- Sort Score
- Result 10 results
- Languages All
Results 2291 - 2300 of 2,609 for Fset (0.03 sec)
-
docs/en/docs/deployment/concepts.md
Another option is that you could use a **cloud service** that does more of the work including setting up HTTPS. It could have some restrictions or charge you more, etc. But in that case, you wouldn't have to set up a TLS Termination Proxy yourself. I'll show you some concrete examples in the next chapters. --- Then the next concepts to consider are all about the program running your actual API (e.g. Uvicorn).
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Sep 18 16:09:57 UTC 2024 - 17.8K bytes - Viewed (0) -
cmd/config-current.go
if _, err := drive.LookupConfig(s[config.DriveSubSys][config.Default]); err != nil { return err } case config.PolicyOPASubSys: // In case legacy OPA config is being set, we treat it as if the // AuthZPlugin is being set. subSys = config.PolicyPluginSubSys fallthrough case config.PolicyPluginSubSys: if ppargs, err := polplugin.LookupConfig(s, GetDefaultConnSettings(), xhttp.DrainBody); err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 30.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/http/NtlmHttpFilter.java
private boolean insecureBasic; private String realm; public void init( FilterConfig filterConfig ) throws ServletException { String name; int level; /* Set jcifs.smb1 properties we know we want; soTimeout and cachePolicy to 30min. */ Config.setProperty( "jcifs.smb1.smb.client.soTimeout", "1800000" ); Config.setProperty( "jcifs.smb1.netbios.cachePolicy", "1200" );
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 10.4K bytes - Viewed (0) -
cni/pkg/plugin/plugin_dryrun_test.go
"istio.io/istio/tools/istio-iptables/pkg/dependencies" ) type mockNetNs struct { path string } func (ns *mockNetNs) Do(toRun func(ns.NetNS) error) error { return toRun(ns) } func (*mockNetNs) Set() error { return nil } func (ns *mockNetNs) Path() string { return ns.path } func (*mockNetNs) Fd() uintptr { return 0 } func (*mockNetNs) Close() error { return nil }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Aug 27 16:44:45 UTC 2024 - 8.5K bytes - Viewed (0) -
cmd/encryption-v1.go
if err != nil { return nil, crypto.ObjectKey{}, crypto.ErrInvalidCustomerKey } return reader, objectEncryptionKey, nil } // set new encryption metadata from http request headers for SSE-C and generated key from KMS in the case of // SSE-S3 func setEncryptionMetadata(r *http.Request, bucket, object string, metadata map[string]string) (err error) { var (
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/storage-rest-server.go
for pool := range globalLocalSetDrives { globalLocalSetDrives[pool] = make([][]StorageAPI, endpointServerPools[pool].SetCount) for set := range globalLocalSetDrives[pool] { globalLocalSetDrives[pool][set] = make([]StorageAPI, endpointServerPools[pool].DrivesPerSet) } } for _, serverPool := range endpointServerPools { for _, endpoint := range serverPool.Endpoints {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 14 17:11:51 UTC 2024 - 45.7K bytes - Viewed (0) -
android/guava/src/com/google/common/cache/Striped64.java
* @param wasUncontended false if CAS failed before call */ final void retryUpdate(long x, @CheckForNull int[] hc, boolean wasUncontended) { int h; if (hc == null) { threadHashCode.set(hc = new int[1]); // Initialize randomly int r = rng.nextInt(); // Avoid zero to allow xorShift rehash h = hc[0] = (r == 0) ? 1 : r; } else h = hc[0]; boolean collide = false; // True if last slot nonempty
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Jun 14 17:55:55 UTC 2024 - 11.5K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/Service.java
* </ul> * * <p>There are deviations from this if there are failures or if {@link Service#stopAsync} is called * before the {@link Service} reaches the {@linkplain State#RUNNING RUNNING} state. The set of legal * transitions form a <a href="http://en.wikipedia.org/wiki/Directed_acyclic_graph">DAG</a>, * therefore every method of the listener will be called at most once. N.B. The {@link State#FAILED}
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Apr 04 09:45:04 UTC 2023 - 10.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
* A "token" is just a string with some content that we can use later to verify this user. * Normally, a token is set to expire after some time. * So, the user will have to log in again at some point later. * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases).
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0) -
SECURITY.md
should be used with caution when working with untrusted models. ### Saved graphs and checkpoints When loading untrusted serialized computation graphs (in form of a `GraphDef`, `SavedModel`, or equivalent on-disk format), the set of computation primitives available to TensorFlow is powerful enough that you should assume that the TensorFlow process effectively executes arbitrary code.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0)