- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 55 for PARTY (0.05 sec)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http/HttpMethod.kt
@JvmStatic // Despite being 'internal', this method is called by popular 3rd party SDKs. fun invalidatesCache(method: String): Boolean = ( method == "POST" || method == "PATCH" || method == "PUT" || method == "DELETE" || method == "MOVE" ) @JvmStatic // Despite being 'internal', this method is called by popular 3rd party SDKs. fun requiresRequestBody(method: String): Boolean = (
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 1.6K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/META-INF/NOTICE.vm
BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY ## KIND, either express or implied. See the License for the ## specific language governing permissions and limitations ## under the License. ## This software bundles the following NOTICE files from third party library providers: META-INF/NOTICE in archive lib/guice-5.1.0.jar Google Guice - Core Library Copyright 2006-2022 Google, Inc. This product includes software developed at The Apache Software Foundation (http://www.apache.org/). META-INF/NOTICE in archive...
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Sat Sep 10 19:27:25 UTC 2022 - 5.5K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt
rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to Distribute the Program, it is Recipient's responsibility to acquire that license before distributing the Program.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Tue Jun 04 06:45:16 UTC 2024 - 13.9K bytes - Viewed (0) -
docs/tls/README.md
3. [Generate and use Self-signed Keys and Certificates with MinIO](#generate-use-self-signed-keys-certificates) 4. [Install Certificates from Third-party CAs](#install-certificates-from-third-party-cas) ## 1. Install MinIO Server
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.6K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
on the date Contributor first distributes or otherwise makes the Modifications available to a third party. (d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* For HTTPS, **the server** needs to **have "certificates"** generated by a **third party**. * Those certificates are actually **acquired** from the third party, not "generated". * Certificates have a **lifetime**. * They **expire**. * And then they need to be **renewed**, **acquired again** from the third party. * The encryption of the connection happens at the **TCP level**. * That's one layer **below HTTP**.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
.github/workflows/scorecard.yml
# This workflow uses actions that are not certified by GitHub. They are provided # by a third-party and are governed by separate terms of service, privacy # policy, and support documentation. name: Scorecard supply-chain security on: # For Branch-Protection check. Only the default branch is supported. See # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection branch_protection_rule:
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Sep 03 19:19:31 UTC 2025 - 2.9K bytes - Viewed (0) -
api/maven-api-spi/src/main/java/org/apache/maven/api/spi/package-info.java
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Tue Mar 04 14:17:18 UTC 2025 - 1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
That's what would happen to a third party application that tried to access one of these *path operations* with a token provided by a user, depending on how many permissions the user gave the application. ## About third party integrations { #about-third-party-integrations } In this example we are using the OAuth2 "password" flow.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0)