Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 411 - 420 of 744 for killer (0.04 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. src/main/java/org/codelibs/fess/mylasta/direction/sponsor/FessMultipartRequestHandler.java

            }
        }
    
        // -----------------------------------------------------
        //                                     Parameter Logging
        //                                     -----------------
        // logging filter cannot show the parameters when multi-part so logging here
        protected void showFieldLoggingTitle() {
            if (logger.isDebugEnabled()) {
                logger.debug("[Multipart Request Parameter]");
            }
        }
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sun Mar 15 08:48:41 GMT 2026
    - 18.9K bytes
    - Click Count (1)
  2. src/main/java/org/codelibs/fess/opensearch/user/cbean/ca/bs/BsGroupCA.java

    import org.codelibs.fess.opensearch.user.cbean.ca.GroupCA;
    import org.codelibs.fess.opensearch.user.cbean.cq.GroupCQ;
    import org.codelibs.fess.opensearch.user.cbean.cq.bs.BsGroupCQ;
    import org.opensearch.search.aggregations.bucket.filter.FilterAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.global.GlobalAggregationBuilder;
    import org.opensearch.search.aggregations.bucket.histogram.HistogramAggregationBuilder;
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Mar 15 06:53:53 GMT 2025
    - 17.7K bytes
    - Click Count (0)
  3. benchmarks/src/main/java/org/elasticsearch/benchmark/search/fetch/subphase/FetchSourcePhaseBenchmark.java

        }
    
        @Benchmark
        public BytesReference filterObjects() throws IOException {
            SourceLookup lookup = new SourceLookup();
            lookup.setSource(sourceBytes);
            Object value = lookup.filter(fetchContext);
            return FetchSourcePhase.objectToBytes(value, XContentType.JSON, Math.min(1024, lookup.internalSourceRef().length()));
        }
    
        @Benchmark
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Mon Sep 13 17:34:14 GMT 2021
    - 5.4K bytes
    - Click Count (0)
  4. guava/src/com/google/common/collect/RegularImmutableMap.java

          int n, @Nullable Entry<K, V>[] entryArray, boolean throwIfDuplicateKeys)
          throws BucketOverflowException {
        /*
         * The cast is safe: n==entryArray.length means that we have filled the whole array with Entry
         * instances, in which case it is safe to cast it from an array of nullable entries to an array
         * of non-null entries.
         */
        @SuppressWarnings("nullness")
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Fri Dec 26 20:08:09 GMT 2025
    - 15.7K bytes
    - Click Count (0)
  5. cmd/global-heal.go

    		// in the beginning of erasure set healing
    		if err := bgSeq.healBucket(objAPI, bucket, true); err != nil {
    			// Set this such that when we return this function
    			// we let the caller retry this disk again for the
    			// buckets that failed healing.
    			retErr = err
    			healingLogIf(ctx, err)
    			continue
    		}
    
    		var (
    			vc   *versioning.Versioning
    			lc   *lifecycle.Lifecycle
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Apr 04 13:49:12 GMT 2025
    - 16.2K bytes
    - Click Count (0)
  6. docs/en/docs/deployment/concepts.md

    * Any program, any code, **can only do things** when it is being **executed**. So, when there's a **process running**.
    * The process can be **terminated** (or "killed") by you, or by the operating system. At that point, it stops running/being executed, and it can **no longer do things**.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 18.5K bytes
    - Click Count (1)
  7. src/test/java/org/codelibs/fess/sso/saml/SamlAuthenticatorTest.java

            assertEquals("******@****.***", supportEmail);
    
            // Count @ occurrences - should be exactly 1
            assertEquals(1, technicalEmail.chars().filter(ch -> ch == '@').count());
            assertEquals(1, supportEmail.chars().filter(ch -> ch == '@').count());
        }
    
        @Test
        public void test_defaultSettings_securityConfiguration() throws Exception {
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Wed Jan 14 14:29:07 GMT 2026
    - 18.4K bytes
    - Click Count (0)
  8. src/main/java/org/codelibs/fess/app/web/base/login/EntraIdCredential.java

                    stream(roles).of(stream -> stream.forEach(s -> permissionSet.add(systemHelper.getSearchRoleByRole(s))));
                    permissions = permissionSet.stream().filter(StringUtil::isNotBlank).distinct().toArray(n -> new String[n]);
                }
                return permissions;
            }
    
            @Override
            public boolean refresh() {
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Nov 28 16:29:12 GMT 2025
    - 7.8K bytes
    - Click Count (0)
  9. build-logic-commons/basics/src/main/kotlin/gradlebuild/basics/tasks/PackageListGenerator.kt

    
    /**
     * This task will generate the list of relocated packages into a file that will in turn be used when generating the runtime shaded jars. All we need is a list of packages that need to be relocated, so
     * we'll make sure to filter the list of packages before generating the file.
     *
     * It is assumed that the layout of the directories follow the JVM conventions. This allows us to effectively skip opening the class files to determine the real package name.
     */
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Fri Apr 11 15:53:18 GMT 2025
    - 7.1K bytes
    - Click Count (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/Authenticator.kt

     *
     * Implementations authenticate by returning a follow-up request that includes an authorization
     * header, or they may decline the challenge by returning null. In this case the unauthenticated
     * response will be returned to the caller that triggered it.
     *
     * Implementations should check if the initial request already included an attempt to
     * authenticate. If so it is likely that further attempts will not be useful and the authenticator
     * should give up.
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Fri Dec 27 13:39:56 GMT 2024
    - 5.5K bytes
    - Click Count (0)
Back to Top