- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 280 for complex (0.05 sec)
-
docs/en/docs/tutorial/security/index.md
It is quite an extensive specification and covers several complex use cases. It includes ways to authenticate using a "third party". That's what all the systems with "login with Facebook, Google, X (Twitter), GitHub" use underneath. ### OAuth 1 { #oauth-1 } There was an OAuth 1, which is very different from OAuth2, and more complex, as it included direct specifications on how to encrypt the communication.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 4.4K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosConstantsTest.java
/** * This test primarily exists to ensure the constants interface can be loaded * and to provide a basic check of its values. * Since it's an interface with only static final fields, there is no complex logic to test. */ @Test void testConstants() { // A simple assertion to verify that some of the constants have the expected values.Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 1.1K bytes - Viewed (1) -
docs/en/docs/tutorial/extra-data-types.md
# Extra Data Types { #extra-data-types } Up to now, you have been using common data types, like: * `int` * `float` * `str` * `bool` But you can also use more complex data types. And you will still have the same features as seen up to now: * Great editor support. * Data conversion from incoming requests. * Data conversion for response data. * Data validation. * Automatic annotation and documentation.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.7K bytes - Viewed (0) -
src/test/java/jcifs/http/NtlmHttpURLConnectionTest.java
NtlmHttpURLConnection spiedConnection = spy(ntlmConnection); doNothing().when(spiedConnection).connect(); // Mock the handshake process to do nothing complex mockResponse(HTTP_OK, "OK", null, null); // Act & Assert assertDoesNotThrow(() -> spiedConnection.getResponseCode()); // Use reflection to verify handshake method is called
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 12.6K bytes - Viewed (0) -
src/test/java/jcifs/dcerpc/msrpc/MsrpcSamrOpenAliasTest.java
// The fact that the object is successfully created implies the super constructor was called. } // Additional tests could be added here if MsrpcSamrOpenAlias had more methods or complex logic. // For this specific class, the constructor is the main point of logic.Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 2.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/get-current-user.md
But here's the key point. The security and dependency injection stuff is written once. And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility. But you can have thousands of endpoints (*path operations*) using the same security system.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 4K bytes - Viewed (0) -
docs/en/docs/features.md
* Validate **complex structures**: * Use of hierarchical Pydantic models, Python `typing`’s `List` and `Dict`, etc. * And validators allow complex data schemas to be clearly and easily defined, checked and documented as JSON Schema.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.5K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
## Recap { #recap } With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT. In almost any framework handling the security becomes a rather complex subject quite quickly.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
src/test/java/jcifs/smb1/smb1/SmbFileTest.java
} } @Nested class AttributeAndStateTests { @Test public void testGetTypeForFile() throws Exception { // Mocking underlying connection and info retrieval is complex. // This test focuses on the logic based on the URL structure. SmbFile file = new SmbFile("smb1://server/share/file.txt"); // Without a real connection, getType relies on path parsing.Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 8.5K bytes - Viewed (0)