- Sort Score
- Result 10 results
- Languages All
Results 891 - 900 of 1,562 for example (0.06 sec)
-
docs/de/docs/advanced/behind-a-proxy.md
// Hier mehr Einstellungen "servers": [ { "url": "/api/v1" }, { "url": "https://stag.example.com", "description": "Staging environment" }, { "url": "https://prod.example.com", "description": "Production environment" } ], "paths": { // Hier mehr Einstellungen } }
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 13.1K bytes - Viewed (0) -
docs/zh/docs/advanced/behind-a-proxy.md
// More stuff here "servers": [ { "url": "/api/v1" }, { "url": "https://stag.example.com", "description": "Staging environment" }, { "url": "https://prod.example.com", "description": "Production environment" } ], "paths": { // More stuff here } } ```
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 10.4K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/UnsignedInts.java
max = next; } } return flip(max); } /** * Returns a string containing the supplied unsigned {@code int} values separated by {@code * separator}. For example, {@code join("-", 1, 2, 3)} returns the string {@code "1-2-3"}. * * @param separator the text that should appear between consecutive values in the resulting string * (but not at the start or end)
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 21:17:54 UTC 2024 - 13.7K bytes - Viewed (0) -
guava/src/com/google/common/primitives/UnsignedInts.java
max = next; } } return flip(max); } /** * Returns a string containing the supplied unsigned {@code int} values separated by {@code * separator}. For example, {@code join("-", 1, 2, 3)} returns the string {@code "1-2-3"}. * * @param separator the text that should appear between consecutive values in the resulting string * (but not at the start or end)
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 21:17:54 UTC 2024 - 13.7K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableCollection.java
* access, and lastly speed of creation. * <li>The {@code copyOf} methods will sometimes recognize that the actual copy operation is * unnecessary; for example, {@code copyOf(copyOf(anArrayList))} should copy the data only * once. This reduces the expense of habitually making defensive copies at API boundaries.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Aug 12 16:59:15 UTC 2024 - 18.8K bytes - Viewed (0) -
docs/features/connections.md
There may be many routes for a single address. For example, a webserver that is hosted in multiple datacenters may yield multiple IP addresses in its DNS response. In limited situations OkHttp will retry a route if connecting fails:
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Feb 21 03:33:59 UTC 2022 - 5.4K bytes - Viewed (0) -
compat/maven-settings-builder/src/test/java/org/apache/maven/settings/validation/DefaultSettingsValidatorTest.java
void testValidateUniqueProxyId() throws Exception { Settings settings = new Settings(); Proxy proxy = new Proxy(); String id = "foo"; proxy.setId(id); proxy.setHost("www.example.com"); settings.addProxy(proxy); settings.addProxy(proxy); SimpleProblemCollector problems = new SimpleProblemCollector(); validator.validate(settings, problems);
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 8.6K bytes - Viewed (0) -
build-logic/documentation/src/main/groovy/gradlebuild/docs/FindBrokenInternalLinks.java
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Wed Aug 21 08:08:05 UTC 2024 - 9.4K bytes - Viewed (0) -
guava/src/com/google/common/base/Utf8.java
/** * Returns {@code true} if {@code bytes} is a <i>well-formed</i> UTF-8 byte sequence according to * Unicode 6.0. Note that this is a stronger criterion than simply whether the bytes can be * decoded. For example, some versions of the JDK decoder will accept "non-shortest form" byte * sequences, but encoding never reproduces these. Such byte sequences are <i>not</i> considered * well-formed. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <tt>WNET\alice</tt> tries to open a file * with desired access bits <tt>0x00000003</tt> (<tt>FILE_READ_DATA | * FILE_WRITE_DATA</tt>) and the target file has the following security * descriptor ACEs: * * <pre>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0)