Search Options

Results per page
Sort
Preferred Languages
Advance

Results 911 - 920 of 1,069 for encoding (0.2 sec)

  1. android/guava/src/com/google/common/collect/CollectCollectors.java

            EnumSetAccumulator::add,
            EnumSetAccumulator::combine,
            EnumSetAccumulator::toImmutableSet,
            Collector.Characteristics.UNORDERED);
      }
    
      @IgnoreJRERequirement // see enclosing class (whose annotation Animal Sniffer ignores here...)
      private static final class EnumSetAccumulator<E extends Enum<E>> {
        @SuppressWarnings({"rawtypes", "unchecked"})
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:05:46 UTC 2024
    - 17.1K bytes
    - Viewed (0)
  2. manifests/addons/dashboards/istio-workload-dashboard.json

              "format": "time_series",
              "intervalFactor": 1,
              "refId": "A",
              "step": 4
            }
          ],
          "title": "Incoming Request Volume",
          "type": "stat"
        },
        {
          "datasource": {
            "type": "prometheus",
            "uid": "${datasource}"
          },
          "fieldConfig": {
            "defaults": {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Mar 27 03:47:04 UTC 2024
    - 102.7K bytes
    - Viewed (0)
  3. architecture/ambient/peer-authentication.md

    vanilla TLS HBONE tunnel (NOTE: this is not mTLS) to the Waypoint proxy and forward the traffic over that connection without presenting a client certificate. Therefore, it is absolutely critical that the waypoint proxy not assume any identity from incoming connections, even if the ztunnel is hairpinning. In other words, all traffic over TLS HBONE tunnels must be considered to be untrusted. From there, traffic is returned to the ztunnel (still over the TLS HBONE tunnel) and forwarded to the destination...
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 01 20:04:20 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  4. docs/debugging/inspect/decrypt-v2.go

    )
    
    type keepFileErr struct {
    	error
    }
    
    func extractInspectV2(pk []byte, r io.Reader, w io.Writer, okMsg string) error {
    	privKey, err := bytesToPrivateKey(pk)
    	if err != nil {
    		return fmt.Errorf("decoding key returned: %w", err)
    	}
    
    	sr, err := estream.NewReader(r)
    	if err != nil {
    		return err
    	}
    
    	sr.SetPrivateKey(privKey)
    	sr.ReturnNonDecryptable(true)
    
    	// Debug corrupted streams.
    	if false {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Apr 11 21:22:47 UTC 2024
    - 2.2K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/graph/AbstractDirectedNetworkConnections.java

     * @param <N> Node parameter type
     * @param <E> Edge parameter type
     */
    @ElementTypesAreNonnullByDefault
    abstract class AbstractDirectedNetworkConnections<N, E> implements NetworkConnections<N, E> {
      /** Keys are edges incoming to the origin node, values are the source node. */
      final Map<E, N> inEdgeMap;
    
      /** Keys are edges outgoing from the origin node, values are the target node. */
      final Map<E, N> outEdgeMap;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Apr 26 17:43:39 UTC 2021
    - 4.5K bytes
    - Viewed (0)
  6. docs/erasure/README.md

    ## How are drives used for Erasure Code?
    
    MinIO divides the drives you provide into erasure-coding sets of *2 to 16* drives.  Therefore, the number of drives you present must be a multiple of one of these numbers.  Each object is written to a single erasure-coding set.
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 4.1K bytes
    - Viewed (0)
  7. common-protos/k8s.io/api/networking/v1/generated.proto

    // Package-wide variables from generator "generated".
    option go_package = "k8s.io/api/networking/v1";
    
    // HTTPIngressPath associates a path with a backend. Incoming urls matching the
    // path are forwarded to the backend.
    message HTTPIngressPath {
      // path is matched against the path of an incoming request. Currently it can
      // contain characters disallowed from the conventional "path" part of a URL
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 25.2K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/admissionregistration/v1beta1/generated.proto

      // CEL expressions have access to the contents of the AdmissionRequest and Authorizer, organized into CEL variables:
      //
      // 'object' - The object from the incoming request. The value is null for DELETE requests.
      // 'oldObject' - The existing object. The value is null for CREATE requests.
      // 'request' - Attributes of the admission request(/pkg/apis/admission/types.go#AdmissionRequest).
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 22.6K bytes
    - Viewed (0)
  9. guava/src/com/google/common/graph/ValueGraph.java

       */
      @Override
      Set<N> adjacentNodes(N node);
    
      /**
       * Returns a live view of all nodes in this graph adjacent to {@code node} which can be reached by
       * traversing {@code node}'s incoming edges <i>against</i> the direction (if any) of the edge.
       *
       * <p>In an undirected graph, this is equivalent to {@link #adjacentNodes(Object)}.
       *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 10 15:41:27 UTC 2024
    - 16K bytes
    - Viewed (0)
  10. cmd/post-policy-fan-out.go

    	KeyID    string
    	Key      []byte
    	KmsCtx   kms.Context
    	Checksum *hash.Checksum
    	MD5Hex   string
    }
    
    // fanOutPutObject takes an input source reader and fans out multiple PUT operations
    // based on the incoming fan-out request, a context cancellation by the caller
    // would ensure all fan-out operations are canceled.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 3.5K bytes
    - Viewed (0)
Back to top