- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 253 for turn (0.02 sec)
-
docs/en/docs/tutorial/body-nested-models.md
You can define arbitrarily deeply nested models: {* ../../docs_src/body_nested_models/tutorial007_py310.py hl[7,12,18,21,25] *} /// info Notice how `Offer` has a list of `Item`s, which in turn have an optional list of `Image`s /// ## Bodies of pure lists { #bodies-of-pure-lists }Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 6.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Now we are going to update our dependencies. We want to get the `current_user` *only* if this user is active. So, we create an additional dependency `get_current_active_user` that in turn uses `get_current_user` as a dependency. Both of these dependencies will just return an HTTP error if the user doesn't exist, or if is inactive.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/index.md
* etc. ## Simple and Powerful { #simple-and-powerful } Although the hierarchical dependency injection system is very simple to define and use, it's still very powerful. You can define dependencies that in turn can define dependencies themselves.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.6K bytes - Viewed (0) -
helm/minio/README.md
NetworkPolicy spec](https://kubernetes.io/docs/tasks/administer-cluster/declare-network-policy#before-you-begin), and set `networkPolicy.enabled` to `true`. For Kubernetes v1.5 & v1.6, you must also turn on NetworkPolicy by setting the DefaultDeny namespace annotation. Note: this will enforce policy for *all* pods in the namespace: ```
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 10.9K bytes - Viewed (0) -
cmd/net.go
ipList.Add(addr) } return ipList, err } // sortIPs - sort ips based on higher octets. // The logic to sort by last octet is implemented to // prefer CIDRs with higher octets, this in-turn skips the // localhost/loopback address to be not preferred as the // first ip on the list. Subsequently this list helps us print // a user friendly message with appropriate values. func sortIPs(ipList []string) []string {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 9.6K bytes - Viewed (1) -
cmd/signature-v4_test.go
"X-Amz-Date": now.Format(iso8601Format), }, region: "", expected: ErrUnsignedHeaders, }, } // Run each test case individually. for i, testCase := range testCases { // Turn the map[string]string into map[string][]string, because Go. query := url.Values{} for key, value := range testCase.queryParams { query.Set(key, value) } // Create a request to use.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 10.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
doubt that it had a VERY turn-up nose, much more like a snout than a real nose; also its eyes were getting extremely small for a baby: altogether Alice did not like the look of the thing at all. `But perhaps it was only sobbing,' she thought, and looked into its eyes again, to see if there were any tears. No, there were no tears. `If you're going to turn into a pig,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Apr 21 02:27:51 UTC 2017 - 145.2K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
* [HTTP Public Key Pinning (HPKP)][rfc_7469] or SHA-1 base64 hashes as in Chromium's * [static certificates][static_certificates]. * * ## Setting up Certificate Pinning * * The easiest way to pin a host is turn on pinning with a broken configuration and read the * expected configuration when the connection fails. Be sure to do this on a trusted network, and * without man-in-the-middle tools like [Charles][charles] or [Fiddler][fiddler]. *
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 14.1K bytes - Viewed (1) -
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
And all of them can use `yield`. In this case `dependency_c`, to execute its exit code, needs the value from `dependency_b` (here named `dep_b`) to still be available. And, in turn, `dependency_b` needs the value from `dependency_a` (here named `dep_a`) to be available for its exit code. {* ../../docs_src/dependencies/tutorial008_an_py39.py hl[18:19,26:27] *}Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 12.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
*/ public void setKey(final byte[] key) { // CHECK PAROTY TBD deskey(key, true, encryptKeys); deskey(key, false, decryptKeys); } // Turn an 8-byte key into internal keys. private void deskey(final byte[] keyBlock, final boolean encrypting, final int[] KnL) { int i, j, l, m, n; final int[] pc1m = new int[56];Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0)