- Sort Score
- Result 10 results
- Languages All
Results 891 - 900 of 1,214 for examples (0.04 sec)
-
compat/maven-model-builder/src/test/java/org/apache/maven/model/validation/DefaultModelValidatorTest.java
assertViolations(result, 1, 0, 0); assertEquals( "'dependencies.dependency[com.example.group:testinvalidpom:0.0.1-SNAPSHOT]' for com.example.group:testinvalidpom:0.0.1-SNAPSHOT is referencing itself.", result.getFatals().get(0)); } @TestRegistered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Sep 17 10:01:14 UTC 2025 - 33.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ForwardingMultiset.java
* href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. * * <p><b>Warning:</b> The methods of {@code ForwardingMultiset} forward <b>indiscriminately</b> to * the methods of the delegate. For example, overriding {@link #add(Object, int)} alone <b>will * not</b> change the behavior of {@link #add(Object)}, which can lead to unexpected behavior. In
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 10.3K bytes - Viewed (0) -
docs/de/docs/advanced/openapi-callbacks.md
Und er wird wahrscheinlich von Anwendung zu Anwendung sehr unterschiedlich sein. Es könnten nur eine oder zwei Codezeilen sein, wie zum Beispiel: ```Python callback_url = "https://example.com/api/v1/invoices/events/" httpx.post(callback_url, json={"description": "Invoice paid", "paid": True}) ```
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 10 13:54:34 UTC 2025 - 9.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
<img src="/img/tutorial/security/image12.png"> ## Check the username { #check-the-username } Here's a more complete example. Use a dependency to check if the username and password are correct.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/MoreExecutors.java
* Inappropriate {@code directExecutor} usage can cause problems, and these problems can be * difficult to reproduce because they depend on timing. For example: * * <ul> * <li>When a {@code ListenableFuture} listener is registered to run under {@code * directExecutor}, the listener can execute in any of three possible threads: * <ol>Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Oct 08 18:55:33 UTC 2025 - 45.2K bytes - Viewed (0) -
docs/zh/docs/advanced/behind-a-proxy.md
// More stuff here "servers": [ { "url": "/api/v1" }, { "url": "https://stag.example.com", "description": "Staging environment" }, { "url": "https://prod.example.com", "description": "Production environment" } ], "paths": { // More stuff here } } ```Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.3K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt
property rights or otherwise. As a condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is Recipient's responsibility to acquire that license before distributing the Program.
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Mon Sep 17 05:50:12 UTC 2018 - 11.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/reflect/ImmutableTypeToInstanceMapTest.java
} @Override public Object[] createValueArray(int length) { return new Object[length]; } @Override public SampleElements<Entry<TypeToken, Object>> samples() { return new SampleElements<>( entry(TypeToken.of(Integer.class), 0), entry(TypeToken.of(Number.class), 1), entry(new TypeToken<ImmutableList<Integer>>() {}, ImmutableList.of(2)),Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 6.9K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file * with desired access bits <code>0x00000003</code> (<code>FILE_READ_DATA | * FILE_WRITE_DATA</code>) and the target file has the following security * descriptor ACEs: *
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
docs/de/docs/tutorial/dependencies/classes-as-dependencies.md
Bevor wir tiefer in das **Dependency Injection** System eintauchen, lassen Sie uns das vorherige Beispiel verbessern. ## Ein `dict` aus dem vorherigen Beispiel { #a-dict-from-the-previous-example } Im vorherigen Beispiel haben wir ein <abbr title="Dictionary – Zuordnungstabelle: In anderen Sprachen auch Hash, Map, Objekt, Assoziatives Array genannt">`dict`</abbr> von unserer Abhängigkeit („Dependable“) zurückgegeben:Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 7.6K bytes - Viewed (0)