- Sort Score
- Result 10 results
- Languages All
Results 381 - 390 of 8,064 for USE (0.02 sec)
-
lib/wasm/wasm_exec_node.js
// Copyright 2021 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. "use strict"; if (process.argv.length < 3) { console.error("usage: go_js_wasm_exec [wasm binary] [arguments]"); process.exit(1); } globalThis.require = require; globalThis.fs = require("fs"); globalThis.path = require("path"); globalThis.TextEncoder = require("util").TextEncoder;
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Aug 30 19:15:21 UTC 2024 - 1.2K bytes - Viewed (0) -
samples/guide/src/main/java/okhttp3/recipes/kt/ConfigureTimeouts.kt
/* * Copyright (C) 2014 Square, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS,
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 1.3K bytes - Viewed (0) -
docs/en/docs/advanced/security/index.md
/// tip The next sections are **not necessarily "advanced"**. And it's possible that for your use case, the solution is in one of them. /// ## Read the Tutorial first The next sections assume you already read the main [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 631 bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/cluster_test.go
// Copyright Istio Authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri May 29 20:42:01 UTC 2020 - 605 bytes - Viewed (0) -
test-site/LICENSE
This software is licensed under the Apache 2 license, quoted below. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this project except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an
Registered: Fri Nov 08 09:08:12 UTC 2024 - Last Modified: Mon Apr 20 08:41:37 UTC 2015 - 591 bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
But you cannot convert from the gibberish back to the password. ### Why use password hashing If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous). ## Install `passlib`
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
docs/en/docs/tutorial/body-updates.md
The examples here use `.dict()` for compatibility with Pydantic v1, but you should use `.model_dump()` instead if you can use Pydantic v2. /// That would generate a `dict` with only the data that was set when creating the `item` model, excluding default values. Then you can use this to generate a `dict` with only the data that was set (sent in the request), omitting default values:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 5.6K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/repository/MetadataResolutionRequest.java
} /** * @deprecated instead use {@link #getRemoteRepositories()} */ @Deprecated public List<ArtifactRepository> getRemoteRepostories() { return remoteRepositories; } public List<ArtifactRepository> getRemoteRepositories() { return getRemoteRepostories(); } /** * @deprecated instead use {@link #setRemoteRepositories(List)} */
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 5.3K bytes - Viewed (0) -
android/guava/src/com/google/common/base/NullnessCasts.java
* types (or if the type is a non-variable type, like {@code String}), then code should almost * never use this method, preferring instead to call {@code requireNonNull} so as to benefit from * its runtime check. * * <p>An example use case for this method is in implementing an {@code Iterator<T>} whose {@code
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Aug 17 15:44:29 UTC 2021 - 3.1K bytes - Viewed (0) -
compat/maven-artifact/src/main/java/org/apache/maven/artifact/repository/ArtifactRepository.java
import org.apache.maven.repository.Proxy; /** * Abstraction of an artifact repository. Artifact repositories can be remote, local, or even build reactor or * IDE workspace. * * @deprecated Avoid use of this type, if you need access to local repository use repository system classes instead. */ @Deprecated public interface ArtifactRepository { String pathOf(Artifact artifact);
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 4.2K bytes - Viewed (1)