- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 26 for wyoming (0.12 sec)
-
istioctl/pkg/writer/compare/sds/util.go
} proxySecretItems := make([]SecretItem, 0) for _, warmingSecret := range secretConfigDump.DynamicWarmingSecrets { secrets, err := parseDynamicSecret(warmingSecret, "WARMING") if err != nil { return nil, fmt.Errorf("failed building warming secret %s: %v", warmingSecret.Name, err) } proxySecretItems = append(proxySecretItems, secrets...) } for _, activeSecret := range secretConfigDump.DynamicActiveSecrets {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Oct 28 19:52:53 UTC 2024 - 8.5K bytes - Viewed (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/validation/ModelValidator.java
* file model + buildpom filter transformation and has not been subjected to inheritance, interpolation or profile/default injection. * * @param activeExternalProfiles the active profiles coming from external sources (settings.xml), must not be {@code null} * @param model The model to validate, must not be {@code null}. * @param request The model building request that holds further settings, must not be {@code null}.
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 4K bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
"--set-xmark", inpodTproxyMark) // Handle healthcheck probes from the host node. In the host netns, before the packet enters the pod, we SNAT // the healthcheck packet to a fixed IP if the packet is coming from a node-local process with a socket. // // We do this so we can exempt this traffic from ztunnel capture/proxy - otherwise both kube-proxy (legit)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 23.3K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/RateLimiter.java
* if the {@code RateLimiter} is left <i>unused</i> for a duration of {@code warmupPeriod}, it * will gradually return to its "cold" state, i.e. it will go through the same warming up process * as when it was first created. * * <p>The returned {@code RateLimiter} is intended for cases where the resource that actually
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:51:36 UTC 2024 - 21.9K bytes - Viewed (0) -
docs/en/docs/advanced/settings.md
## Pydantic `Settings` Fortunately, Pydantic provides a great utility to handle these settings coming from environment variables with <a href="https://docs.pydantic.dev/latest/concepts/pydantic_settings/" class="external-link" target="_blank">Pydantic: Settings management</a>. ### Install `pydantic-settings`
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.9K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/RateLimiter.java
* if the {@code RateLimiter} is left <i>unused</i> for a duration of {@code warmupPeriod}, it * will gradually return to its "cold" state, i.e. it will go through the same warming up process * as when it was first created. * * <p>The returned {@code RateLimiter} is intended for cases where the resource that actually
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:51:36 UTC 2024 - 21.6K bytes - Viewed (0) -
cmd/signature-v4-utils.go
if !globalIAMSys.Initialized() { // Check if server has initialized, then only proceed // to check for IAM users otherwise its okay for clients // to retry with 503 errors when server is coming up. return auth.Credentials{}, false, ErrIAMNotInitialized } // Check if the access key is part of users credentials. u, ok, err := globalIAMSys.CheckKey(r.Context(), accessKey) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jun 13 22:26:38 UTC 2024 - 9.1K bytes - Viewed (0) -
docs/en/docs/advanced/custom-response.md
3. This `yield from` tells the function to iterate over that thing named `file_like`. And then, for each part iterated, yield that part as coming from this generator function (`iterfile`). So, it is a generator function that transfers the "generating" work to something else internally.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12K bytes - Viewed (0) -
docs/en/docs/index.md
* Automatic and clear errors when the data is invalid. * Validation even for deeply nested JSON objects. * <abbr title="also known as: serialization, parsing, marshalling">Conversion</abbr> of input data: coming from the network to Python data and types. Reading from: * JSON. * Path parameters. * Query parameters. * Cookies. * Headers. * Forms. * Files.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 20 19:20:23 UTC 2024 - 20.4K bytes - Viewed (0) -
docs/en/docs/features.md
You will get completion in code you might even consider impossible before. As for example, the `price` key inside a JSON body (that could have been nested) that comes from a request. No more typing the wrong key names, coming back and forth between docs, or scrolling up and down to find if you finally used `username` or `user_name`. ### Short
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu Aug 15 23:30:12 UTC 2024 - 9.2K bytes - Viewed (0)