Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 1,837 for some (0.02 sec)

  1. docs/en/docs/advanced/openapi-webhooks.md

    # OpenAPI Webhooks { #openapi-webhooks }
    
    There are cases where you want to tell your API **users** that your app could call *their* app (sending a request) with some data, normally to **notify** of some type of **event**.
    
    This means that instead of the normal process of your users sending requests to your API, it's **your API** (or your app) that could **send requests to their system** (to their API, their app).
    
    This is normally called a **webhook**.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.9K bytes
    - Viewed (0)
  2. docs/en/docs/advanced/security/http-basic-auth.md

    #### The time to answer helps the attackers { #the-time-to-answer-helps-the-attackers }
    
    At that point, by noticing that the server took some microseconds longer to send the "Incorrect username or password" response, the attackers will know that they got _something_ right, some of the initial letters were right.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  3. docs/en/docs/async.md

    Asynchronous code just means that the language 💬 has a way to tell the computer / program 🤖 that at some point in the code, it 🤖 will have to wait for *something else* to finish somewhere else. Let's say that *something else* is called "slow-file" 📝.
    
    So, during that time, the computer can go and do some other work, while "slow-file" 📝 finishes.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 24K bytes
    - Viewed (0)
  4. .idea/inspectionProfiles/Gradle.xml

          </searchConfiguration>
    Registered: Wed Sep 10 11:36:15 UTC 2025
    - Last Modified: Wed Jun 26 21:49:47 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/header-param-models.md

    </div>
    
    ## Forbid Extra Headers { #forbid-extra-headers }
    
    In some special use cases (probably not very common), you might want to **restrict** the headers that you want to receive.
    
    You can use Pydantic's model configuration to `forbid` any `extra` fields:
    
    {* ../../docs_src/header_param_models/tutorial002_an_py310.py hl[10] *}
    
    If a client tries to send some **extra headers**, they will receive an **error** response.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.6K bytes
    - Viewed (0)
  6. docs/en/docs/deployment/concepts.md

    * Each application that you have running on your computer has some process behind it, each running program, each window, etc. And there are normally many processes running **at the same time** while a computer is on.
    * There can be **multiple processes** of the **same program** running at the same time.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/io/ByteArrayDataInput.java

      @CanIgnoreReturnValue // to skip some bytes
      @Override
      short readShort();
    
      @CanIgnoreReturnValue // to skip some bytes
      @Override
      int readUnsignedShort();
    
      @CanIgnoreReturnValue // to skip some bytes
      @Override
      char readChar();
    
      @CanIgnoreReturnValue // to skip some bytes
      @Override
      int readInt();
    
      @CanIgnoreReturnValue // to skip some bytes
      @Override
      long readLong();
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Fri Dec 27 20:25:25 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/first-steps.md

        * A "token" is just a string with some content that we can use later to verify this user.
        * Normally, a token is set to expire after some time.
            * So, the user will have to log in again at some point later.
            * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases).
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  9. docs/en/docs/advanced/security/index.md

    The next sections assume you already read the main [Tutorial - User Guide: Security](../../tutorial/security/index.md){.internal-link target=_blank}.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 708 bytes
    - Viewed (0)
  10. docs/en/docs/advanced/testing-dependencies.md

    ## Overriding dependencies during testing { #overriding-dependencies-during-testing }
    
    There are some scenarios where you might want to override a dependency during testing.
    
    You don't want the original dependency to run (nor any of the sub-dependencies it might have).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.4K bytes
    - Viewed (0)
Back to top