- Sort Score
- Result 10 results
- Languages All
Results 251 - 260 of 4,568 for That (0.02 sec)
-
guava/src/com/google/common/primitives/Booleans.java
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 19:07:49 UTC 2024 - 20.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
It is not encrypted, so, anyone could recover the information from the contents. But it's signed. So, when you receive a token that you emitted, you can verify that you actually emitted it. That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/InterruptibleTaskTest.java
* protect ourselves from that we want to make sure that tasks don't spin too much waiting for the * interrupting thread to complete the protocol. */ /* * This test hangs (or maybe is just *very* slow) under Android. * * TODO(b/218700094): Ideally, get this to pass under Android. Failing that, convince ourselves
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 18 22:10:29 UTC 2024 - 6.6K bytes - Viewed (0) -
docs/en/docs/tutorial/path-operation-configuration.md
# Path Operation Configuration There are several parameters that you can pass to your *path operation decorator* to configure it. /// warning Notice that these parameters are passed directly to the *path operation decorator*, not to your *path operation function*. /// ## Response Status Code You can define the (HTTP) `status_code` to be used in the response of your *path operation*. You can pass directly the `int` code, like `404`.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 5.4K bytes - Viewed (0) -
licenses/github.com/hashicorp/errwrap/LICENSE
references to the name of the license steward (except to note that such modified license differs from this License). 10.4. Distributing Source Code Form that is Incompatible With Secondary Licenses If You choose to distribute Source Code Form that is Incompatible With Secondary Licenses under the terms of this version of the License, the
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Sat Oct 26 02:47:39 UTC 2019 - 15.6K bytes - Viewed (0) -
docs/en/docs/tutorial/body-fields.md
`Body` also returns objects of a subclass of `FieldInfo` directly. And there are others you will see later that are subclasses of the `Body` class. Remember that when you import `Query`, `Path`, and others from `fastapi`, those are actually functions that return special classes. /// /// tip
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 17:01:18 UTC 2024 - 2.2K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/entity/SitemapFile.java
* an Atom file, RSS file or a simple text file. */ private String loc; /** * Identifies the time that the corresponding Sitemap file was modified. It * does not correspond to the time that any of the pages listed in that * Sitemap were changed. The value for the lastmod tag should be in W3C * Datetime format. *
Registered: Sun Nov 10 03:50:12 UTC 2024 - Last Modified: Thu Feb 22 01:36:27 UTC 2024 - 2.7K bytes - Viewed (0) -
architecture/ambient/ztunnel.md
When fetching certificates, ztunnel will authenticate to the CA with its own identity, but request the identity of another workload. Critically, the CA must enforce that the ztunnel has permission to request that identity. Requests for identities not running on the node are rejected. This is critical to ensure that a compromised node does not compromise the entire mesh.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Jul 17 23:10:17 UTC 2024 - 16.8K bytes - Viewed (0) -
common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
// a map of client CIDR to server address that is serving this group. // This is to help clients reach servers in the most network-efficient way possible. // Clients can use the appropriate server address as per the CIDR that they match. // In case of multiple matches, clients should use the longest matching CIDR. // The server returns only those CIDRs that it thinks that the client can match.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 53.3K bytes - Viewed (0) -
VULNERABILITY_REPORT.md
Therefore, it lists pre-conditions and actions that should be performed to resolve and fix a reported vulnerability. ## Vulnerability Management Process The vulnerability management process requires that the vulnerability report contains the following information: - The project / component that contains the reported vulnerability. - A description of the vulnerability. In particular, the type of the
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 1.5K bytes - Viewed (0)