Search Options

Results per page
Sort
Preferred Languages
Advance

Results 461 - 470 of 1,537 for Has (0.43 sec)

  1. src/main/java/jcifs/netbios/NbtAddress.java

                            }
                        }
                        return null;
                    }
                    if (this.isDataFromNodeStatus) {
                        /*
                         * 'this' has been updated and should now
                         * have a real NetBIOS name
                         */
                        this.calledName = null;
                        return getHostName();
                    }
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  2. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http1/Http1ExchangeCodec.kt

       *
       * For streaming requests with a body, headers must be prepared **before** the output stream has
       * been written to. Otherwise the body would need to be buffered!
       *
       * For non-streaming requests with a body, headers must be prepared **after** the output stream
       * has been written to and closed. This ensures that the `Content-Length` header field receives
       * the proper value.
       */
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Thu Jul 31 04:18:40 UTC 2025
    - 17.5K bytes
    - Viewed (7)
  3. CHANGELOG/CHANGELOG-1.13.md

      - The deprecated `--etcd-quorum-read` flag has been removed. Quorum reads are now always enabled when fetching data from etcd. Remove the `--etcd-quorum-read` flag from kube-apiserver invocations before upgrading.
    - kube-controller-manager
      - The deprecated `--insecure-experimental-approve-all-kubelet-csrs-for-group` flag has been removed.
    - kubelet
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 273.1K bytes
    - Viewed (0)
  4. okhttp/src/commonJvmAndroid/kotlin/okhttp3/Dispatcher.kt

       * become idle after the [onResponse][Callback.onResponse] or [onFailure][Callback.onFailure]
       * callback has returned. Synchronous calls become idle once [execute()][Call.execute] returns.
       * This means that if you are doing synchronous calls the network layer will not truly be idle
       * until every returned [Response] has been closed.
       */
      @get:Synchronized
      @set:Synchronized
      var idleCallback: Runnable? = null
    
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Tue Oct 07 14:16:22 UTC 2025
    - 9.9K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/path-operation-advanced-configuration.md

    /// tip
    
    If you manually call `app.openapi()`, you should update the `operationId`s before that.
    
    ///
    
    /// warning
    
    If you do this, you have to make sure each one of your *path operation functions* has a unique name.
    
    Even if they are in different modules (Python files).
    
    ///
    
    ## Exclude from OpenAPI { #exclude-from-openapi }
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Dec 20 15:55:38 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  6. internal/event/config.go

    			return &ErrDuplicateEventName{eventName}
    		}
    
    		eventStringSet.Add(eventName.String())
    	}
    
    	*q = Queue(parsedQueue)
    
    	return nil
    }
    
    // Validate - checks whether queue has valid values or not.
    func (q Queue) Validate(region string, targetList *TargetList) error {
    	if q.ARN.region == "" {
    		if !targetList.Exists(q.ARN.TargetID) {
    			return &ErrARNNotFound{q.ARN}
    		}
    		return nil
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  7. internal/jwt/parser.go

    //
    // This method parses the token but doesn't validate the signature. It's only
    // ever useful in cases where you know the signature is valid (because it has
    // been checked previously in the stack) and you want to extract values from
    // it.
    func ParseUnverifiedStandardClaims(token []byte, claims *StandardClaims, buf []byte) (*SigningMethodHMAC, error) {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 14.1K bytes
    - Viewed (0)
  8. android/guava-tests/test/com/google/common/io/TestByteSink.java

    import com.google.common.collect.ImmutableSet;
    import java.io.ByteArrayOutputStream;
    import java.io.IOException;
    import java.io.OutputStream;
    import org.jspecify.annotations.NullUnmarked;
    
    /**
     * A byte sink for testing that has configurable behavior.
     *
     * @author Colin Decker
     */
    @NullUnmarked
    public class TestByteSink extends ByteSink implements TestStreamSupplier {
    
      private final ByteArrayOutputStream bytes = new ByteArrayOutputStream();
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Jul 14 14:44:08 UTC 2025
    - 1.9K bytes
    - Viewed (0)
  9. samples/unixdomainsockets/src/main/java/okhttp3/unixdomainsockets/TunnelingUnixSocket.java

    import jnr.unixsocket.UnixSocketChannel;
    
    /**
     * Subtype UNIX socket for a higher-fidelity impersonation of TCP sockets. This is named "tunneling"
     * because it assumes the ultimate destination has a hostname and port.
     */
    final class TunnelingUnixSocket extends UnixSocket {
      private final File path;
      private InetSocketAddress inetSocketAddress;
    
      TunnelingUnixSocket(File path, UnixSocketChannel channel) {
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Tue Feb 12 16:33:52 UTC 2019
    - 1.9K bytes
    - Viewed (0)
  10. VULNERABILITY_REPORT.md

    # Vulnerability Management Policy
    
    This document formally describes the process of addressing and managing a
    reported vulnerability that has been found in the MinIO server code base,
    any directly connected ecosystem component or a direct / indirect dependency
    of the code base.
    
    ## Scope
    
    The vulnerability management policy described in this document covers the
    process of investigating, assessing and resolving a vulnerability report
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 1.5K bytes
    - Viewed (0)
Back to top