- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 273 for third (0.02 sec)
-
src/test/java/jcifs/internal/CommonServerMessageBlockResponseTest.java
CommonServerMessageBlockResponse second = response.getNextResponse(); CommonServerMessageBlockResponse third = second.getNextResponse(); CommonServerMessageBlockResponse end = third.getNextResponse(); // Then assertEquals(nextResponse, second); assertEquals(thirdResponse, third); assertNull(end); } @Test
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 20.3K bytes - Viewed (0) -
helm/minio/README.md
``` Then install the chart, specifying that you want to use the TLS secret: ```bash helm install --set tls.enabled=true,tls.certSecret=tls-ssl-minio minio/minio ``` ### Installing certificates from third party CAs
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 10.9K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/ConnectionPoolTest.kt
assertThat(pool.connectionCount()).isEqualTo(2) assertThat(c1.socket().isClosed).isFalse() assertThat(c2.socket().isClosed).isFalse() // Add a third connection val c3 = factory.newConnection(pool, routeC1, 75L) // The third connection bounces the first. assertThat(pool.closeConnections(100L)).isEqualTo(0L) assertThat(pool.connectionCount()).isEqualTo(2)
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Tue Oct 07 21:55:03 UTC 2025 - 8.2K bytes - Viewed (0) -
build-logic/integration-testing/src/main/kotlin/gradlebuild/integrationtests/tasks/SmokeTest.kt
* limitations under the License. */ package gradlebuild.integrationtests.tasks import org.gradle.api.tasks.CacheableTask /** * A test that verifies Gradle can be used with popular third party plugins. */ @CacheableTask abstract class SmokeTest : DistributionTest() { override val prefix = "smoke"
Registered: Wed Dec 31 11:36:14 UTC 2025 - Last Modified: Wed Dec 09 08:14:05 UTC 2020 - 889 bytes - Viewed (0) -
VULNERABILITY_REPORT.md
of the code base. ## Scope The vulnerability management policy described in this document covers the process of investigating, assessing and resolving a vulnerability report opened by a MinIO employee or an external third party. Therefore, it lists pre-conditions and actions that should be performed to resolve and fix a reported vulnerability. ## Vulnerability Management Process
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 1.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/CommonServerMessageBlockRequestTest.java
CommonServerMessageBlockRequest third = second.getNext(); CommonServerMessageBlockRequest fourth = third.getNext(); boolean firstAllowsSecond = request.allowChain(nextRequest); boolean secondAllowsThird = nextRequest.allowChain(thirdRequest); // Then assertEquals(nextRequest, second); assertEquals(thirdRequest, third); assertNull(fourth);
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 12.1K bytes - Viewed (0) -
src/test/java/jcifs/smb/DirFileEntryEnumIterator2Test.java
assertSame(fe2, it.next(), "Second element must match first page"); // Next page fetched via fetchMore() assertTrue(it.hasNext(), "Iterator should have third element after fetchMore"); assertSame(fe3, it.next(), "Third element from second page"); // After last element, hasNext should be false and calling close() should send Smb2CloseRequest once
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 13.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 10.6K bytes - Viewed (0) -
api/maven-api-spi/src/main/java/org/apache/maven/api/spi/package-info.java
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Tue Mar 04 14:17:18 UTC 2025 - 1K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application. ## About third party integrations { #about-third-party-integrations } In this example we are using the OAuth2 "password" flow.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0)