Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 31 - 40 of over 10,000 for usen (0.04 seconds)

  1. docs/en/docs/alternatives.md

    /// check | Inspired **FastAPI** to
    
    Adopt and use an open standard for API specifications, instead of a custom schema.
    
    And integrate standards-based user interface tools:
    
    * [Swagger UI](https://github.com/swagger-api/swagger-ui)
    * [ReDoc](https://github.com/Rebilly/ReDoc)
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 22.2K bytes
    - Click Count (0)
  2. LICENSE

    case, there is little to gain by limiting the free library to free
    software only, so we use the Lesser General Public License.
    
      In other cases, permission to use a particular library in non-free
    programs enables a greater number of people to use a large body of
    free software.  For example, permission to use the GNU C Library in
    non-free programs enables many more people to use the whole GNU
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Mon Jan 18 20:25:38 GMT 2016
    - 25.8K bytes
    - Click Count (0)
  3. apache-maven/src/assembly/maven/conf/settings.xml

    <!--
     | This is the configuration file for Maven. It can be specified at two levels:
     |
     |  1. User Level. This settings.xml file provides configuration for a single user,
     |                 and is normally provided in ${user.home}/.m2/settings.xml.
     |
     |                 NOTE: This location can be overridden with the CLI option:
     |
     |                 -s /path/to/user/settings.xml
     |
     |  2. Installation Level.
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Jan 22 07:44:50 GMT 2025
    - 11.1K bytes
    - Click Count (0)
  4. docs/en/docs/advanced/security/oauth2-scopes.md

    When one of these security schemes uses OAuth2, you can also declare and use scopes.
    
    Each "scope" is just a string (without spaces).
    
    They are normally used to declare specific security permissions, for example:
    
    * `users:read` or `users:write` are common examples.
    * `instagram_basic` is used by Facebook / Instagram.
    * `https://www.googleapis.com/auth/drive` is used by Google.
    
    /// info
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 13.4K bytes
    - Click Count (0)
  5. guava/src/com/google/common/collect/MapMaker.java

     *
     * <p><b>Note:</b> by default, the returned map uses equality comparisons (the {@link Object#equals
     * equals} method) to determine equality for keys or values. However, if {@link #weakKeys} was
     * specified, the map uses identity ({@code ==}) comparisons instead for keys. Likewise, if {@link
     * #weakValues} was specified, the map uses identity comparisons for values.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Aug 07 16:05:33 GMT 2025
    - 12.8K bytes
    - Click Count (0)
  6. docs/en/docs/tutorial/security/simple-oauth2.md

    ```JSON
    {
      "detail": "Not authenticated"
    }
    ```
    
    ### Inactive user { #inactive-user }
    
    Now try with an inactive user, authenticate with:
    
    User: `alice`
    
    Password: `secret2`
    
    And try to use the operation `GET` with the path `/users/me`.
    
    You will get an "Inactive user" error, like:
    
    ```JSON
    {
      "detail": "Inactive user"
    }
    ```
    
    ## Recap { #recap }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 9.4K bytes
    - Click Count (0)
  7. src/main/java/jcifs/smb/Kerb5Authenticator.java

        }
    
        /**
         * Set the user name which is used to setup <code>GSSContext</code>. If null
         * is set, the default user will be used which is retrieved from the first
         * TGT found in <code>Subject</code> .
         *
         * @param name
         *            the user name used to setup <code>GSSContext</code>
         */
        public void setUser(String name) {
            this.user = name;
        }
    
        /**
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 13.2K bytes
    - Click Count (0)
  8. docs/en/docs/tutorial/security/first-steps.md

        * Normally, a token is set to expire after some time.
            * So, the user will have to log in again at some point later.
            * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases).
    * The frontend stores that token temporarily somewhere.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Sat Mar 07 09:29:03 GMT 2026
    - 8.3K bytes
    - Click Count (0)
  9. docs/changelogs/changelog_2x.md

     *  Fix: Allow interceptors to change the request method.
     *  Fix: Don’t use the request's `User-Agent` or `Proxy-Authorization` when
        connecting to an HTTPS server via an HTTP tunnel. The `Proxy-Authorization`
        header was being leaked to the origin server.
     *  Fix: Digits may be used in a URL scheme.
     *  Fix: Improve connection timeout recovery.
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sun Feb 06 02:19:09 GMT 2022
    - 26.6K bytes
    - Click Count (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RoutePlanner.kt

    /**
     * Policy on choosing which connection to use for an exchange and any retries that follow. This uses
     * the following strategies:
     *
     *  1. If the current call already has a connection that can satisfy the request it is used. Using
     *     the same connection for an initial exchange and its follow-ups may improve locality.
     *
     *  2. If there is a connection in the pool that can satisfy the request it is used. Note that it is
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue May 27 14:58:02 GMT 2025
    - 4.2K bytes
    - Click Count (0)
Back to Top