- Sort Score
- Result 10 results
- Languages All
Results 1451 - 1460 of 2,020 for brother (0.06 sec)
-
common-protos/k8s.io/api/autoscaling/v2beta1/generated.proto
// status is the status of the condition (True, False, Unknown) optional string status = 2; // lastTransitionTime is the last time the condition transitioned from // one status to another // +optional optional k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 3; // reason is the reason for the condition's last transition. // +optional optional string reason = 4;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 21.2K bytes - Viewed (0) -
docs/debugging/xl-meta/main.go
} otherPart := getPartNum(other[0]) if part != otherPart { fmt.Println("part ", part, " != other part", otherPart, other[0]) continue } // fmt.Println("part ", part, "other part", otherPart, other[0]) fmt.Printf("Reading version %q Part %d.\n", otherKey, otherPart) // os.Exit(0) otherM, err := readAndMap(other, part, block) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 05 11:57:44 UTC 2024 - 40.3K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-data-types.md
* Great editor support. * Data conversion from incoming requests. * Data conversion for response data. * Data validation. * Automatic annotation and documentation. ## Other data types Here are some of the additional data types you can use: * `UUID`: * A standard "Universally Unique Identifier", common as an ID in many databases and systems.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 4K bytes - Viewed (0) -
architecture/ambient/peer-authentication.md
Waypoint proxy and forward the traffic over that connection without presenting a client certificate. Therefore, it is absolutely critical that the waypoint proxy not assume any identity from incoming connections, even if the ztunnel is hairpinning. In other words, all traffic over TLS HBONE tunnels must be considered to be untrusted. From there, traffic is returned to the ztunnel (still over the TLS HBONE tunnel) and forwarded to the destination workload. The following diagram illustrates the...
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Aug 01 20:04:20 UTC 2024 - 3.9K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md
/// ## Dependencies errors and return values You can use the same dependency *functions* you use normally. ### Dependency requirements They can declare request requirements (like headers) or other sub-dependencies: //// tab | Python 3.9+ ```Python hl_lines="8 13" {!> ../../docs_src/dependencies/tutorial006_an_py39.py!} ``` //// //// tab | Python 3.8+ ```Python hl_lines="7 12"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/collect/MutableClassToInstanceMapTest.java
suite.addTestSuite(MutableClassToInstanceMapTest.class); suite.addTest( MapTestSuiteBuilder.using( new TestClassToInstanceMapGenerator() { // Other tests will verify what real, warning-free usage looks like // but here we have to do some serious fudging @Override @SuppressWarnings({"unchecked", "rawtypes"})
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Feb 22 20:09:59 UTC 2024 - 4.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/ForwardingSortedSet.java
import java.util.NoSuchElementException; import java.util.SortedSet; import javax.annotation.CheckForNull; import org.checkerframework.checker.nullness.qual.Nullable; /** * A sorted set which forwards all its method calls to another sorted set. Subclasses should * override one or more methods to modify the behavior of the backing sorted set as desired per the * <a href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri May 12 15:26:39 UTC 2023 - 5.7K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/Doubles.java
* method, {@code NaN} is treated as greater than all other values, and {@code 0.0 > -0.0}. * * <p><b>Note:</b> this method simply delegates to the JDK method {@link Double#compare}. It is * provided for consistency with the other primitive types, whose compare methods were not added * to the JDK until JDK 7. * * @param a the first {@code double} to compare
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 28.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/MinMaxPriorityQueue.java
* iterator will generally throw a {@link ConcurrentModificationException}. Thus, in the face of * concurrent modification, the iterator fails quickly and cleanly, rather than risking arbitrary, * non-deterministic behavior at an undetermined time in the future. * * <p>Note that the fail-fast behavior of an iterator cannot be guaranteed as it is, generally
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 34.1K bytes - Viewed (0) -
guava/src/com/google/common/escape/CharEscaper.java
* need to be escaped. If an empty array is returned, this effectively strips the input character * from the resulting text. * * <p>If the character does not need to be escaped, this method should return {@code null}, rather * than a one-character array containing the character itself. This enables the escaping algorithm * to perform more efficiently. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jan 18 20:55:09 UTC 2022 - 6.7K bytes - Viewed (0)