- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 178 for sehari (0.06 sec)
-
docs/en/docs/tutorial/dependencies/index.md
This is very useful when you need to: * Have shared logic (the same code logic again and again). * Share database connections. * Enforce security, authentication, role requirements, etc. * And many other things... All these, while minimizing code repetition. ## First Steps
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon Oct 28 11:18:17 UTC 2024 - 9.2K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/OkHttpClientTest.kt
assertThat(a.dispatcher).isNotNull() assertThat(a.connectionPool).isNotNull() assertThat(a.sslSocketFactory).isNotNull() assertThat(a.x509TrustManager).isNotNull() // Multiple clients share the instances. val b = client.newBuilder().build() assertThat(b.dispatcher).isSameAs(a.dispatcher) assertThat(b.connectionPool).isSameAs(a.connectionPool)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Mar 31 17:16:15 UTC 2024 - 13.2K bytes - Viewed (0) -
api/maven-api-xml/src/main/java/org/apache/maven/api/xml/XmlNode.java
/** * This default mode for combining children DOMs during merge means that where element names match, the process will * try to merge the element data, rather than putting the dominant and recessive elements (which share the same * element name) as siblings in the resulting DOM. */ String DEFAULT_CHILDREN_COMBINATION_MODE = CHILDREN_COMBINATION_MERGE; String SELF_COMBINATION_MODE_ATTRIBUTE = "combine.self";
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Mon Nov 27 23:11:34 UTC 2023 - 4.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/http/NetworkExplorer.java
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Wed Jan 22 03:57:31 UTC 2020 - 19.7K bytes - Viewed (0) -
docs/de/docs/tutorial/dependencies/sub-dependencies.md
```Python hl_lines="8-9" {!> ../../docs_src/dependencies/tutorial005.py!} ``` //// Diese deklariert einen optionalen Abfrageparameter `q` vom Typ `str` und gibt ihn dann einfach zurück. Das ist recht einfach (nicht sehr nützlich), hilft uns aber dabei, uns auf die Funktionsweise der Unterabhängigkeiten zu konzentrieren. ## Zweite Abhängigkeit, „Dependable“ und „Dependant“
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 6.2K bytes - Viewed (0) -
cmd/erasure-decode.go
// Reading first time on this disk, hence the buffer needs to be allocated. // Subsequent reads will reuse this buffer. p.buf[bufIdx] = make([]byte, p.shardSize) } // For the last shard, the shardsize might be less than previous shard sizes. // Hence the following statement ensures that the buffer size is reset to the right size. p.buf[bufIdx] = p.buf[bufIdx][:p.shardSize] n, err := rr.ReadAt(p.buf[bufIdx], p.offset)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 29 01:40:52 UTC 2024 - 9.5K bytes - Viewed (0) -
src/test/java/jcifs/tests/FileOperationsTest.java
SmbResource f = new SmbFile(defaultShareRoot, makeRandomName()); SmbResource p = new SmbFile(getTestShareGuestURL(), getContext()); SmbResource tgt = new SmbFile(p, "other-share") ) { f.createNewFile(); boolean renamed = false; try { f.renameTo(tgt, true); Assert.assertFalse("Should not be able to rename between trees", true);
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Thu Jan 05 13:17:59 UTC 2023 - 16.3K bytes - Viewed (0) -
docs/de/docs/tutorial/security/index.md
### OAuth 1 Es gab ein OAuth 1, das sich stark von OAuth2 unterscheidet und komplexer ist, da es direkte Spezifikationen enthält, wie die Kommunikation verschlüsselt wird. Heutzutage ist es nicht sehr populär und wird kaum verwendet. OAuth2 spezifiziert nicht, wie die Kommunikation verschlüsselt werden soll, sondern erwartet, dass Ihre Anwendung mit HTTPS bereitgestellt wird. /// tip | "Tipp"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 5K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
.signedBy(pinnedRoot) .build() val attackerSwitch = HeldCertificate.Builder() .serialNumber(5L) .keyPair(attackerIntermediate.keyPair) // share keys between compromised CA and leaf! .commonName("attacker") .addSubjectAlternativeName("attacker.com") .signedBy(pinnedIntermediate) .build() val phonyVictim =
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 23.8K bytes - Viewed (0) -
docs/en/docs/img/tutorial/bigger-applications/package.drawio
<mxfile host="65bd71144e" modified="2020-11-28T18:13:19.199Z" agent="5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Code/1.51.1 Chrome/83.0.4103.122 Electron/9.3.3 Safari/537.36" etag="KPHuXUeExV3PdWouu_3U" version="13.6.5"> <diagram id="zB4-QXJZ7ScUzHSLnJ1i" name="Page-1">
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu May 12 00:06:16 UTC 2022 - 6.1K bytes - Viewed (0)