Search Options

Results per page
Sort
Preferred Languages
Advance

Results 681 - 690 of 765 for issuer (0.1 sec)

  1. doap_Maven.rdf

    management, documentation creation, site publication, and distribution publication are all controlled from the declarative file. Maven can be extended by plugins to utilise a number of other development tools for reporting or the build process. https://issues.apache.org/jira/browse/MNG https://maven.apache.org/mailing-lists.html https://maven.apache.org/download.html Java http://projects.apache.org/category/build-management Apache Maven 4.0.0-beta-5 2024-10-22 4.0.0-beta-5 http://archive.apache.org/di...
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Tue Oct 22 13:53:03 UTC 2024
    - 33.9K bytes
    - Viewed (0)
  2. guava-tests/test/com/google/common/base/SplitterTest.java

        assertThrows(
            IllegalArgumentException.class,
            () -> COMMA_SPLITTER.withKeyValueSeparator("=").split("a=1,b,c=2"));
      }
    
      /**
       * Testing the behavior in https://github.com/google/guava/issues/1900 - this behavior may want to
       * be changed?
       */
      public void testMapSplitter_extraValueDelimiter() {
        assertThrows(
            IllegalArgumentException.class,
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Sep 17 18:14:12 UTC 2024
    - 29.6K bytes
    - Viewed (0)
  3. common-protos/k8s.io/api/flowcontrol/v1alpha1/generated.proto

      // +optional
      optional QueuingConfiguration queuing = 2;
    }
    
    // LimitedPriorityLevelConfiguration specifies how to handle requests that are subject to limits.
    // It addresses two issues:
    //   - How are requests for this priority level limited?
    //   - What should be done with requests that exceed the limit?
    message LimitedPriorityLevelConfiguration {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/flowcontrol/v1beta2/generated.proto

      // +optional
      optional QueuingConfiguration queuing = 2;
    }
    
    // LimitedPriorityLevelConfiguration specifies how to handle requests that are subject to limits.
    // It addresses two issues:
    //   - How are requests for this priority level limited?
    //   - What should be done with requests that exceed the limit?
    message LimitedPriorityLevelConfiguration {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  5. cmd/bucket-handlers_test.go

    			accessKey:          "",
    			secretKey:          "",
    			expectedContent:    encodedAnonResponse,
    			expectedRespStatus: http.StatusOK,
    		},
    		// Test case - 6.
    		// Anonymous user has access to some public folder, issue removing with
    		// another private object as well
    		6: {
    			bucket:             bucketName,
    			objects:            anonRequestWithPartialPublicAccess,
    			accessKey:          "",
    			secretKey:          "",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:50:49 UTC 2024
    - 39.8K bytes
    - Viewed (0)
  6. gradle/wrapper/gradle-wrapper.jar

    purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."...
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Dec 24 09:00:26 UTC 2023
    - 42.4K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/io/ByteSource.java

            // methods on this class also have potential problems with infinite  Iterables. But unlike
            // those, this method can cause issues even if the user is dealing with a (finite) slice()
            // of this source, since the slice's sizeIfKnown() method needs to know the size of the
            // underlying source to know what its size actually is.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 26.2K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/apps/v1/generated.proto

      // ---
      // TODO: Update this to follow our convention for oneOf, whatever we decide it
      // to be. Same as Deployment `strategy.rollingUpdate`.
      // See https://github.com/kubernetes/kubernetes/issues/35345
      // +optional
      optional RollingUpdateDaemonSet rollingUpdate = 2;
    }
    
    // Deployment enables declarative updates for Pods and ReplicaSets.
    message Deployment {
      // Standard object's metadata.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 34.5K bytes
    - Viewed (0)
  9. common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto

      //
      // The server guarantees that the objects returned when using continue will be identical to issuing
      // a single list call without a limit - that is, no objects created, modified, or deleted after the
      // first request is issued will be included in any subsequent continued requests. This is sometimes
      // referred to as a consistent snapshot, and ensures that a client that is using limit to receive
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 53.3K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/netbios/NbtAddress.java

                    localInetAddress = InetAddress.getLocalHost();
                } catch( UnknownHostException uhe ) {
                    /* Java cannot determine the localhost. This is basically a config
                     * issue on the host. There's not much we can do about it. Just
                     * to suppress NPEs that would result we can create a possibly bogus
                     * address. Pretty sure the below cannot actually thrown a UHE tho.
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 20:39:42 UTC 2019
    - 30.1K bytes
    - Viewed (0)
Back to top