- Sort Score
- Result 10 results
- Languages All
Results 331 - 340 of 420 for scopes (0.1 sec)
-
src/test/java/jcifs/netbios/NodeStatusResponseTest.java
// Setup queryAddress with unknown name Name unknownName = mock(Name.class); lenient().when(unknownName.isUnknown()).thenReturn(true); unknownName.hexCode = 0x20; unknownName.scope = null; mockQueryAddress.hostName = unknownName; response = new NodeStatusResponse(mockConfig, mockQueryAddress); // Prepare test data byte[] src = new byte[100];Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 19.3K bytes - Viewed (0) -
LICENSE
granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Mon Jan 11 04:30:09 UTC 2021 - 11.1K bytes - Viewed (0) -
docs/en/docs/advanced/behind-a-proxy.md
/// ### Checking the current `root_path` { #checking-the-current-root-path } You can get the current `root_path` used by your application for each request, it is part of the `scope` dictionary (that's part of the ASGI spec). Here we are including it in the message just for demonstration purposes. {* ../../docs_src/behind_a_proxy/tutorial001.py hl[8] *} Then, if you start Uvicorn with:Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 16K bytes - Viewed (0) -
LICENSE
granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Sep 11 20:39:30 UTC 2013 - 11.1K bytes - Viewed (0) -
cmd/site-replication.go
} return c.annotatePeerErr(p.Name, replicateIAMItem, admClient.SRPeerReplicateIAMItem(ctx, item)) }, replicateIAMItem, ) return errors.Unwrap(cerr) } // PeerAddPolicyHandler - copies IAM policy to local. A nil policy argument, // causes the named policy to be deleted. func (c *SiteReplicationSys) PeerAddPolicyHandler(ctx context.Context, policyName string, p *policy.Policy, updatedAt time.Time) error {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (1) -
LICENSE.txt
granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 23 14:02:28 UTC 2012 - 11.1K bytes - Viewed (0) -
LICENSE
granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Mon Jan 11 04:26:17 UTC 2021 - 11.1K bytes - Viewed (0) -
LICENSE
granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:Registered: Wed Sep 10 00:11:11 UTC 2025 - Last Modified: Thu Feb 20 19:53:57 UTC 2020 - 11.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableSet.java
* log n) on average. * * <p>The online hash flooding detecting in RegularSetBuilderImpl.add can detect e.g. many * exactly matching hash codes, which would cause construction to take O(n^2), but can't detect * e.g. hash codes adversarially designed to go into ascending table locations, which keeps * construction O(n) (as desired) but then can have O(n) queries later. *Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 35.2K bytes - Viewed (0) -
cmd/metacache-server-pool.go
if evt.Action.Delete() { globalExpiryState.enqueueByDays(objInfo, evt, lcEventSrc_s3ListObjects) if !evt.Action.DeleteRestored() { continue } // queue version for replication upon expired restored copies if needed. } } queueReplicationHeal(ctx, o.Bucket, objInfo, o.Replication, 0) } return }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon May 26 07:06:43 UTC 2025 - 12.9K bytes - Viewed (0)