- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 336 for Works (0.7 sec)
-
guava-tests/test/com/google/common/base/JoinerTest.java
StringBuilder sb1FromIterator = new StringBuilder().append('x'); joiner.appendTo(sb1FromIterator, parts.iterator()); assertEquals("x" + expected, sb1FromIterator.toString()); // The use of iterator() works around J2KT b/381065164. Integer[] partsArray = newArrayList(parts.iterator()).toArray(new Integer[0]); assertEquals(expected, joiner.join(partsArray)); StringBuilder sb2 = new StringBuilder().append('x');Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
Let's use the tools provided by **FastAPI** to handle security. ## How it looks { #how-it-looks } Let's first just use the code and see how it works, and then we'll come back to understand what's happening. ## Create `main.py` { #create-main-py } Copy the example in a file `main.py`: {* ../../docs_src/security/tutorial001_an_py39.py *} ## Run it { #run-it }Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 8.4K bytes - Viewed (0) -
src/test/java/jcifs/SmbTreeTest.java
} verify(autoCloseTree).close(); } /** * Test for unwrap with nested wrapping. * Verifies that unwrap works correctly with multiple levels of wrapping. */ @Test void testUnwrap_nestedWrapping() { // Create a chain of wrapped trees CustomSmbTree innerTree = mock(CustomSmbTree.class);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.2K bytes - Viewed (0) -
okhttp-tls/README.md
.heldCertificate(localhostCertificate) .build(); MockWebServer server = new MockWebServer(); server.useHttps(serverCertificates.sslSocketFactory(), false); ``` `HandshakeCertificates` also works for clients where its job is to define which root certificates to trust. In this simplified example we trust the server's self-signed certificate: ```java
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Thu Oct 30 21:39:59 UTC 2025 - 9.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
byte[] got = out.toByteArray(); for (int i = 0; i < expected.length; i++) { assertEquals(expected[i], got[i]); } } } // Assumes that AbstractNonStreamingHashFunction works properly (must be tested elsewhere!) private static class Control extends AbstractNonStreamingHashFunction { @Override public HashCode hashBytes(byte[] input, int off, int len) {
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 8.6K bytes - Viewed (0) -
compat/maven-compat/src/test/java/org/apache/maven/repository/legacy/resolver/DefaultArtifactCollectorTest.java
@BeforeEach void setUp() throws Exception { source = new Source(); projectArtifact = createArtifactSpec("project", "1.0", null); } @Test @Disabled("works, but we don't fail on cycles presently") void testCircularDependencyNotIncludingCurrentProject() throws ArtifactResolutionException, InvalidVersionSpecificationException {Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Sep 17 10:01:14 UTC 2025 - 43K bytes - Viewed (0) -
docs/ru/docs/_llm-test.md
```console // Создать директорию "Code" $ mkdir code // Перейти в эту директорию $ cd code ``` ...и пример кода на Python... ```Python wont_work() # Это не сработает 😱 works(foo="bar") # Это работает 🎉 ``` ...и на этом всё. //// //// tab | Информация Код в блоках кода не должен изменяться, за исключением комментариев.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Thu Dec 11 21:25:03 UTC 2025 - 17.5K bytes - Viewed (0) -
docs/en/docs/advanced/advanced-dependencies.md
{* ../../docs_src/dependencies/tutorial011_an_py39.py hl[22] *} /// tip All this might seem contrived. And it might not be very clear how is it useful yet. These examples are intentionally simple, but show how it all works. In the chapters about security, there are utility functions that are implemented in this same way. If you understood all this, you already know how those utility tools for security work underneath. ///Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Thu Nov 13 07:37:15 UTC 2025 - 9.1K bytes - Viewed (0) -
docs/distributed/README.md
expanded total storage by _(newly_added_servers\*m)_ more drives, taking the total count to _(existing_servers\*m)+(newly_added_servers\*m)_ drives. New object upload requests automatically start using the least used cluster. This expansion strategy works endlessly, so you can perpetually expand your clusters as needed. When you restart, it is immediate and non-disruptive to the applications. Each group of servers in the command-line is called a pool. There are 2 server pools in this example. New objects...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.9K bytes - Viewed (0) -
docs/features/interceptors.md
Response originalResponse = chain.proceed(chain.request()); return originalResponse.newBuilder() .header("Cache-Control", "max-age=60") .build(); } }; ```
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 8.1K bytes - Viewed (0)