- Sort Score
- Num 10 results
- Language All
Results 801 - 810 of 1,120 for order1 (0.05 seconds)
-
CHANGELOG/CHANGELOG-1.5.md
Please see the [Releases Page](https://github.com/kubernetes/kubernetes/releases) for older releases. Release notes of older releases can be found in: - [CHANGELOG-1.2.md](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.2.md)
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 136.4K bytes - Click Count (0) -
build-logic/cleanup/src/main/kotlin/gradlebuild/cleanup/Cleanup.kt
private fun scriptsCacheDirsUnder(cacheDir: File) = scriptCacheDirNames .map { File(cacheDir, it) } .filter { it.isDirectory } /** * Clean up cache files for older versions that aren't multi-process safe. */ fun FileSystemOperations.removeDodgyCacheFiles(dir: Directory) { if (dir.asFile.isDirectory) { for (cacheDir in dir.asFile.listFiles()) {
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Fri Jun 28 08:29:28 GMT 2024 - 4.4K bytes - Click Count (0) -
build-logic/cleanup/src/main/kotlin/gradlebuild/cleanup/services/CachesCleaner.kt
hasCleaned = true } } private fun cleanupDistributionCaches(workerDir: Directory, gradleVersion: GradleVersion) { // Expire cache snapshots of test Gradle distributions that are older than the tested version // Also expire version-specific cache snapshots when they can't be re-used (for 'snapshot-1' developer builds) val expireDistributionCache = Spec<GradleVersion> { candidateVersion ->Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Fri Jun 28 08:29:28 GMT 2024 - 4.2K bytes - Click Count (1) -
guava/src/com/google/common/collect/ComparisonChain.java
* * <p>This method is declared to accept any 2 {@code Comparable} objects, even if they are not <a * href="https://docs.oracle.com/javase/tutorial/collections/interfaces/order.html">mutually * comparable</a>. If you pass objects that are not mutually comparable, this method may throw an * exception. (The reason for this decision is lost to time, but the reason <i>might</i> be thatCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 11.1K bytes - Click Count (0) -
docs/de/docs/tutorial/path-params.md
Sie können für Typdeklarationen auch `str`, `float`, `bool` und viele andere komplexe Datentypen verwenden. Mehrere davon werden wir in den nächsten Kapiteln erkunden. ## Die Reihenfolge ist wichtig { #order-matters } Wenn Sie *Pfadoperationen* erstellen, haben Sie manchmal einen fixen Pfad. Etwa `/users/me`, um Daten über den aktuellen Benutzer zu erhalten.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 10.5K bytes - Click Count (0) -
docs/en/docs/tutorial/security/first-steps.md
When we create an instance of the `OAuth2PasswordBearer` class we pass in the `tokenUrl` parameter. This parameter contains the URL that the client (the frontend running in the user's browser) will use to send the `username` and `password` in order to get a token. {* ../../docs_src/security/tutorial001_an_py39.py hl[8] *} /// tip
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 8.4K bytes - Click Count (0) -
cmd/api-response.go
// is true), you can use the key name in this field as marker in the subsequent // request to get next set of objects. Server lists objects in alphabetical // order Note: This element is returned only if you have delimiter request parameter // specified. If response does not include the NextMaker and it is truncated, // you can use the value of the last Key in the response as the marker in the
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Oct 24 04:05:19 GMT 2025 - 35K bytes - Click Count (0) -
guava-testlib/src/com/google/common/collect/testing/testers/CollectionIteratorTester.java
for (E element : collection) { // uses iterator() iteratorElements.add(element); } List<E> expected = copyToList(getOrderedElements()); assertEquals("Different ordered iteration", expected, iteratorElements); } @CollectionFeature.Require(ALLOWS_NULL_VALUES) @CollectionSize.Require(absent = ZERO) public void testIterator_nullElement() { initCollectionWithNullElement();
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 6.1K bytes - Click Count (0) -
fess-crawler/src/test/java/org/codelibs/fess/crawler/builder/RequestDataBuilderTest.java
assertEquals("https://api.example.com/users", data.getUrl()); assertEquals(1.2f, data.getWeight(), 0.001f); } public void test_orderIndependence() { // Test that order of method calls doesn't matter RequestData data1 = RequestDataBuilder.newRequestData().url("https://example.com").weight(1.5f).get().build();
Created: Sat Dec 20 11:21:39 GMT 2025 - Last Modified: Mon Nov 24 03:59:47 GMT 2025 - 10.9K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny"
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0)