- Sort Score
- Result 10 results
- Languages All
Results 231 - 240 of 5,241 for that (0.17 sec)
-
VULNERABILITY_REPORT.md
Therefore, it lists pre-conditions and actions that should be performed to resolve and fix a reported vulnerability. ## Vulnerability Management Process The vulnerability management process requires that the vulnerability report contains the following information: - The project / component that contains the reported vulnerability. - A description of the vulnerability. In particular, the type of the
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 1.5K bytes - Viewed (0) -
impl/maven-core/plugin-manager.txt
For debugging purposes we also need to keep track of what versions of artifacts are being used so that when we are debugging in the IDE we can find the specific sources for a given version of a library so that the developer can debug the correct version of a library being used for a plugin.
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Jan 22 11:03:29 UTC 2025 - 12.3K bytes - Viewed (0) -
build-logic/binary-compatibility/src/main/groovy/gradlebuild/binarycompatibility/upgrades/UpgradedProperty.java
return false; } UpgradedProperty that = (UpgradedProperty) o; return containingType.equals(that.containingType) && propertyName.equals(that.propertyName) && methodName.equals(that.methodName) && methodDescriptor.equals(that.methodDescriptor) && replacedAccessors.equals(that.replacedAccessors); } @Override public int hashCode() {Registered: Wed Dec 31 11:36:14 UTC 2025 - Last Modified: Tue Aug 13 19:17:41 UTC 2024 - 8K bytes - Viewed (0) -
guava/src/com/google/common/base/Functions.java
* defaultValue)}. * * @param map source map that determines the function behavior * @param defaultValue the value to return for inputs that aren't map keys * @return function that returns {@code map.get(a)} when {@code a} is a key, or {@code * defaultValue} otherwise */ public static <K extends @Nullable Object, V extends @Nullable Object> Function<K, V> forMap(
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 17:32:30 UTC 2025 - 15.4K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Authenticator.kt
* * Implementations authenticate by returning a follow-up request that includes an authorization * header, or they may decline the challenge by returning null. In this case the unauthenticated * response will be returned to the caller that triggered it. * * Implementations should check if the initial request already included an attempt to * authenticate. If so it is likely that further attempts will not be useful and the authenticator
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 5.5K bytes - Viewed (0) -
cmd/grid.go
// globalLockGrid is the global lock grid manager. var globalLockGrid atomic.Pointer[grid.Manager] // globalGridStart is a channel that will block startup of grid connections until closed. var globalGridStart = make(chan struct{}) // globalLockGridStart is a channel that will block startup of lock grid connections until closed. var globalLockGridStart = make(chan struct{})
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 16 14:27:42 UTC 2025 - 3.7K bytes - Viewed (0) -
impl/maven-core/lifecycle-executor.txt
. . . </plugins> We need this form so that the model builder can make the first pass at merging. Full merging cannot be done because we don't know what the version of the plugin is yet that the user has requested. For plugins in the default lifecycle they are typically defined in the plugin management section of the parent POM. When the merging is complete we are going to have something that looks like the following: <plugins> <plugin>
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 9.7K bytes - Viewed (0) -
docs/sts/wso2.md
1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information. 2. The id_token self-contains the authorization information in a manner that can be verified. For example, by encoding authorization information along with a signature into the token.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedPriorityBlockingQueue.java
* <p>Operations on this class make no guarantees about the ordering of elements with equal * priority. If you need to enforce an ordering, you can define custom classes or comparators that * use a secondary key to break ties in primary priority values. For example, here is a class that * applies first-in-first-out tie-breaking to comparable elements. To use it, you would insert a * {@code new FIFOEntry(anEntry)} instead of a plain entry object. *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 18.9K bytes - Viewed (0) -
README.md
* For `PUT` requests to `/items/{item_id}`, read the body as JSON: * Check that it has a required attribute `name` that should be a `str`. * Check that it has a required attribute `price` that has to be a `float`. * Check that it has an optional attribute `is_offer`, that should be a `bool`, if present. * All this would also work for deeply nested JSON objects.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Thu Dec 25 11:01:37 UTC 2025 - 26.4K bytes - Viewed (0)