- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for restrictions (0.06 sec)
-
compat/maven-artifact/src/test/java/org/apache/maven/artifact/versioning/VersionRangeTest.java
List<Restriction> restrictions = range.getRestrictions(); assertEquals(1, restrictions.size(), CHECK_NUM_RESTRICTIONS); Restriction restriction = restrictions.get(0); assertNull(restriction.getLowerBound(), CHECK_LOWER_BOUND); assertFalse(restriction.isLowerBoundInclusive(), CHECK_LOWER_BOUND_INCLUSIVE); assertEquals("1.0", restriction.getUpperBound().toString(), CHECK_UPPER_BOUND);
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Sun Mar 30 23:08:36 UTC 2025 - 44.1K bytes - Viewed (0) -
compat/maven-artifact/src/main/java/org/apache/maven/artifact/versioning/VersionRange.java
*/ public VersionRange restrict(VersionRange restriction) { List<Restriction> r1 = this.restrictions; List<Restriction> r2 = restriction.restrictions; List<Restriction> restrictions; if (r1.isEmpty() || r2.isEmpty()) { restrictions = Collections.emptyList(); } else { restrictions = Collections.unmodifiableList(intersection(r1, r2)); }
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Jul 23 17:27:08 UTC 2025 - 19K bytes - Viewed (0) -
LICENSE
All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 33.7K bytes - Viewed (0) -
LICENSE
it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
OAuth2 has the notion of "scopes". You can use them to add a specific set of permissions to a JWT token. Then you can give this token to a user directly or a third party, to interact with your API with a set of restrictions. You can learn how to use them and how they are integrated into **FastAPI** later in the **Advanced User Guide**. ## Recap { #recap }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/annotation/SecuredTest.java
} // Test annotation on constructor (should not compile, but test for completeness) static class ConstructorClass { // Note: @Secured cannot be applied to constructors due to @Target restrictions public ConstructorClass() { } } public void test_constructorCannotBeAnnotated() throws NoSuchMethodException {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 15.2K bytes - Viewed (0) -
docs/LICENSE
receives an offer from the Licensor to exercise the Licensed Rights under the terms and conditions of this Public License. b. No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, the
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon May 10 16:50:06 UTC 2021 - 18.2K bytes - Viewed (0) -
doc/go_mem.html
is documented in the “Synchronization” section below. Individual packages are responsible for providing similar documentation for their own operations. </p> <h2 id="restrictions">Implementation Restrictions for Programs Containing Data Races</h2> <p> The preceding section gave a formal definition of data-race-free program execution.
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 05 15:41:37 UTC 2025 - 26.6K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
* Handled internally by a cloud provider as part of their services (read below 👇) Another option is that you could use a **cloud service** that does more of the work including setting up HTTPS. It could have some restrictions or charge you more, etc. But in that case, you wouldn't have to set up a TLS Termination Proxy yourself. I'll show you some concrete examples in the next chapters. ---
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0)