Search Options

Results per page
Sort
Preferred Languages
Advance

Results 241 - 250 of 364 for expired (0.04 sec)

  1. src/test/java/org/codelibs/fess/exception/CommandExecutionExceptionTest.java

            assertTrue(permissionDenied.getMessage().contains("Permission denied"));
    
            // Scenario 4: Exit code error
            CommandExecutionException exitCodeError = new CommandExecutionException("Command exited with non-zero code: 127");
            assertTrue(exitCodeError.getMessage().contains("non-zero code"));
        }
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 9.2K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/sso/oic/OpenIdConnectAuthenticator.java

                attributes.put("refreshtoken", tr.getRefreshToken() == null ? "null" : tr.getRefreshToken());
                attributes.put("tokentype", tr.getTokenType());
                attributes.put("expire", tr.getExpiresInSeconds());
                attributes.put("jwtheader", jwtHeader);
                attributes.put("jwtclaim", jwtClaim);
                attributes.put("jwtsign", jwtSigniture);
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 15.3K bytes
    - Viewed (0)
  3. src/test/java/jcifs/util/AuthenticationRateLimiterTest.java

            } catch (SmbException e) {
                // Expected
            }
    
            // Wait for lockout to expire
            Thread.sleep(2100); // Lockout is 2 seconds in test setup
    
            // Should be allowed again
            assertTrue(rateLimiter.checkAttempt(username, ip), "Should be allowed after lockout expiry");
        }
    
        @Test
        public void testSuccessResetsCounter() throws Exception {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 15.8K bytes
    - Viewed (0)
  4. docs/bucket/versioning/README.md

    Spark/Hadoop workloads which use Hadoop MR Committer v1/v2 algorithm upload objects to a temporary prefix in a bucket. These objects are 'renamed' to a different prefix on Job commit. Object storage admins are forced to configure separate ILM policies to expire these objects and their versions to reclaim space.
    
    ### Solution
    
    To exclude objects under a list of prefix (glob) patterns from being versioned, you can send the following versioning configuration with Status set to `Enabled`.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 12K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/graph/Graphs.java

       * An enum representing the state of a node during DFS. {@code PENDING} means that the node is on
       * the stack of the DFS, while {@code COMPLETE} means that the node and all its successors have
       * been already explored. Any node that has not been explored will not have a state at all.
       */
      private enum NodeVisitState {
        PENDING,
        COMPLETE
      }
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Aug 01 00:26:14 UTC 2025
    - 22.7K bytes
    - Viewed (0)
  6. guava/src/com/google/common/graph/Graphs.java

       * An enum representing the state of a node during DFS. {@code PENDING} means that the node is on
       * the stack of the DFS, while {@code COMPLETE} means that the node and all its successors have
       * been already explored. Any node that has not been explored will not have a state at all.
       */
      private enum NodeVisitState {
        PENDING,
        COMPLETE
      }
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Aug 01 00:26:14 UTC 2025
    - 23.3K bytes
    - Viewed (0)
  7. SECURITY.md

    performance limitations.
    
    ## Multi-Tenant environments
    
    It is possible to run multiple TensorFlow models in parallel. For example,
    `ModelServer` collates all computation graphs exposed to it (from multiple
    `SavedModel`) and executes them in parallel on available executors. Running
    TensorFlow in a multitenant design mixes the risks described above with the
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/app/web/admin/backup/AdminBackupAction.java

            return asStream(id)//
                    .header("Pragma", "no-cache")//
                    .header("Cache-Control", "no-cache")//
                    .header("Expires", "Thu, 01 Dec 1994 16:00:00 GMT")//
                    .header("Content-Type", "application/x-ndjson")//
                    .stream(out -> {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 29.8K bytes
    - Viewed (0)
  9. src/main/java/org/codelibs/fess/helper/CrawlerStatsHelper.java

        protected String loggerName = "fess.log.crawler.stats";
    
        /** Maximum number of statistics objects to cache. */
        protected long maxCacheSize = 1000;
    
        /** Time in milliseconds after which cache entries expire after write. */
        protected long cacheExpireAfterWrite = 10 * 60 * 1000L;
    
        /** Cache for storing statistics objects keyed by crawler object identifiers. */
        protected LoadingCache<String, StatsObject> statsCache;
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 17.4K bytes
    - Viewed (0)
  10. docs/pt/docs/tutorial/security/first-steps.md

    	* Um "token" é apenas uma string com algum conteúdo que nós podemos utilizar mais tarde para verificar o usuário.
    	* Normalmente, um token é definido para expirar depois de um tempo.
    		* Então, o usuário terá que se logar de novo depois de um tempo.
    		* E se o token for roubado, o risco é menor. Não é como se fosse uma chave permanente que vai funcionar para sempre (na maioria dos casos).
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.3K bytes
    - Viewed (0)
Back to top