Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 297 for minutit (1.27 sec)

  1. src/main/java/org/codelibs/fess/taglib/FessFunctions.java

         * Cache for storing resource file modification timestamps to enable cache busting.
         * The cache expires after 10 minutes and has a maximum size of 1000 entries.
         */
        private static LoadingCache<String, Long> resourceHashCache =
                CacheBuilder.newBuilder().maximumSize(1000).expireAfterWrite(10, TimeUnit.MINUTES).build(new CacheLoader<String, Long>() {
                    @Override
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 25.4K bytes
    - Viewed (1)
  2. compat/maven-model-builder/src/test/java/org/apache/maven/model/interpolation/AbstractModelInterpolatorTest.java

            cal.set(Calendar.HOUR, 12);
            cal.set(Calendar.AM_PM, Calendar.AM);
    
            // just to make sure all the bases are covered...
            cal.set(Calendar.HOUR_OF_DAY, 0);
            cal.set(Calendar.MINUTE, 16);
            cal.set(Calendar.SECOND, 0);
            cal.set(Calendar.YEAR, 1976);
            cal.set(Calendar.MONTH, Calendar.NOVEMBER);
            cal.set(Calendar.DATE, 11);
    
            Date firstTestDate = cal.getTime();
    
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Sun Mar 30 23:08:36 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  3. docs/fr/docs/deployment/docker.md

    ---
    
    Avec ces informations et ces outils, passez à la section suivante pour tout combiner.
    
    ## Cluster en mode Docker Swarm avec Traefik et HTTPS
    
    Vous pouvez avoir un cluster en mode Docker Swarm configuré en quelques minutes (environ 20 min) avec un processus Traefik principal gérant HTTPS (y compris l'acquisition et le renouvellement des certificats).
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Nov 09 16:39:20 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  4. docs/bucket/lifecycle/DESIGN.md

    ## Implementation
    
    ILM tiering takes place when a object placed in the bucket meets lifecycle transition rules and becomes eligible for tiering. MinIO scanner (which runs at one minute intervals, each time scanning one sixteenth of the namespace), picks up the object for tiering. The data is moved to the remote tier in entirety, leaving only the object metadata on MinIO.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  5. src/main/java/org/codelibs/fess/helper/CrawlingConfigHelper.java

         * The cache is configured with a maximum size of 100 entries and expires after 10 minutes.
         */
        @PostConstruct
        public void init() {
            if (logger.isDebugEnabled()) {
                logger.debug("Initializing {}", this.getClass().getSimpleName());
            }
            crawlingConfigCache = CacheBuilder.newBuilder().maximumSize(100).expireAfterWrite(10, TimeUnit.MINUTES).build();
        }
    
        /**
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Fri Nov 28 16:29:12 UTC 2025
    - 19.5K bytes
    - Viewed (1)
  6. docs/de/docs/advanced/security/http-basic-auth.md

    Aber so hätten die Angreifer in wenigen Minuten oder Stunden mit der „Hilfe“ unserer Anwendung den richtigen Benutzernamen und das richtige Passwort erraten, indem sie die Zeitspanne zur Hilfe nehmen, die diese zur Beantwortung benötigt.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  7. cmd/healthcheck-handler.go

    			writeErrorResponse(r.Context(), w, apiErr, r.URL)
    		}
    		return
    	}
    
    	// Verify if KMS is reachable if its configured
    	if GlobalKMS != nil {
    		ctx, cancel := context.WithTimeout(r.Context(), time.Minute)
    		defer cancel()
    
    		if _, err := GlobalKMS.GenerateKey(ctx, &kms.GenerateKeyRequest{AssociatedData: kms.Context{"healthcheck": ""}}); err != nil {
    			switch r.Method {
    			case http.MethodHead:
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Jun 26 07:44:34 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  8. docs/pt/docs/advanced/security/http-basic-auth.md

    Claro, os invasores não tentariam tudo isso de forma manual, eles escreveriam um programa para fazer isso, possivelmente com milhares ou milhões de testes por segundo. E obteriam apenas uma letra a mais por vez.
    
    Mas fazendo isso, em alguns minutos ou horas os invasores teriam adivinhado o usuário e senha corretos, com a "ajuda" da nossa aplicação, apenas usando o tempo levado para responder.
    
    #### Corrija com o `secrets.compare_digest()` { #fix-it-with-secrets-compare-digest }
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 5.3K bytes
    - Viewed (0)
  9. cmd/auth-handler_test.go

    	req := mustNewRequest(method, urlStr, contentLength, body, t)
    	cred := globalActiveCred
    	if err := preSignV2(req, cred.AccessKey, cred.SecretKey, time.Now().Add(10*time.Minute).Unix()); err != nil {
    		t.Fatalf("Unable to initialized new signed http request %s", err)
    	}
    	return req
    }
    
    // This is similar to mustNewRequest but additionally the request
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 15.4K bytes
    - Viewed (0)
  10. internal/config/identity/ldap/config.go

    	"github.com/minio/minio/internal/config"
    	"github.com/minio/minio/internal/crypto"
    	"github.com/minio/pkg/v3/ldap"
    )
    
    const (
    	defaultLDAPExpiry = time.Hour * 1
    
    	minLDAPExpiry time.Duration = 15 * time.Minute
    	maxLDAPExpiry time.Duration = 365 * 24 * time.Hour
    )
    
    // Config contains AD/LDAP server connectivity information.
    type Config struct {
    	LDAP ldap.Config
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Sep 18 11:47:48 UTC 2025
    - 8.6K bytes
    - Viewed (0)
Back to top