- Sort Score
- Num 10 results
- Language All
Results 1931 - 1940 of 2,006 for Implements (0.08 seconds)
-
docs/en/docs/tutorial/security/first-steps.md
## **FastAPI**'s `OAuth2PasswordBearer` { #fastapis-oauth2passwordbearer } **FastAPI** provides several tools, at different levels of abstraction, to implement these security features. In this example we are going to use **OAuth2**, with the **Password** flow, using a **Bearer** token. We do that using the `OAuth2PasswordBearer` class. /// infoCreated: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 8.4K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/idn/Punycode.kt
* * This class contains a Kotlin implementation of the pseudocode specified by RFC 3492. It includes * direct translation of the pseudocode presented there. * * Partner this class with [UTS #46] to implement IDNA2008 [RFC 5890] like most browsers do. * * [RFC 3492]: https://datatracker.ietf.org/doc/html/rfc3492 * [RFC 5890]: https://datatracker.ietf.org/doc/html/rfc5890 * [UTS #46]: https://www.unicode.org/reports/tr46/ */
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 27 13:39:56 GMT 2024 - 8.5K bytes - Click Count (0) -
docs/contribute/concurrency.md
Framing rules make it impractical to implement http/2 correctly on a single blocking thread. The flow-control features introduce feedback between reads and writes, requiring writes to acknowledge reads and reads to throttle writes.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 16:35:36 GMT 2022 - 7K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContextTest.java
@Test @DisplayName("Should implement NegotiateContextRequest interface") void testImplementsNegotiateContextRequest() { PreauthIntegrityNegotiateContext context = new PreauthIntegrityNegotiateContext(); assertTrue(context instanceof NegotiateContextRequest); } @Test @DisplayName("Should implement NegotiateContextResponse interface")Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 34K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/nego/NegotiateContextResponseTest.java
} } @Nested @DisplayName("Interface Tests") class InterfaceTest { @Test @DisplayName("Should implement NegotiateContextResponse interface correctly") void testInterfaceImplementation() { // Arrange NegotiateContextResponse preauthContext = new PreauthIntegrityNegotiateContext();Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 19.4K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.32.md
- Implement a queueing hint for PersistentVolumeClaim/Add event in CSILimit plugin. ([#124703](https://github.com/kubernetes/kubernetes/pull/124703), [@utam0k](https://github.com/utam0k)) [SIG Scheduling and Storage]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Dec 16 18:27:41 GMT 2025 - 448.1K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/Service.java
* states it cannot ever leave them. * * <p>Implementors of this interface are strongly encouraged to extend one of the abstract classes * in this package which implement this interface and make the threading and state management * easier. * * @author Jesse Wilson * @author Luke Sandberg * @since 9.0 (in 1.0 as {@code com.google.common.base.Service}) */Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Dec 21 03:10:51 GMT 2024 - 10.8K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
You will get an "Inactive user" error, like: ```JSON { "detail": "Inactive user" } ``` ## Recap { #recap } You now have the tools to implement a complete security system based on `username` and `password` for your API. Using these tools, you can make the security system compatible with any database and with any user or data model.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 9.4K bytes - Click Count (0) -
SECURITY.md
unauthorized access to data or models, but also to prevent malicious users or tenants sending graphs to execute under another tenant’s identity. The isolation mechanisms are the responsibility of the users to design and implement, and therefore security issues deriving from their absence are not considered a vulnerability in TensorFlow. ### Resource allocation A denial of service caused by one model could bring down the entire server, but
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/tree/Smb2TreeDisconnectRequestTest.java
int cmd2 = (int) commandField.get(req2); assertEquals(cmd1, cmd2); assertEquals(SMB2_TREE_DISCONNECT, cmd1); } @Test @DisplayName("Should properly implement wire format protocol") void testWireFormatProtocol() { // Given Configuration mockConfig = mock(Configuration.class); Smb2TreeDisconnectRequest request = new Smb2TreeDisconnectRequest(mockConfig);
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 14.1K bytes - Click Count (0)