- Sort Score
- Result 10 results
- Languages All
Results 291 - 300 of 639 for erasure (0.07 sec)
-
docs/en/docs/advanced/security/http-basic-auth.md
To handle that, we first convert the `username` and `password` to `bytes` encoding them with UTF-8. Then we can use `secrets.compare_digest()` to ensure that `credentials.username` is `"stanleyjobson"`, and that `credentials.password` is `"swordfish"`. {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *} This would be similar to: ```Python
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 16:01:27 UTC 2024 - 4.8K bytes - Viewed (0) -
cmd/bucket-encryption-handlers.go
if err != nil { writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL) return } // Call site replication hook. // // We encode the xml bytes as base64 to ensure there are no encoding // errors. cfgStr := base64.StdEncoding.EncodeToString(configData) replLogIf(ctx, globalSiteReplicationSys.BucketMetaHook(ctx, madmin.SRBucketMeta{ Type: madmin.SRBucketMetaTypeSSEConfig,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6.4K bytes - Viewed (0) -
architecture/networking/controllers.md
* Deduping of identical events * Automatic retrying of failed events (configurable) The above logic is critical to handle correctly to ensure correctness of a controller. The [Example Controller](../../pkg/kube/controllers/example_test.go) is a key reference point for any controller development;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Feb 09 17:41:25 UTC 2024 - 4.9K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
for (int insertion = 0; insertion < totalInsertions; insertion++) { RandomHasherAction.pickAtRandom(random).performAction(random, sinksAndControl); } // We need to ensure that at least 4 bytes have been put into the hasher or else // Hasher#hash will throw an ISE. int intToPut = random.nextInt(); for (Hasher hasher : sinksAndControl) { hasher.putInt(intToPut);
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 8.5K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/ListenerCallQueue.java
* <li>Events for the different listeners are dispatched concurrently. * <li>All events for a given listener dispatch on the provided {@link #executor}. * <li>It is easy for the user to ensure that listeners are never invoked while holding locks. * </ul> * * The last point is subtle. Often the observable object will be managing its own internal state
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Dec 13 19:45:20 UTC 2023 - 8.2K bytes - Viewed (0) -
guava-testlib/test/com/google/common/testing/GcFinalizationTest.java
assertWrapsInterruptedException(expected); } finally { interruptenator.shutdown(); Thread.interrupted(); } } /** * awaitFullGc() is not quite as reliable a way to ensure calling of a specific finalize method as * the more direct await* methods, but should be reliable enough in practice to avoid flakiness of * this test. (And if it isn't, we'd like to know about it first!) */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 02:42:09 UTC 2024 - 7.9K bytes - Viewed (0) -
cmd/bitrot.go
return errFileCorrupt } left -= read if !bytes.Equal(h.Sum(nil), hashBuf[:n]) { return errFileCorrupt } } return nil } // bitrotSelfTest performs a self-test to ensure that bitrot // algorithms compute correct checksums. If any algorithm // produces an incorrect checksum it fails with a hard error. // // bitrotSelfTest tries to catch any issue in the bitrot implementation
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jan 30 20:43:25 UTC 2024 - 7.6K bytes - Viewed (0) -
internal/grid/grid.go
case <-w.ctx.Done(): return 0, context.Cause(w.ctx) } } // WriterToChannel will return an io.Writer that writes to the given channel. // The context both allows returning errors on writes and to ensure that // this isn't abandoned if the channel is no longer being read from. func WriterToChannel(ctx context.Context, ch chan<- []byte) io.Writer { return &writerWrapper{ch: ch, ctx: ctx} }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 18:10:04 UTC 2024 - 6.9K bytes - Viewed (0) -
cni/pkg/install/cniconfig.go
continue } } else { conf, err := libcni.ConfFromFile(confFile) if err != nil { installLog.Warnf("Error loading CNI config file %s: %v", confFile, err) continue } // Ensure the config has a "type" so we know what plugin to run. // Also catches the case where somebody put a conflist into a conf file. if conf.Network.Type == "" {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Aug 01 18:38:14 UTC 2024 - 8.2K bytes - Viewed (0) -
docs/bucket/replication/DESIGN.md
`COMPLETED` only after the replication operation succeeds on each of the targets specified in the replication configuration. If multiple targets are configured to use active-active replication and multi destination replication, the administrator should ensure that the replication features enabled (such as replica metadata sync, delete marker replication etc) are identical to avoid asymmetric state. This is because all replication activity is inherently a one-way operation from source to target, irrespective...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 14.7K bytes - Viewed (0)