Celery v5.0.1 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en mapstar, chunksize, callback, error_callback, ) def _map_async(self, func, iterable, mapper, chunksize=None, callback=None, error_callback=None): ''' Helper error_callback=error_callback) self._taskqueue.put((((TASK, (result._job, i, mapper, (x,), {})) for i, x in enumerate(task_batches)), None))0 码力 | 2313 页 | 2.13 MB | 1 年前3
Celery 3.0 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en mapstar, chunksize, callback, error_callback, ) def _map_async(self, func, iterable, mapper, chunksize=None, callback=None, error_callback=None): ''' Helper error_callback=error_callback) self._taskqueue.put((((TASK, (result._job, i, mapper, (x,), {})) for i, x in enumerate(task_batches)), None))0 码力 | 2110 页 | 2.23 MB | 1 年前3
Celery v4.0.0 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en :class:`.InstrumentedAttribute` :class:`.MapperProperty` :attr:`.Mapper.all_orm_descriptors` :attr:`.Mapper.attrs` """ is_attribute = True def __init__(self, class_, key, impl=None inspection instance representing the parent. This will be either an instance of :class:`.Mapper` or :class:`.AliasedInsp`, depending upon the nature of the parent entity which this0 码力 | 2106 页 | 2.23 MB | 1 年前3
Celery v5.0.2 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en mapstar, chunksize, callback, error_callback, ) def _map_async(self, func, iterable, mapper, chunksize=None, callback=None, error_callback=None): ''' Helper error_callback=error_callback) self._taskqueue.put((((TASK, (result._job, i, mapper, (x,), {})) for i, x in enumerate(task_batches)), None))0 码力 | 2313 页 | 2.14 MB | 1 年前3
Celery v5.0.0 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en mapstar, chunksize, callback, error_callback, ) def _map_async(self, func, iterable, mapper, chunksize=None, callback=None, error_callback=None): ''' Helper error_callback=error_callback) self._taskqueue.put((((TASK, (result._job, i, mapper, (x,), {})) for i, x in enumerate(task_batches)), None))0 码力 | 2309 页 | 2.13 MB | 1 年前3
Celery v5.0.5 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [https://en.wikipedia.org/wiki/Chroot], jail [https://en mapstar, chunksize, callback, error_callback, ) def _map_async(self, func, iterable, mapper, chunksize=None, callback=None, error_callback=None): ''' Helper error_callback=error_callback) self._taskqueue.put((((TASK, (result._job, i, mapper, (x,), {})) for i, x in enumerate(task_batches)), None))0 码力 | 2315 页 | 2.14 MB | 1 年前3
Celery 2.5 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot, jail, sandboxing, virtual machines or other mechanisms0 码力 | 400 页 | 1.40 MB | 1 年前3
Celery 2.5 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [http://en.wikipedia.org/wiki/Chroot], jail [http://en0 码力 | 647 页 | 1011.88 KB | 1 年前3
Celery 3.1 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot, jail, sandboxing, virtual machines or other mechanisms0 码力 | 607 页 | 2.27 MB | 1 年前3
Celery 3.1 Documentationcan be done by launching every task in a subprocess (fork() + execve()). Limiting file-system and device access can be accomplished by using chroot [http://en.wikipedia.org/wiki/Chroot], jail [http://en0 码力 | 887 页 | 1.22 MB | 1 年前3
共 39 条
- 1
- 2
- 3
- 4













