- Sort Score
- Result 10 results
- Languages All
Results 2091 - 2100 of 2,442 for there (0.07 sec)
-
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvn/MavenOptions.java
import org.apache.maven.api.cli.Options; /** * Defines the options specific to Maven operations. * This interface extends the general {@link Options} interface, adding Maven-specific configuration options. * * <p>These options represent the various flags and settings available through the Maven CLI, * as well as those that can be specified in the {@code maven.config} file. They provide fine-grained
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Thu Oct 03 16:03:55 UTC 2024 - 8.3K bytes - Viewed (0) -
fastapi/encoders.py
def decimal_encoder(dec_value: Decimal) -> Union[int, float]: """ Encodes a Decimal as int of there's no exponent, otherwise float This is useful when we use ConstrainedDecimal to represent Numeric(x,0) where a integer (but not int typed) is used. Encoding this as a float results in failed round-tripping between encode and parse. Our Id type is a prime example of this. >>> decimal_encoder(Decimal("1.0")) 1.0
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu Apr 18 21:56:59 UTC 2024 - 10.8K bytes - Viewed (0) -
cmd/erasure-coding.go
lastBlockSize := totalLength % e.blockSize lastShardSize := ceilFrac(lastBlockSize, int64(e.dataBlocks)) return numShards*e.ShardSize() + lastShardSize } // ShardFileOffset - returns the effective offset where erasure reading begins. func (e *Erasure) ShardFileOffset(startOffset, length, totalLength int64) int64 { shardSize := e.ShardSize() shardFileSize := e.ShardFileSize(totalLength)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jan 31 02:11:45 UTC 2024 - 8.6K bytes - Viewed (0) -
impl/maven-core/src/main/java/org/apache/maven/exception/DefaultExceptionHandler.java
import org.apache.maven.plugin.PluginExecutionException; import org.apache.maven.project.ProjectBuildingException; import org.apache.maven.project.ProjectBuildingResult; /* - test projects for each of these - how to categorize the problems so that the id of the problem can be match to a page with descriptive help and the test project - nice little sample projects that could be run in the core as well as integration tests
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 10.9K bytes - Viewed (0) -
compat/maven-compat/src/test/java/org/apache/maven/repository/MirrorProcessorTest.java
assertTrue(DefaultMirrorSelector.isExternalRepo(getRepo("foo", "http://192.168.101.1"))); assertTrue(DefaultMirrorSelector.isExternalRepo(getRepo("foo", "http://"))); // these are local assertFalse(DefaultMirrorSelector.isExternalRepo(getRepo("foo", "http://localhost:8080"))); assertFalse(DefaultMirrorSelector.isExternalRepo(getRepo("foo", "http://127.0.0.1:9090")));
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 10.7K bytes - Viewed (0) -
docs/features/interceptors.md
return response; } } ``` A call to `chain.proceed(request)` is a critical part of each interceptor’s implementation. This simple-looking method is where all the HTTP work happens, producing a response to satisfy the request. If `chain.proceed(request)` is being called more than once previous response bodies must be closed.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 8.1K bytes - Viewed (0) -
android/guava-testlib/src/com/google/common/collect/testing/AbstractContainerTester.java
this.elements = elements; this.duplicate = duplicate; } } /** * @return an array of the proper size with a duplicate element. The size must be at least three. */ protected ArrayWithDuplicate<E> createArrayWithDuplicateElement() { E[] elements = createSamplesArray(); E duplicate = elements[(elements.length / 2) - 1];
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 8.8K bytes - Viewed (0) -
guava-tests/test/com/google/common/graph/AbstractStandardUndirectedGraphTest.java
} /** * Tests that the method {@code putEdge} will silently add the missing nodes to the graph, then * add the edge connecting them. We are not using the proxy methods here as we want to test {@code * putEdge} when the end-points are not elements of the graph. */ @Test public void putEdge_nodesNotInGraph() { assume().that(graphIsMutable()).isTrue();
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 02 18:21:29 UTC 2024 - 12.7K bytes - Viewed (0) -
docs/debugging/README.md
mc: Encrypted file data successfully downloaded as inspect.ad2b43d8.enc mc: Decryption key: ad2b43d847fdb14e54c5836200177f7158b3f745433525f5d23c0e0208e50c9948540b54 mc: The decryption key will ONLY be shown here. It cannot be recovered. mc: The encrypted file can safely be shared without the decryption key. mc: Even with the decryption key, data stored with encryption cannot be accessed. ```
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Feb 25 01:17:53 UTC 2022 - 8.7K bytes - Viewed (0) -
internal/event/target/kafka.go
config.Net.TLS.Config = tlsConfig config.Net.TLS.Config.InsecureSkipVerify = args.TLS.SkipVerify config.Net.TLS.Config.ClientAuth = args.TLS.ClientAuth config.Net.TLS.Config.RootCAs = args.TLS.RootCAs // These settings are needed to ensure that kafka client doesn't hang on brokers // refer https://github.com/IBM/sarama/issues/765#issuecomment-254333355 config.Producer.Retry.Max = 2 config.Producer.Retry.Backoff = (1 * time.Second)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 13.6K bytes - Viewed (0)