- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 338 for flow (0.03 sec)
-
architecture/security/docs/sds-flow.svg
sds-flow.svg...
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Aug 25 00:43:58 UTC 2023 - 54.5K bytes - Viewed (0) -
fastapi/security/oauth2.py
""" ), ] = True, ): if not scopes: scopes = {} flows = OAuthFlowsModel( password=cast(Any, {"tokenUrl": tokenUrl, "scopes": scopes}) ) super().__init__( flows=flows, scheme_name=scheme_name, description=description, auto_error=auto_error, )
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Wed Oct 23 18:30:18 UTC 2024 - 21.1K bytes - Viewed (0) -
common-protos/k8s.io/api/flowcontrol/v1beta3/generated.proto
// FlowDistinguisherMethod specifies the method of a flow distinguisher. message FlowDistinguisherMethod { // `type` is the type of flow distinguisher method // The supported types are "ByUser" and "ByNamespace". // Required. optional string type = 1; } // FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 19.5K bytes - Viewed (0) -
common-protos/k8s.io/api/flowcontrol/v1beta1/generated.proto
// FlowDistinguisherMethod specifies the method of a flow distinguisher. message FlowDistinguisherMethod { // `type` is the type of flow distinguisher method // The supported types are "ByUser" and "ByNamespace". // Required. optional string type = 1; } // FlowSchema defines the schema of a group of flows. Note that a flow is made up of a set of inbound API requests with
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 19.4K bytes - Viewed (0) -
architecture/security/istio-agent.md
![SDS decision flow](docs/sds-flow.svg) ### Default CA Flow through istio-agent ![CA Flow](docs/ca.svg) A single SDS request from Envoy goes through a few different layers in istio-agent.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 18 23:11:18 UTC 2024 - 7.2K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/http2/FlowControlListener.kt
interface FlowControlListener { /** * Notification that the receiving stream flow control window has changed. * [WindowCounter] generally carries the client view of total and acked bytes. */ fun receivingStreamWindowChanged( streamId: Int, windowCounter: WindowCounter, bufferSize: Long, ) /** * Notification that the receiving connection flow control window has changed.
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 1.5K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/internal/http2/Http2Stream.kt
this.sink.finished = true condition.signalAll() // Because doReadTimeout() may have changed. } } // Only DATA frames are subject to flow-control. Transmit the HEADER frame if the connection // flow-control window is fully depleted. if (!flushHeaders) { this.withLock { flushHeaders = (connection.writeBytesTotal >= connection.writeBytesMaximum) } }
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Apr 20 17:03:43 UTC 2024 - 23.2K bytes - Viewed (0) -
.teamcity/test-buckets.json
] }, { "parallelizationMethod":{ "name":"TestDistribution" }, "subprojects":[ "composite-builds", "internal-integ-testing", "jvm-services", "flow-services", "persistent-cache", "publish", "base-services", "process-memory-services", "problems-api", "plugins-java-base", "build-cache" ] }, {
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Oct 08 11:14:16 UTC 2024 - 87.8K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
It can be used by third party applications and systems. And it can also be used by yourself, to debug, check and test the same application. ## The `password` flow Now let's go back a bit and understand what is all that. The `password` "flow" is one of the ways ("flows") defined in OAuth2, to handle security and authentication. OAuth2 was designed so that the backend or API could be independent of the server that authenticates the user.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0)