- Sort Score
- Result 10 results
- Languages All
Results 171 - 180 of 202 for suffixes (0.13 sec)
-
common-protos/k8s.io/api/networking/v1/generated.proto
// 1. If host is precise, the request matches this rule if the http host header is equal to Host. // 2. If host is a wildcard, then the request matches this rule if the http host header // is to equal to the suffix (removing the first label) of the wildcard rule. // +optional optional string host = 1; // IngressRuleValue represents a rule to route requests for this IngressRule.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 25.2K bytes - Viewed (0) -
common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
// If this field is used, the name returned to the client will be different // than the name passed. This value will also be combined with a unique suffix. // The provided value has the same validation rules as the Name field, // and may be truncated by the length of the suffix required to make the value // unique on the server. // // If this field is specified and the generated name exists, the server will return a 409. //
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 53.3K bytes - Viewed (0) -
android/guava/src/com/google/common/math/LongMath.java
} } return true; } } throw new AssertionError(); } /* * If n <= millerRabinBases[i][0], then testing n against bases millerRabinBases[i][1..] suffices * to prove its primality. Values from miller-rabin.appspot.com. * * NOTE: We could get slightly better bases that would be treated as unsigned, but benchmarks * showed negligible performance improvements.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 09 16:39:37 UTC 2024 - 45.2K bytes - Viewed (0) -
doc/go_mem.html
<p> Go approaches its memory model in much the same way as the rest of the language, aiming to keep the semantics simple, understandable, and useful. This section gives a general overview of the approach and should suffice for most programmers. The memory model is specified more formally in the next section. </p> <p> A data race is defined as
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Mar 04 15:54:42 UTC 2024 - 26.6K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.31.md
### Container Images All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name. name | architectures ---- | -------------
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Oct 23 12:18:32 UTC 2024 - 315.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
### Container Images All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name. name | architectures ---- | -------------
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
src/main/resources/fess_config.properties
query.highlight.boundary.position.detect=true query.highlight.text.fragment.type=query query.highlight.text.fragment.size=3 query.highlight.text.fragment.prefix.length=5 query.highlight.text.fragment.suffix.length=5 query.max.search.result.offset=100000 query.additional.default.fields= query.additional.response.fields= query.additional.api.response.fields= query.additional.scroll.response.fields=
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Tue Oct 01 14:13:38 UTC 2024 - 30.9K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
// Just extract the high 64 bits (assuming the rest is user-modifiable). addressAsLong = ByteBuffer.wrap(ip6.getAddress(), 0, 8).getLong(); } // Many strategies for hashing are possible. This might suffice for now. int coercedHash = Hashing.murmur3_32_fixed().hashLong(addressAsLong).asInt(); // Squash into 224/4 Multicast and 240/4 Reserved space (i.e. 224/3). coercedHash |= 0xe0000000;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 47.1K bytes - Viewed (0) -
cmd/xl-storage.go
if err = Access(volumeDir); err != nil { return convertAccessError(err, errVolumeAccessDenied) } } for _, fp := range paths { // Following code is needed so that we retain SlashSeparator suffix if any in // path argument. filePath := pathJoin(volumeDir, fp) if err = checkPathLength(filePath); err != nil { return err } if err = s.moveToTrash(filePath, false, false); err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 26 09:58:27 UTC 2024 - 91.3K bytes - Viewed (0) -
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// 1. If Host is precise, the request matches this rule if the http host header is equal to Host. // 2. If Host is a wildcard, then the request matches this rule if the http host header // is to equal to the suffix (removing the first label) of the wildcard rule. // +optional optional string host = 1; // IngressRuleValue represents a rule to route requests for this IngressRule.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 45.6K bytes - Viewed (0)