Search Options

Results per page
Sort
Preferred Languages
Advance

Results 771 - 780 of 910 for dove (0.17 sec)

  1. docs/ko/docs/features.md

        return user_id
    
    
    # Pydantic 모델
    class User(BaseModel):
        id: int
        name: str
        joined: date
    ```
    
    위의 코드는 다음과 같이 사용될 수 있습니다:
    
    ```Python
    my_user: User = User(id=3, name="John Doe", joined="2018-07-19")
    
    second_user_data = {
        "id": 4,
        "name": "Mary",
        "joined": "2018-11-30",
    }
    
    my_second_user: User = User(**second_user_data)
    ```
    
    /// info | "정보"
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  2. guava-tests/test/com/google/common/hash/HashTestUtils.java

       * bit(j) about half the time
       *
       * <p>Funneling is pretty simple to detect. The key idea is to find example keys which
       * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
       * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
       * bit(i). One pair must differ in output bit(j), and one pair must not. This proves that input
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  3. guava/src/com/google/common/reflect/TypeResolver.java

        } else if (type instanceof WildcardType) {
          return resolveWildcardType((WildcardType) type);
        } else {
          // if Class<?>, no resolution needed, we are done.
          return type;
        }
      }
    
      Type[] resolveTypesInPlace(Type[] types) {
        for (int i = 0; i < types.length; i++) {
          types[i] = resolveType(types[i]);
        }
        return types;
      }
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 10 19:45:10 UTC 2022
    - 24.2K bytes
    - Viewed (0)
  4. docs/pt/docs/advanced/security/oauth2-scopes.md

    /// danger | Cuidado
    
    Para manter as coisas simples, aqui nós estamos apenas adicionando os escopos recebidos diretamente ao token.
    
    Porém em sua aplicação, por segurança, você deve garantir que você apenas adiciona os escopos que o usuário possui permissão de fato, ou aqueles que você predefiniu.
    
    ///
    
    //// tab | Python 3.10+
    
    ```Python hl_lines="156"
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 21.7K bytes
    - Viewed (0)
  5. cmd/admin-router.go

    // `adminAPIHandlers`).
    //
    // - sets up call to send AuditLog
    //
    // While this is a middleware function (i.e. it takes a handler function and
    // returns one), due to flags being passed based on required conditions, it is
    // done per-"handler function registration" in the router.
    //
    // The passed in handler function must be a method of `adminAPIHandlers` for the
    // name displayed in logs and trace to be accurate. The name is extracted via
    // reflection.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Sep 21 11:35:40 UTC 2024
    - 26.2K bytes
    - Viewed (0)
  6. cmd/auth-handler.go

    	// JWT token for x-amz-security-token is signed with admin
    	// secret key, temporary credentials become invalid if
    	// server admin credentials change. This is done to ensure
    	// that clients cannot decode the token using the temp
    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 26.1K bytes
    - Viewed (0)
  7. compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/resolver/DefaultLegacyArtifactCollector.java

                            if ((previousRange != null) && (currentRange != null)) {
                                // TODO shouldn't need to double up on this work, only done for simplicity of handling
                                // recommended
                                // version but the restriction is identical
                                VersionRange newRange = previousRange.restrict(currentRange);
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 36.7K bytes
    - Viewed (0)
  8. docs/pt/docs/advanced/settings.md

    Isso significa que qualquer valor obtido de uma variável de ambiente em Python terá o tipo `str`, e qualquer conversão para um tipo diferente ou validação deve ser realizada no código.
    
    ## Pydantic `Settings`
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 17K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.14.md

    * [Breaking change, client-go]: The WaitFor function returns, probably an ErrWaitTimeout, when the done channel is closed, even if the `WaitFunc` doesn't handle the done channel. ([#72364](https://github.com/kubernetes/kubernetes/pull/72364), [@kdada](https://github.com/kdada))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Mon Jun 14 22:06:39 UTC 2021
    - 271.5K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/primitives/Ints.java

        //     fgh[b]c|[a]de -> fgh[a]c|[b]de. Finally we need to swap [c] with [b]:
        //     fgha[c]|[b]de -> fgha[b]|[c]de. Because these two blocks are the same size, we are done.
        // The Dolphin algorithm is attractive because it does the fewest array reads and writes: each
        // array slot is read and written exactly once. However, it can have very poor memory locality:
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 18:05:56 UTC 2024
    - 31K bytes
    - Viewed (0)
Back to top