- Sort Score
- Result 10 results
- Languages All
Results 641 - 650 of 1,078 for unformat (0.07 sec)
-
internal/config/lambda/target/webhook.go
req, err := http.NewRequest(http.MethodPost, target.args.Endpoint.String(), bytes.NewReader(data)) if err != nil { return nil, err } // Verify if the authToken already contains // <Key> <Token> like format, if this is // already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 08 21:39:49 UTC 2024 - 6.7K bytes - Viewed (0) -
compat/maven-resolver-provider/src/main/java/org/apache/maven/repository/internal/relocation/UserPropertiesArtifactRelocationSource.java
break; default: throw new IllegalArgumentException("Bad artifact coordinates " + coords + ", expected format is <groupId>:<artifactId>[:<extension>[:<classifier>]]:<version>"); } return s; }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 9.1K bytes - Viewed (0) -
cmd/bucket-policy.go
case authTypeSignedV2, authTypeSigned, authTypeStreamingSigned: authtype = "REST-HEADER" case authTypePostPolicy: authtype = "POST" } args := map[string][]string{ "CurrentTime": {currTime.Format(time.RFC3339)}, "EpochTime": {strconv.FormatInt(currTime.Unix(), 10)}, "SecureTransport": {strconv.FormatBool(r.TLS != nil)}, "SourceIp": {handlers.GetSourceIPRaw(r)},
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8K bytes - Viewed (0) -
SECURITY.md
should be used with caution when working with untrusted models. ### Saved graphs and checkpoints When loading untrusted serialized computation graphs (in form of a `GraphDef`, `SavedModel`, or equivalent on-disk format), the set of computation primitives available to TensorFlow is powerful enough that you should assume that the TensorFlow process effectively executes arbitrary code.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
ci/official/containers/linux_arm64/devel.usertools/code_check_full.bats
# checks for cross-file issues like bad includes or missing BUILD definitions. # # We can't test on the windows toolchains because they're using a legacy # toolchain format (or something) that specifies the toolchain directly instead # of as a "repository". They can't be valid on Linux because Linux can't do # anything with a Windows-only toolchain, and bazel errors if trying to build
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Aug 14 18:47:44 UTC 2024 - 12.9K bytes - Viewed (0) -
cmd/erasure-server-pool.go
Object: object, } } func (z *erasureServerPools) getPoolAndSet(id string) (poolIdx, setIdx, diskIdx int, err error) { for poolIdx := range z.serverPools { format := z.serverPools[poolIdx].format for setIdx, set := range format.Erasure.Sets { for i, diskID := range set { if diskID == id { return poolIdx, setIdx, i, nil } } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Sep 29 22:40:36 UTC 2024 - 89.8K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/RoleQueryHelper.java
import jakarta.servlet.http.Cookie; import jakarta.servlet.http.HttpServletRequest; /** * This class returns a list of a role from a request parameter, * a request header and a cookie. The format of the default value * is "[\d]+\nrole1,role2,role3", which you can encrypt. * * @author shinsuke * */ public class RoleQueryHelper {
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Jul 25 01:48:41 UTC 2024 - 11.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/ServiceManagerTest.java
Formatter logFormatter = new Formatter() { @Override public String format(LogRecord record) { return formatMessage(record); } }; for (LogRecord record : logHandler.getStoredLogRecords()) { assertThat(logFormatter.format(record)).doesNotContain("NoOpService"); } } public void testStartupFailureOutput() {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:51:36 UTC 2024 - 25.5K bytes - Viewed (0) -
docs/bucket/replication/README.md
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jan 24 23:46:33 UTC 2023 - 18.2K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
The original destination is then extracted to determined which certificate to use. SNI is not used because it is illegal to use IPs in SNI, and there is no other existing standard format to represent what we need to. Additionally, using the redirection mechanism reduces the need for clients to know the destination's ztunnel address.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0)