- Sort Score
- Result 10 results
- Languages All
Results 221 - 230 of 494 for fetches (0.06 sec)
-
cmd/metacache-stream.go
return false } // We have checked if prefix matches, so we can do direct compare. return b.First > prefix } // endedPrefix returns true if the given prefix ends within the block. func (b metacacheBlock) endedPrefix(prefix string) bool { if prefix == "" || strings.HasPrefix(b.Last, prefix) { return false } // We have checked if prefix matches, so we can do direct compare. return b.Last > prefix
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed May 07 15:37:12 UTC 2025 - 19.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/taglib/FessFunctions.java
* * @param input the input object to process * @param regex the regular expression pattern to match * @param replacement the replacement string * @return string with all matches replaced, or empty string if input is null */ public static String replace(final Object input, final String regex, final String replacement) { if (input == null) { return StringUtil.EMPTY;Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 25.3K bytes - Viewed (1) -
src/test/java/org/codelibs/fess/job/AggregateLogJobTest.java
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/de/docs/tutorial/body-nested-models.md
Aber Pydantic hat automatische Datenkonvertierung. Das bedeutet, dass Ihre API-Clients nur Strings senden können, aber solange diese Strings nur Zahlen enthalten, wird Pydantic sie konvertieren und validieren. Und das `dict` welches Sie als `weights` erhalten, wird `int`-Schlüssel und `float`-Werte haben. /// ## Zusammenfassung
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 7.8K bytes - Viewed (0) -
clause/expression.go
builder.WriteQuoted(lte.Column) builder.WriteString(" <= ") builder.AddVar(builder, lte.Value) } func (lte Lte) NegationBuild(builder Builder) { Gt(lte).Build(builder) } // Like whether string matches regular expression type Like Eq func (like Like) Build(builder Builder) { builder.WriteQuoted(like.Column) builder.WriteString(" LIKE ") builder.AddVar(builder, like.Value) }
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Tue Oct 10 06:45:48 UTC 2023 - 8.3K bytes - Viewed (0) -
docs/hotfixes.md
# Introduction This document outlines how to make hotfix binaries and containers for MinIO?. The main focus in this article is about how to backport patches to a specific branch and finally building binaries/containers. ## Pre-pre requisite - A working knowledge of MinIO codebase and its various components. - A working knowledge of AWS S3 API behaviors and corner cases. ## Pre-requisite for backporting any fixes
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 14 21:36:02 UTC 2024 - 5K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/helper/RobotsTxtHelper.java
* @return the extracted value, or null if no match */ protected String getValue(final Pattern pattern, final String line) { final Matcher m = pattern.matcher(line); if (m.matches() && m.groupCount() > 0) { return m.group(1); } return null; } /** * Strips comments from a line (everything after '#' character).Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Sun Jul 06 02:13:03 UTC 2025 - 7.7K bytes - Viewed (0) -
ci/official/containers/ml_build/setup.sources.sh
# Deadsnakes: https://launchpad.net/~deadsnakes/+archive/ubuntu/ppa apt-key adv --keyserver keyserver.ubuntu.com --recv-keys F23C5A6CF475977595C89F51BA6932366A755776 # LLVM/Clang: https://apt.llvm.org/ apt-key adv --fetch-keys https://apt.llvm.org/llvm-snapshot.gpg.key # Set up custom sources cat >/etc/apt/sources.list.d/custom.list <<SOURCES # More Python versions: Deadsnakes deb http://ppa.launchpad.net/deadsnakes/ppa/ubuntu jammy main
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Oct 03 21:13:05 UTC 2024 - 1.6K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access * mask of the ACE, the whole access check fails. If the ACE is an "allow"
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
docs/de/docs/deployment/manually.md
/// ## Hypercorn mit Trio
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sat Nov 09 16:39:20 UTC 2024 - 5.3K bytes - Viewed (0)