Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1141 - 1150 of 1,194 for fail (0.02 sec)

  1. guava/src/com/google/common/reflect/Invokable.java

       *     control and the underlying method or constructor is inaccessible.
       * @throws IllegalArgumentException if the number of actual and formal parameters differ; if an
       *     unwrapping conversion for primitive arguments fails; or if, after possible unwrapping, a
       *     parameter value cannot be converted to the corresponding formal parameter type by a method
       *     invocation conversion.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Dec 14 20:35:03 UTC 2023
    - 19.6K bytes
    - Viewed (0)
  2. guava-tests/test/com/google/common/collect/ImmutableListTest.java

                .createTestSuite());
        suite.addTest(
            ListTestSuiteBuilder.using(new ImmutableListTailSubListGenerator())
                .named("ImmutableList, tail subList")
                .withFeatures(CollectionSize.ANY, SERIALIZABLE, ALLOWS_NULL_QUERIES)
                .createTestSuite());
        suite.addTest(
            ListTestSuiteBuilder.using(new ImmutableListMiddleSubListGenerator())
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 23.5K bytes
    - Viewed (0)
  3. architecture/ambient/ztunnel.md

      * Specifically, ztunnel should be able to send a request to the control plane to answer "I got a request to send traffic to 1.1.1.1, what is 1.1.1.1?"
      * While this is not needed for small scales, this is important for the long tail of massive clusters (think 1 million endpoints), where the entire set of endpoints cannot reasonably be replicated to each ztunnel.
    * It should not be client-specific.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  4. src/bytes/buffer.go

    			return n, nil // e is EOF, so return nil explicitly
    		}
    		if e != nil {
    			return n, e
    		}
    	}
    }
    
    // growSlice grows b by n, preserving the original content of b.
    // If the allocation fails, it panics with ErrTooLarge.
    func growSlice(b []byte, n int) []byte {
    	defer func() {
    		if recover() != nil {
    			panic(ErrTooLarge)
    		}
    	}()
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Oct 29 16:47:05 UTC 2024
    - 15.7K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/smb1/SmbTransport.java

                    if (resp instanceof SmbComTransactionResponse) {
                        ((SmbComTransactionResponse)resp).nextElement();
                    }
                }
    
                /* Verification fails (w/ W2K3 server at least) if status is not 0. This
                 * suggests MS doesn't compute the signature (correctly) for error responses
                 * (perhaps for DOS reasons).
                 */
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 31.2K bytes
    - Viewed (0)
  6. guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    fell past it.
    
      `Well!' thought Alice to herself, `after such a fall as this, I
    shall think nothing of tumbling down stairs!  How brave they'll
    all think me at home!  Why, I wouldn't say anything about it,
    even if I fell off the top of the house!' (Which was very likely
    true.)
    
      Down, down, down.  Would the fall NEVER come to an end!  `I
    wonder how many miles I've fallen by this time?' she said aloud.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 29 21:35:03 UTC 2012
    - 145.2K bytes
    - Viewed (0)
  7. docs/pt/docs/async.md

    ### Outras formas de código assíncrono
    
    Esse estilo de usar `async` e `await` é relativamente novo na linguagem.
    
    Mas ele faz o trabalho com código assíncrono muito mais fácil.
    
    Essa mesma sintaxe (ou quase a mesma) foi também incluída recentemente em versões modernas do JavaScript (no navegador e NodeJS).
    
    Mas antes disso, controlar código assíncrono era bem mais complexo e difícil.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 22.2K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/CompactHashSet.java

       *         <li>one plus an index into the entries and elements array
       *       </ul>
       *   <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 18 20:24:49 UTC 2024
    - 24.9K bytes
    - Viewed (0)
  9. docs/az/docs/index.md

    <div class="termy">
    
    ```console
    $ pip install "uvicorn[standard]"
    
    ---> 100%
    ```
    
    </div>
    
    ## Nümunə
    
    ### Kodu yaradaq
    
    * `main.py` adlı fayl yaradaq və ona aşağıdakı kodu yerləşdirək:
    
    ```Python
    from typing import Union
    
    from fastapi import FastAPI
    
    app = FastAPI()
    
    
    @app.get("/")
    def read_root():
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 20 19:20:23 UTC 2024
    - 22.8K bytes
    - Viewed (0)
  10. docs/pt/docs/advanced/security/oauth2-scopes.md

    Você não necessariamente precisa de escopos do OAuth2, e você pode lidar com autenticação e autorização da maneira que você achar melhor.
    
    Mas o OAuth2 com escopos pode ser integrado de maneira fácil em sua API (com OpenAPI) e a sua documentação de API.
    
    No entando, você ainda aplica estes escopos, ou qualquer outro requisito de segurança/autorização, conforme necessário, em seu código.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 21.7K bytes
    - Viewed (0)
Back to top