- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 128 for Things (0.05 sec)
-
tests/gaussdb_test.go
} DB.Create(&thing) thing2 := Thing{ SomeID: "1234", OtherID: "1234", Data: "something else", } result := DB.Clauses(clause.OnConflict{ OnConstraint: "some_id_other_id_unique", UpdateAll: true, }).Create(&thing2) if result.Error != nil { t.Errorf("creating second thing: %v", result.Error) } var things []Thing if err := DB.Find(&things).Error; err != nil {
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Jul 21 02:46:58 UTC 2025 - 6.6K bytes - Viewed (0) -
docs/en/docs/alternatives.md
It had automatic data validation, data serialization and OpenAPI schema generation based on the same type hints in several places.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 23.6K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
* A particular program while it is **running** on the operating system. * This doesn't refer to the file, nor to the code, it refers **specifically** to the thing that is being **executed** and managed by the operating system.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/index.md
## What is "Dependency Injection" { #what-is-dependency-injection } **"Dependency Injection"** means, in programming, that there is a way for your code (in this case, your *path operation functions*) to declare things that it requires to work and use: "dependencies". And then, that system (in this case **FastAPI**) will take care of doing whatever is needed to provide your code with those needed dependencies ("inject" the dependencies).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.6K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
If you want to secure your API, there are several better things you can do, for example: * Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.4K bytes - Viewed (0) -
docs/en/docs/deployment/manually.md
Just keep in mind that when you read "server" in general, it could refer to one of those two things. When referring to the remote machine, it's common to call it **server**, but also **machine**, **VM** (virtual machine), **node**. Those all refer to some type of remote machine, normally running Linux, where you run programs.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 6.9K bytes - Viewed (0) -
docs/en/docs/virtual-environments.md
Activating a virtual environment also changes a couple of other things, but this is one of the most important things it does. ## Checking a Virtual Environment { #checking-a-virtual-environment } When you check if a virtual environment is active, for example with: //// tab | Linux, macOS, Windows Bash
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 22.4K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/MultipartBody.kt
* parameters, and as it turns out Firefox and Chrome actually do rather different things, and * both say in their comments that they're not really sure what the right approach is. We go * with Chrome's behavior (which also experimentally seems to match what IE does), but if you * actually want to have a good chance of things working, please avoid double-quotes, newlines, * percent signs, and the like in your field names.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 10.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/index.md
/// ## OpenID Connect { #openid-connect } OpenID Connect is another specification, based on **OAuth2**. It just extends OAuth2 specifying some things that are relatively ambiguous in OAuth2, to try to make it more interoperable. For example, Google login uses OpenID Connect (which underneath uses OAuth2).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 4.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
The JWT specification says that there's a key `sub`, with the subject of the token. It's optional to use it, but that's where you would put the user's identification, so we are using it here. JWT might be used for other things apart from identifying a user and allowing them to perform operations directly on your API. For example, you could identify a "car" or a "blog post".
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0)