- Sort Score
- Num 10 results
- Language All
Results 211 - 220 of 446 for GPoint (0.04 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
okhttp-testing-support/src/main/kotlin/okhttp3/OkHttpClientTestRule.kt
EventListener.Factory { call -> ClientRuleEventListener(::addEvent) + eventListenerFactory.create(call) } /** * Returns an OkHttpClient for tests to use as a starting point. * * The returned client installs a default event listener that gathers debug information. This will * be logged if the test fails. *Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Nov 04 19:13:52 GMT 2025 - 10.8K bytes - Click Count (0) -
compat/maven-compat/src/main/java/org/apache/maven/repository/metadata/MetadataGraph.java
public static final int DEFAULT_EDGES = 64; // flags to indicate the granularity of vertices private boolean versionedVertices = false; private boolean scopedVertices = false; /** * the entry point we started building the graph from */ MetadataGraphVertex entry; // graph vertices TreeSet<MetadataGraphVertex> vertices; /** * incident and excident edges per node */Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Jul 23 17:27:08 GMT 2025 - 13K bytes - Click Count (0) -
docs/kms/IAM.md
> since you will not be able to decrypt the IAM/configuration data anymore. For distributed MinIO deployments, specify the *same* `MINIO_KMS_SECRET_KEY` for each MinIO server process. At any point in time you can switch from `MINIO_KMS_SECRET_KEY` to a full KMS deployment. You just need to import the generated key into KES - for example via the KES CLI once you have successfully setup KES: ```sh
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
For the error, we use the exception `HTTPException`: {* ../../docs_src/security/tutorial003_an_py310.py hl[3,79:81] *} ### Check the password { #check-the-password } At this point we have the user data from our database, but we haven't checked the password. Let's put that data in the Pydantic `UserInDB` model first.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
cmd/admin-handlers-idp-config.go
writeSuccessResponseHeadersOnly(w) } func handleCreateUpdateValidation(s config.Config, subSys, cfgTarget string, isUpdate bool) APIErrorCode { if cfgTarget != madmin.Default { // This cannot give an error at this point. subSysTargets, _ := s.GetAvailableTargets(subSys) subSysTargetsSet := set.CreateStringSet(subSysTargets...) if isUpdate && !subSysTargetsSet.Contains(cfgTarget) { return ErrAdminConfigIDPCfgNameDoesNotExist }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 12.7K bytes - Click Count (0) -
docs/en/docs/deployment/server-workers.md
Let's check back those deployment concepts from before: * Security - HTTPS * Running on startup * Restarts * **Replication (the number of processes running)** * Memory * Previous steps before starting Up to this point, with all the tutorials in the docs, you have probably been running a **server program**, for example, using the `fastapi` command, that runs Uvicorn, running a **single process**.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 8.2K bytes - Click Count (0) -
src/bytes/buffer.go
b.lastRead = opInvalid m, ok := b.tryGrowByReslice(1) if !ok { m = b.grow(1) } b.buf[m] = c return nil } // WriteRune appends the UTF-8 encoding of Unicode code point r to the // buffer, returning its length and an error, which is always nil but is // included to match [bufio.Writer]'s WriteRune. The buffer is grown as needed; // if it becomes too large, WriteRune will panic with [ErrTooLarge].
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Fri Nov 14 19:01:17 GMT 2025 - 16.5K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/SortedLists.java
@Override public int resultIndex(int higherIndex) { return higherIndex; } }, /** * Return {@code ~insertionIndex}, where {@code insertionIndex} is defined as the point at which * the key would be inserted into the list: the index of the next higher element in the list, or * {@code list.size()} if there is no such element. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 10.9K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/Murmur3_32HashFunction.java
shift += 24; len += 3; } else { int codePoint = Character.codePointAt(input, i); if (codePoint == c) { // not a valid code point; let the JDK handle invalid Unicode return hashBytes(input.toString().getBytes(charset)); } i++; buffer |= codePointToFourUtf8Bytes(codePoint) << shift;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 11.8K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/ListenerCallQueue.java
* <li>All events for a given listener dispatch on the provided executor. * <li>It is easy for the user to ensure that listeners are never invoked while holding locks. * </ul> * * The last point is subtle. Often the observable object will be managing its own internal state * using a lock, however it is dangerous to dispatch listeners while holding a lock because they
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue May 13 17:27:14 GMT 2025 - 8.1K bytes - Click Count (0)