Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 599 for somex (0.02 sec)

  1. docs/en/docs/advanced/openapi-webhooks.md

    # OpenAPI Webhooks
    
    There are cases where you want to tell your API **users** that your app could call *their* app (sending a request) with some data, normally to **notify** of some type of **event**.
    
    This means that instead of the normal process of your users sending requests to your API, it's **your API** (or your app) that could **send requests to their system** (to their API, their app).
    
    This is normally called a **webhook**.
    
    ## Webhooks steps
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon Oct 28 10:38:23 UTC 2024
    - 2.8K bytes
    - Viewed (0)
  2. .idea/inspectionProfiles/Gradle.xml

          </searchConfiguration>
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Wed Jun 26 21:49:47 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  3. docs/en/docs/advanced/security/http-basic-auth.md

    #### The time to answer helps the attackers
    
    At that point, by noticing that the server took some microseconds longer to send the "Incorrect username or password" response, the attackers will know that they got _something_ right, some of the initial letters were right.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 16:01:27 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/reflect/ClassPathTest.java

          createFile(left.resolve("some.txt"));
    
          Path right = createDirectory(root.resolve("right"));
          createFile(right.resolve("another.txt"));
    
          createSymbolicLink(left.resolve("sibling"), right);
          createSymbolicLink(right.resolve("sibling"), left);
          assertEquals(
              ImmutableSet.of(
                  new ResourceInfo(FILE, "left/some.txt", loader),
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Jul 24 22:09:38 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/testing-dependencies.md

    # Testing Dependencies with Overrides
    
    ## Overriding dependencies during testing
    
    There are some scenarios where you might want to override a dependency during testing.
    
    You don't want the original dependency to run (nor any of the sub-dependencies it might have).
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  6. docs/en/docs/deployment/concepts.md

    In this case, it would be better to get **one extra server** and run some processes on it so that they all have **enough RAM and CPU time**.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Sep 18 16:09:57 UTC 2024
    - 17.8K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/security/index.md

    # Advanced Security
    
    ## Additional Features
    
    There are some extra features to handle security apart from the ones covered in the [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}.
    
    /// tip
    
    The next sections are **not necessarily "advanced"**.
    
    And it's possible that for your use case, the solution is in one of them.
    
    ///
    
    ## Read the Tutorial first
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 631 bytes
    - Viewed (0)
  8. docs/en/docs/deployment/https.md

    ### Certificate Renewal
    
    At some point in the future, each certificate would **expire** (about 3 months after acquiring it).
    
    And then, there would be another program (in some cases it's another program, in some cases it could be the same TLS Termination Proxy) that would talk to Let's Encrypt, and renew the certificate(s).
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 12K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/first-steps.md

        * A "token" is just a string with some content that we can use later to verify this user.
        * Normally, a token is set to expire after some time.
            * So, the user will have to log in again at some point later.
            * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases).
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  10. architecture/ambient/ztunnel-cni-lifecycle.md

    However, some applications do not utilize Service readiness (connecting directly to the pod, etc).
    Additionally, eventually consistency means we will often get some final requests trickle in before all clients are aware the Pod is shutting down.
    
    Finally, we SHOULD tell our (HBONE) peers we are shutting down.
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 9.4K bytes
    - Viewed (0)
Back to top