- Sort Score
- Num 10 results
- Language All
Results 121 - 130 of 563 for dirent (0.08 seconds)
-
docs/de/docs/advanced/templates.md
Sie können jede gewünschte Template-Engine mit **FastAPI** verwenden. Eine häufige Wahl ist Jinja2, dasselbe, was auch von Flask und anderen Tools verwendet wird. Es gibt Werkzeuge zur einfachen Konfiguration, die Sie direkt in Ihrer **FastAPI**-Anwendung verwenden können (bereitgestellt von Starlette). ## Abhängigkeiten installieren { #install-dependencies }Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.3K bytes - Click Count (0) -
src/main/webapp/css/admin/adminlte.min.css.map
#fff;\n}\n\n.direct-chat-secondary .right > .direct-chat-text::after, .direct-chat-secondary .right > .direct-chat-text::before {\n border-left-color: #6c757d;\n}\n\n.direct-chat-success .right > .direct-chat-text {\n background-color: #28a745;\n border-color: #28a745;\n color: #fff;\n}\n\n.direct-chat-success .right > .direct-chat-text::after, .direct-chat-success .right > .direct-chat-text::before {\n border-left-color: #28a745;\n}\n\n.direct-chat-info .right > .direct-chat-text {\n background-color:...
Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Sat Oct 26 01:49:09 GMT 2024 - 3.7M bytes - Click Count (3) -
android/guava-tests/test/com/google/common/hash/MessageDigestHashFunctionTest.java
try { MessageDigest digest = MessageDigest.getInstance(algorithmName); assertEquals( HashCode.fromBytes(digest.digest(input)), ALGORITHMS.get(algorithmName).hashBytes(input)); for (int bytes = 4; bytes <= digest.getDigestLength(); bytes++) { assertEquals( HashCode.fromBytes(Arrays.copyOf(digest.digest(input), bytes)),Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Dec 19 18:03:30 GMT 2024 - 4.2K bytes - Click Count (0) -
LICENSES/third_party/forked/golang/LICENSE
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Aug 10 21:37:28 GMT 2021 - 1.4K bytes - Click Count (0) -
LICENSES/vendor/github.com/JeffAshton/win_pdh/LICENSE
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Fri May 08 04:49:00 GMT 2020 - 1.5K bytes - Click Count (0) -
VULNERABILITY_REPORT.md
# Vulnerability Management Policy This document formally describes the process of addressing and managing a reported vulnerability that has been found in the MinIO server code base, any directly connected ecosystem component or a direct / indirect dependency of the code base. ## Scope The vulnerability management policy described in this document covers the process of investigating, assessing and resolving a vulnerability report
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 1.5K bytes - Click Count (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/WorkspaceRepository.java
* within the context of a session, meaning it can only be used for artifact resolution, * not for installation or deployment. This interface does not provide direct access * to artifacts; that functionality is handled by a {@code WorkspaceReader}. */ public interface WorkspaceRepository extends Repository { /** * {@return the type of the repository, i.e. "workspace"}Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Feb 07 00:45:02 GMT 2025 - 1.5K bytes - Click Count (0) -
docs/de/docs/tutorial/background-tasks.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 5.8K bytes - Click Count (0) -
docs/de/docs/advanced/events.md
Und dann, direkt nach dem `yield`, entladen wir das Modell. Dieser Code wird ausgeführt, **nachdem** die Anwendung **die Bearbeitung von Requests abgeschlossen hat**, direkt vor dem *Shutdown*. Dadurch könnten beispielsweise Ressourcen wie Arbeitsspeicher oder eine GPU freigegeben werden. /// tip | Tipp
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 9.5K bytes - Click Count (0) -
docs/features/connections.md
4. If it's a new route, it connects by building either a direct socket connection, a TLS tunnel (for HTTPS over an HTTP proxy), or a direct TLS connection. It does TLS handshakes as necessary. This step may be retried for tunnel challenges and TLS handshake failures. 5. It sends the HTTP request and reads the response.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Mon Feb 21 03:33:59 GMT 2022 - 5.4K bytes - Click Count (0)