get().log("Loading cookies failed for " + url.resolve("/...")!!, WARN, e)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Apr 06 04:10:43 UTC 2024 - 3.8K bytes - Viewed (0)