- Sort Score
- Result 10 results
- Languages All
Results 1141 - 1150 of 1,194 for fail (0.02 sec)
-
guava/src/com/google/common/reflect/Invokable.java
* control and the underlying method or constructor is inaccessible. * @throws IllegalArgumentException if the number of actual and formal parameters differ; if an * unwrapping conversion for primitive arguments fails; or if, after possible unwrapping, a * parameter value cannot be converted to the corresponding formal parameter type by a method * invocation conversion.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Dec 14 20:35:03 UTC 2023 - 19.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/ImmutableListTest.java
.createTestSuite()); suite.addTest( ListTestSuiteBuilder.using(new ImmutableListTailSubListGenerator()) .named("ImmutableList, tail subList") .withFeatures(CollectionSize.ANY, SERIALIZABLE, ALLOWS_NULL_QUERIES) .createTestSuite()); suite.addTest( ListTestSuiteBuilder.using(new ImmutableListMiddleSubListGenerator())
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 23.5K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
* Specifically, ztunnel should be able to send a request to the control plane to answer "I got a request to send traffic to 1.1.1.1, what is 1.1.1.1?" * While this is not needed for small scales, this is important for the long tail of massive clusters (think 1 million endpoints), where the entire set of endpoints cannot reasonably be replicated to each ztunnel. * It should not be client-specific.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0) -
src/bytes/buffer.go
return n, nil // e is EOF, so return nil explicitly } if e != nil { return n, e } } } // growSlice grows b by n, preserving the original content of b. // If the allocation fails, it panics with ErrTooLarge. func growSlice(b []byte, n int) []byte { defer func() { if recover() != nil { panic(ErrTooLarge) } }()
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Tue Oct 29 16:47:05 UTC 2024 - 15.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbTransport.java
if (resp instanceof SmbComTransactionResponse) { ((SmbComTransactionResponse)resp).nextElement(); } } /* Verification fails (w/ W2K3 server at least) if status is not 0. This * suggests MS doesn't compute the signature (correctly) for error responses * (perhaps for DOS reasons). */
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 31.2K bytes - Viewed (0) -
guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
fell past it. `Well!' thought Alice to herself, `after such a fall as this, I shall think nothing of tumbling down stairs! How brave they'll all think me at home! Why, I wouldn't say anything about it, even if I fell off the top of the house!' (Which was very likely true.) Down, down, down. Would the fall NEVER come to an end! `I wonder how many miles I've fallen by this time?' she said aloud.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 29 21:35:03 UTC 2012 - 145.2K bytes - Viewed (0) -
docs/pt/docs/async.md
### Outras formas de código assíncrono Esse estilo de usar `async` e `await` é relativamente novo na linguagem. Mas ele faz o trabalho com código assíncrono muito mais fácil. Essa mesma sintaxe (ou quase a mesma) foi também incluída recentemente em versões modernas do JavaScript (no navegador e NodeJS). Mas antes disso, controlar código assíncrono era bem mais complexo e difícil.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 22.2K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashSet.java
* <li>one plus an index into the entries and elements array * </ul> * <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 20:24:49 UTC 2024 - 24.9K bytes - Viewed (0) -
docs/az/docs/index.md
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 20 19:20:23 UTC 2024 - 22.8K bytes - Viewed (0) -
docs/pt/docs/advanced/security/oauth2-scopes.md
Você não necessariamente precisa de escopos do OAuth2, e você pode lidar com autenticação e autorização da maneira que você achar melhor. Mas o OAuth2 com escopos pode ser integrado de maneira fácil em sua API (com OpenAPI) e a sua documentação de API. No entando, você ainda aplica estes escopos, ou qualquer outro requisito de segurança/autorização, conforme necessário, em seu código.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 21.7K bytes - Viewed (0)