- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 125 for tweens (0.04 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/es/docs/tutorial/security/simple-oauth2.md
/// tip | Consejo En el próximo capítulo, verás una implementación segura real, con hashing de passwords y tokens <abbr title="JSON Web Tokens">JWT</abbr>. Pero por ahora, enfoquémonos en los detalles específicos que necesitamos. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip | Consejo
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 10.2K bytes - Click Count (0) -
docs/es/docs/tutorial/cors.md
* `https://localhost` * `http://localhost:8080` Aunque todos están en `localhost`, usan protocolos o puertos diferentes, por lo tanto, son "orígenes" diferentes. ## Pasos { #steps } Entonces, digamos que tienes un frontend corriendo en tu navegador en `http://localhost:8080`, y su JavaScript está tratando de comunicarse con un backend corriendo en `http://localhost` (porque no especificamos un puerto, el navegador asumirá el puerto por defecto `80`).
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.6K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/suggest/index/contents/DefaultContentsParser.java
if (langs == null || langs.length == 0) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, "", null); return tokens == null || tokens.size() == 0; } for (final String lang : langs) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, field, lang); if (tokens != null && tokens.size() > 0) { return false; } }
Created: Fri Apr 17 09:08:13 GMT 2026 - Last Modified: Sat Mar 14 02:35:38 GMT 2026 - 15.2K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
# OAuth2 with Password (and hashing), Bearer with JWT tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Now that we have all the security flow, let's make the application actually secure, using <abbr title="JSON Web Tokens">JWT</abbr> tokens and secure password hashing. This code is something you can actually use in your application, save the password hashes in your database, etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
/// tip In the next chapter, you will see a real secure implementation, with password hashing and <abbr title="JSON Web Tokens">JWT</abbr> tokens. But for now, let's focus on the specific details we need. /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *} /// tip By the spec, you should return a JSON with an `access_token` and a `token_type`, the same as in this example.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
src/main/webapp/js/marked.min.js
e)&&"tokens"in u.tokens[0]&&u.tokens[0].tokens?(u.tokens[0].raw=c.raw+u.tokens[0].raw,u.tokens[0].text=c.raw+u.tokens[0].text,u.tokens[0].tokens.unshift(c)):u.tokens.unshift({type:"paragraph",raw:c.raw,text:c.raw,tokens:[c]}):u.tokens.unshift(c)}}if(!i.loose){let p=u.tokens.filter(d=>d.type==="space"),c=p.length>0&&p.some(d=>this.rules.other.anyLine.test(d.raw));i.loose=c}}if(i.loose)for(let u of i.items){u.loose=!0;for(let p of u.tokens)p.type==="text"&&(p.type="paragraph")}return i}}html(e){let...
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 06:21:57 GMT 2026 - 41.5K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
# OAuth2 com Senha (e hashing), Bearer com tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras. Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc. Vamos começar de onde paramos no capítulo anterior e incrementá-lo.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 11.6K bytes - Click Count (0) -
docs/zh-hant/docs/tutorial/security/simple-oauth2.md
## 回傳 token { #return-the-token } `token` 端點的回應必須是 JSON 物件。 它應該有一個 `token_type`。在本例中,我們使用「Bearer」tokens,token 類型應該是「`bearer`」。 而且它還應該有一個 `access_token`,其值為包含我們存取權杖的字串。 在這個簡單示例中,我們會不安全地直接回傳相同的 `username` 當作 token。 /// tip 下一章你會看到真正安全的實作,包含密碼雜湊與 <abbr title="JSON Web Tokens - JSON 網頁權杖">JWT</abbr> tokens。 但現在先把注意力放在我們需要的這些細節上。 /// {* ../../docs_src/security/tutorial003_an_py310.py hl[87] *}Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 9.1K bytes - Click Count (0)