- Sort Score
- Result 10 results
- Languages All
Results 531 - 540 of 3,447 for _objects (0.1 sec)
-
okhttp/src/main/kotlin/okhttp3/internal/platform/Platform.kt
logger.log(logLevel, message, t) } open fun isCleartextTrafficPermitted(hostname: String): Boolean = true /** * Returns an object that holds a stack trace created at the moment this method is executed. This * should be used specifically for [java.io.Closeable] objects and in conjunction with * [logCloseableLeak]. */ open fun getStackTraceForCloseable(closer: String): Any? { return when {
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 9.8K bytes - Viewed (0) -
cmd/admin-handlers_test.go
owners = append(owners, fmt.Sprintf("node-%d", i)) } // Simulate DeleteObjects of 10 objects in a single request. i.e same lock // request UID, but 10 different resource names associated with it. var lris []lockRequesterInfo uuid := mustGetUUID() for i := 0; i < 10; i++ { resource := fmt.Sprintf("bucket/delete-object-%d", i) lri := lockRequesterInfo{ Name: resource, Writer: true, UID: uuid,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 24 10:24:01 UTC 2024 - 13.9K bytes - Viewed (0) -
src/main/java/jcifs/SidResolver.java
* is an ArrayList of SIDs represents the local groups that the account is * a member of. * <p/> * This method is designed to assist with computing access control for a * given user when the target object's ACL has local groups. Local groups * are not listed in a user's group membership (e.g. as represented by the * tokenGroups constructed attribute retrieved via LDAP). * <p/>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 4.6K bytes - Viewed (0) -
common-protos/k8s.io/api/imagepolicy/v1alpha1/generated.proto
// Package-wide variables from generator "generated". option go_package = "k8s.io/api/imagepolicy/v1alpha1"; // ImageReview checks if the set of images in a pod are allowed. message ImageReview { // Standard object's metadata. // More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 3.2K bytes - Viewed (0) -
cmd/erasure-server-pool-decom.go
} func (p poolMeta) ResumeBucketObject(idx int) (bucket, object string) { if p.Pools[idx].Decommission != nil { bucket = p.Pools[idx].Decommission.Bucket object = p.Pools[idx].Decommission.Object } return } func (p *poolMeta) TrackCurrentBucketObject(idx int, bucket string, object string) { if p.Pools[idx].Decommission == nil { // Decommission not in progress. return
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 13:20:19 UTC 2024 - 42.2K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ImmutableMap.java
private final Object keys; private final Object values; SerializedForm(ImmutableMap<K, V> map) { if (USE_LEGACY_SERIALIZATION) { Object[] keys = new Object[map.size()]; Object[] values = new Object[map.size()]; int i = 0; // "extends Object" works around https://github.com/typetools/checker-framework/issues/3013
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 41.5K bytes - Viewed (0) -
guava-gwt/src-super/com/google/common/collect/super/com/google/common/collect/ImmutableSortedSet.java
} @Override public Object[] toArray() { /* * ObjectArrays.toArrayImpl returns `@Nullable Object[]` rather than `Object[]` but only because * it can be used with collections that may contain null. This collection is a collection of * non-null elements, so we can treat it as a plain `Object[]`. */ @SuppressWarnings("nullness") Object[] result = ObjectArrays.toArrayImpl(this);
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Aug 19 16:21:24 UTC 2024 - 15.5K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
/** * An Access Control Entry (ACE) is an element in a security descriptor * such as those associated with files and directories. The Windows OS * determines which users have the necessary permissions to access objects * based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 7.2K bytes - Viewed (0) -
guava/src/com/google/common/graph/ImmutableValueGraph.java
* * <p>If {@code nodeU} and {@code nodeV} are not already present in this graph, this method will * silently {@link #addNode(Object) add} {@code nodeU} and {@code nodeV} to the graph. * * @return this {@code Builder} object * @throws IllegalArgumentException if the introduction of the edge would violate {@link * #allowsSelfLoops()} */ @CanIgnoreReturnValue
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Feb 01 16:30:37 UTC 2022 - 7.7K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/base/ObjectsBenchmark.java
dummy += Objects.hashCode(S0, S1, S2, S3); } return dummy; } @Benchmark int hashString_5(int reps) { int dummy = 0; for (int i = 0; i < reps; i++) { dummy += Objects.hashCode(S0, S1, S2, S3, S4); } return dummy; } @Benchmark int hashMixed_5(int reps) { int dummy = 0; for (int i = 0; i < reps; i++) { dummy += Objects.hashCode(I2, S1, D1, S2, I0);
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Dec 04 17:37:03 UTC 2017 - 2.2K bytes - Viewed (0)