- Sort Score
- Num 10 results
- Language All
Results 331 - 340 of 1,467 for example2 (0.2 seconds)
-
src/test/java/jcifs/smb/StaticJAASConfigurationTest.java
assertTrue(e.getOptions().isEmpty(), "Default options should be empty"); } @ParameterizedTest @NullSource @ValueSource(strings = { "", "svc/http@EXAMPLE.COM" }) @DisplayName("Name parameter is ignored (null/empty/arbitrary)") void nameParameter_isIgnoredAndDoesNotAffectResult(String name) { // Arrange
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 7K bytes - Click Count (0) -
docs/en/docs/tutorial/background-tasks.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.8K bytes - Click Count (0) -
docs/en/docs/tutorial/request-files.md
As all these methods are `async` methods, you need to "await" them. For example, inside of an `async` *path operation function* you can get the contents with: ```Python contents = await myfile.read() ``` If you are inside of a normal `def` *path operation function*, you can access the `UploadFile.file` directly, for example: ```Python contents = myfile.file.read() ``` /// note | `async` Technical Details
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 7.3K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
return result } /** A hostname pattern and certificate hash for Certificate Pinning. */ class Pin( pattern: String, pin: String, ) { /** A hostname like `example.com` or a pattern like `*.example.com` (canonical form). */ val pattern: String /** Either `sha1` or `sha256`. */ val hashAlgorithm: String /** The hash of the pinned certificate using [hashAlgorithm]. */
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 14.1K bytes - Click Count (1) -
android/guava-testlib/src/com/google/common/testing/SerializableTester.java
* java.io.Serializable} instance, and is thus declared an {@code Object}. For example, it might * be declared as a {@code List}. * * <p>Note also that serialization is not in general required to return an object that is * {@linkplain Object#equals equal} to the original, nor is it required to return even an object * of the same class. For example, if sublists of {@code MyList} instances were serializable,Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Dec 21 14:50:24 GMT 2024 - 4.1K bytes - Click Count (0) -
guava/src/com/google/common/net/InetAddresses.java
* {@code InetAddress.getAddress()}) they are 4 and 16 bytes in length, respectively, and represent * the address in network byte order. * * <p>Examples of IP addresses and their byte representations: * * <dl> * <dt>The IPv4 loopback address, {@code "127.0.0.1"}. * <dd>{@code 7f 00 00 01} * <dt>The IPv6 loopback address, {@code "::1"}.Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Feb 19 21:24:11 GMT 2025 - 47.4K bytes - Click Count (0) -
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
For example, you can raise a different exception, like `HTTPException`. /// tip This is a somewhat advanced technique, and in most of the cases you won't really need it, as you can raise exceptions (including `HTTPException`) from inside of the rest of your application code, for example, in the *path operation function*. But it's there for you if you need it. 🤓
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 12.9K bytes - Click Count (0) -
architecture/runtimes.md
All source code in Gradle is written to target one or more of these runtimes. Most source code targets the daemon and the remaining code either targets a single runtime, for example the Gradle client, or is shared across multiple runtimes. ## Composition by architecture modules Each [architecture module and platform](platforms.md) can contribute code to any of the runtimes.
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu May 02 06:42:46 GMT 2024 - 2.3K bytes - Click Count (0) -
docs/distributed/DESIGN.md
- Choice of erasure set size is automatic based on the number of drives available, let's say for example if there are 32 servers and 32 drives which is a total of 1024 drives. In this scenario 16 becomes the erasure set size. This is decided based on the greatest common divisor (GCD) of acceptable erasure set sizes ranging from *4 to 16*.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Feb 26 09:25:50 GMT 2025 - 8K bytes - Click Count (2) -
docs_src/security/tutorial003_py39.py
fake_users_db = { "johndoe": { "username": "johndoe", "full_name": "John Doe", "email": "johndoe@example.com", "hashed_password": "fakehashedsecret", "disabled": False, }, "alice": { "username": "alice", "full_name": "Alice Wonderson", "email": "alice@example.com", "hashed_password": "fakehashedsecret2", "disabled": True, }, } app = FastAPI()Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 2.4K bytes - Click Count (0)