- Sort Score
- Result 10 results
- Languages All
Results 211 - 220 of 416 for addons (0.34 sec)
-
guava/src/com/google/common/util/concurrent/ForwardingFluentFuture.java
* own subclass of {@link ListenableFuture}, complete with a method like {@link #from} to adapt an * existing {@code ListenableFuture}, implemented atop a {@link ForwardingListenableFuture} that * forwards to that future and adds the desired methods. */ @GwtCompatible final class ForwardingFluentFuture<V extends @Nullable Object> extends FluentFuture<V> { private final ListenableFuture<V> delegate;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 2.4K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/auth/AuthenticationManagerTest.java
assertEquals(1, chain3.updateCallCount); } // Test addChain null handling public void test_addChain_withNull() { // ArrayUtils.addAll handles null gracefully by adding it to the array authenticationManager.addChain(null); // Verify null chain doesn't cause issues during operations User user = createTestUser("testuser"); try {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 14K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http2/Hpack.kt
val bytesToRecover = dynamicTableByteCount + delta - maxDynamicTableByteCount val entriesEvicted = evictToRecoverBytes(bytesToRecover) if (index == -1) { // Adding a value to the dynamic table. if (headerCount + 1 > dynamicTable.size) { // Need to grow the dynamic table. val doubled = arrayOfNulls<Header>(dynamicTable.size * 2)
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon May 05 16:01:00 UTC 2025 - 22.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/graph/AbstractStandardDirectedNetworkTest.java
assertThat(network.outDegree(N1)).isEqualTo(2); } // Element Mutation @Test public void addEdge_existingNodes() { assume().that(graphIsMutable()).isTrue(); // Adding nodes initially for safety (insulating from possible future // modifications to proxy methods) addNode(N1); addNode(N2); assertThat(networkAsMutableNetwork.addEdge(N1, N2, E12)).isTrue();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 20.9K bytes - Viewed (0) -
guava-tests/test/com/google/common/graph/AbstractStandardDirectedNetworkTest.java
assertThat(network.outDegree(N1)).isEqualTo(2); } // Element Mutation @Test public void addEdge_existingNodes() { assume().that(graphIsMutable()).isTrue(); // Adding nodes initially for safety (insulating from possible future // modifications to proxy methods) addNode(N1); addNode(N2); assertThat(networkAsMutableNetwork.addEdge(N1, N2, E12)).isTrue();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 21.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/SmbTransportPoolImplTest.java
negotiatedField.setAccessible(true); negotiatedField.set(first, negotiationResponse); // Simulate session already in use by adding a session Field sessionsField = SmbTransportImpl.class.getDeclaredField("sessions"); sessionsField.setAccessible(true); @SuppressWarnings("unchecked")
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 19.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/SearchLogHelper.java
return storeUserInfo(key); } }); searchLogLogger = LogManager.getLogger(loggerName); } /** * Adds a search log to the queue. * * @param params The search request parameters. * @param requestedTime The time the search was requested. * @param queryId The ID of the search query.
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 26.3K bytes - Viewed (0) -
internal/lru/lru.go
c.onEvict(k, v.Value) } delete(c.items, k) } for _, b := range c.buckets { for _, ent := range b.entries { delete(b.entries, ent.Key) } } c.evictList.Init() } // Add adds a value to the cache. Returns true if an eviction occurred. // Returns false if there was no eviction: the item was already in the cache, // or the size was not exceeded. func (c *LRU[K, V]) Add(key K, value V) (evicted bool) {
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Fri Apr 25 08:22:26 UTC 2025 - 12.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/helper/DuplicateHostHelper.java
*/ public void setDuplicateHostList(final List<DuplicateHost> duplicateHostList) { this.duplicateHostList = duplicateHostList; } /** * Adds a new duplicate host rule to the list. * Initializes the list if it doesn't exist. * * @param duplicateHost the duplicate host rule to add */ public void add(final DuplicateHost duplicateHost) {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 3.9K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
So, we get a Pydantic model from the data in another Pydantic model. #### Unpacking a `dict` and extra keywords { #unpacking-a-dict-and-extra-keywords } And then adding the extra keyword argument `hashed_password=hashed_password`, like in: ```Python UserInDB(**user_in.dict(), hashed_password=hashed_password) ``` ...ends up being like: ```Python UserInDB(
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.2K bytes - Viewed (0)