- Sort Score
- Result 10 results
- Languages All
Results 1081 - 1090 of 1,548 for exemple (0.08 sec)
-
docs/pt/docs/tutorial/index.md
Então você poderá voltar e ver exatamente o que precisar. ## Rode o código Todos os blocos de código podem ser copiados e utilizados diretamente (eles são, na verdade, arquivos Python testados). Para rodar qualquer um dos exemplos, copie o codigo para um arquivo `main.py`, e inicie o `uvivorn` com: <div class="termy"> ```console $ uvicorn main:app --reload
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 2.7K bytes - Viewed (0) -
guava/src/com/google/common/base/Utf8.java
/** * Returns {@code true} if {@code bytes} is a <i>well-formed</i> UTF-8 byte sequence according to * Unicode 6.0. Note that this is a stronger criterion than simply whether the bytes can be * decoded. For example, some versions of the JDK decoder will accept "non-shortest form" byte * sequences, but encoding never reproduces these. Such byte sequences are <i>not</i> considered * well-formed. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <tt>WNET\alice</tt> tries to open a file * with desired access bits <tt>0x00000003</tt> (<tt>FILE_READ_DATA | * FILE_WRITE_DATA</tt>) and the target file has the following security * descriptor ACEs: * * <pre>
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0) -
common-protos/k8s.io/api/networking/v1alpha1/generated.proto
// perNodeHostBits defines the number of host bits to be configured per node. // A subnet mask determines how much of the address is used for network bits // and host bits. For example an IPv4 address of 192.168.0.0/24, splits the // address into 24 bits for the network portion and 8 bits for the host portion. // To allocate 256 IPs, set this field to 8 (a /24 mask for IPv4 or a /120 for IPv6).
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 6K bytes - Viewed (0) -
android/guava/src/com/google/common/base/Optional.java
* <p>Some uses of this class include * * <ul> * <li>As a method return type, as an alternative to returning {@code null} to indicate that no * value was available * <li>To distinguish between "unknown" (for example, not present in a map) and "known to have no * value" (present in the map, with value {@code Optional.absent()}) * <li>To wrap nullable references for storage in a collection that does not support {@code null}
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 14:20:11 UTC 2024 - 15.4K bytes - Viewed (0) -
common-protos/k8s.io/api/storage/v1beta1/generated.proto
// As Kubernetes 1.15 doesn't support this field, drivers can only support one mode when // deployed on such a cluster and the deployment determines which mode that is, for example // via a command line parameter of the driver. // // This field is immutable. // // +optional optional bool podInfoOnMount = 2;
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 24.9K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/http/RetryAndFollowUpInterceptor.kt
if (e.cause is CertificateException) { return false } } if (e is SSLPeerUnverifiedException) { // e.g. a certificate pinning error. return false } // An example of one we might want to retry with a different route is a problem connecting to a // proxy and would manifest as a standard IOException. Unless it is one we know we should not // retry, we return true and try a new route.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Apr 15 13:24:48 UTC 2024 - 12.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ForwardingMultiset.java
* href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>. * * <p><b>Warning:</b> The methods of {@code ForwardingMultiset} forward <b>indiscriminately</b> to * the methods of the delegate. For example, overriding {@link #add(Object, int)} alone <b>will * not</b> change the behavior of {@link #add(Object)}, which can lead to unexpected behavior. In
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri May 12 15:26:39 UTC 2023 - 10.4K bytes - Viewed (0) -
docs/em/docs/tutorial/security/simple-oauth2.md
<img src="/img/tutorial/security/image05.png"> ### 🤚 👆 👍 👩💻 💽 🔜 ⚙️ 🛠️ `GET` ⏮️ ➡ `/users/me`. 👆 🔜 🤚 👆 👩💻 📊, 💖: ```JSON { "username": "johndoe", "email": "johndoe@example.com", "full_name": "John Doe", "disabled": false, "hashed_password": "fakehashedsecret" } ``` <img src="/img/tutorial/security/image06.png">
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 8.8K bytes - Viewed (0) -
docs/de/docs/advanced/openapi-callbacks.md
Und er wird wahrscheinlich von Anwendung zu Anwendung sehr unterschiedlich sein. Es könnten nur eine oder zwei Codezeilen sein, wie zum Beispiel: ```Python callback_url = "https://example.com/api/v1/invoices/events/" httpx.post(callback_url, json={"description": "Invoice paid", "paid": True}) ```
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 8.8K bytes - Viewed (0)