Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 253 for turn (0.02 sec)

  1. docs/en/docs/tutorial/body-nested-models.md

    You can define arbitrarily deeply nested models:
    
    {* ../../docs_src/body_nested_models/tutorial007_py310.py hl[7,12,18,21,25] *}
    
    /// info
    
    Notice how `Offer` has a list of `Item`s, which in turn have an optional list of `Image`s
    
    ///
    
    ## Bodies of pure lists { #bodies-of-pure-lists }
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 6.7K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/simple-oauth2.md

    Now we are going to update our dependencies.
    
    We want to get the `current_user` *only* if this user is active.
    
    So, we create an additional dependency `get_current_active_user` that in turn uses `get_current_user` as a dependency.
    
    Both of these dependencies will just return an HTTP error if the user doesn't exist, or if is inactive.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/dependencies/index.md

    * etc.
    
    ## Simple and Powerful { #simple-and-powerful }
    
    Although the hierarchical dependency injection system is very simple to define and use, it's still very powerful.
    
    You can define dependencies that in turn can define dependencies themselves.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.6K bytes
    - Viewed (0)
  4. helm/minio/README.md

    NetworkPolicy spec](https://kubernetes.io/docs/tasks/administer-cluster/declare-network-policy#before-you-begin),
    and set `networkPolicy.enabled` to `true`.
    
    For Kubernetes v1.5 & v1.6, you must also turn on NetworkPolicy by setting
    the DefaultDeny namespace annotation. Note: this will enforce policy for *all* pods in the namespace:
    
    ```
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. cmd/net.go

    		ipList.Add(addr)
    	}
    
    	return ipList, err
    }
    
    // sortIPs - sort ips based on higher octets.
    // The logic to sort by last octet is implemented to
    // prefer CIDRs with higher octets, this in-turn skips the
    // localhost/loopback address to be not preferred as the
    // first ip on the list. Subsequently this list helps us print
    // a user friendly message with appropriate values.
    func sortIPs(ipList []string) []string {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 9.6K bytes
    - Viewed (1)
  6. cmd/signature-v4_test.go

    				"X-Amz-Date": now.Format(iso8601Format),
    			},
    			region:   "",
    			expected: ErrUnsignedHeaders,
    		},
    	}
    
    	// Run each test case individually.
    	for i, testCase := range testCases {
    		// Turn the map[string]string into map[string][]string, because Go.
    		query := url.Values{}
    		for key, value := range testCase.queryParams {
    			query.Set(key, value)
    		}
    
    		// Create a request to use.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  7. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    doubt that it had a VERY turn-up nose, much more like a snout
    than a real nose; also its eyes were getting extremely small for
    a baby:  altogether Alice did not like the look of the thing at
    all.  `But perhaps it was only sobbing,' she thought, and looked
    into its eyes again, to see if there were any tears.
    
      No, there were no tears.  `If you're going to turn into a pig,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Fri Apr 21 02:27:51 UTC 2017
    - 145.2K bytes
    - Viewed (0)
  8. okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt

     * [HTTP Public Key Pinning (HPKP)][rfc_7469] or SHA-1 base64 hashes as in Chromium's
     * [static certificates][static_certificates].
     *
     * ## Setting up Certificate Pinning
     *
     * The easiest way to pin a host is turn on pinning with a broken configuration and read the
     * expected configuration when the connection fails. Be sure to do this on a trusted network, and
     * without man-in-the-middle tools like [Charles][charles] or [Fiddler][fiddler].
     *
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 14.1K bytes
    - Viewed (1)
  9. docs/en/docs/tutorial/dependencies/dependencies-with-yield.md

    And all of them can use `yield`.
    
    In this case `dependency_c`, to execute its exit code, needs the value from `dependency_b` (here named `dep_b`) to still be available.
    
    And, in turn, `dependency_b` needs the value from `dependency_a` (here named `dep_a`) to be available for its exit code.
    
    {* ../../docs_src/dependencies/tutorial008_an_py39.py hl[18:19,26:27] *}
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 12.9K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/util/DES.java

         */
        public void setKey(final byte[] key) {
    
            // CHECK PAROTY TBD
            deskey(key, true, encryptKeys);
            deskey(key, false, decryptKeys);
        }
    
        // Turn an 8-byte key into internal keys.
        private void deskey(final byte[] keyBlock, final boolean encrypting, final int[] KnL) {
    
            int i, j, l, m, n;
            final int[] pc1m = new int[56];
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 22.7K bytes
    - Viewed (0)
Back to top