- Sort Score
- Result 10 results
- Languages All
Results 501 - 510 of 1,563 for examples (0.12 sec)
-
docs_src/security/tutorial002_py310.py
username: str email: str | None = None full_name: str | None = None disabled: bool | None = None def fake_decode_token(token): return User( username=token + "fakedecoded", email="john@example.com", full_name="John Doe" ) async def get_current_user(token: str = Depends(oauth2_scheme)): user = fake_decode_token(token) return user @app.get("/users/me")
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Jan 07 14:11:31 UTC 2022 - 711 bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/SmoothRateLimiter.java
* example, we could compute the appropriate throttle time for an incoming request, and make the * calling thread wait for that time. * * The simplest way to maintain a rate of QPS is to keep the timestamp of the last granted * request, and ensure that (1/QPS) seconds have elapsed since then. For example, for a rate of
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Apr 04 09:45:04 UTC 2023 - 19.3K bytes - Viewed (0) -
istioctl/pkg/waypoint/waypoint.go
waypointStatusCmd := &cobra.Command{ Use: "status", Short: "Show the status of waypoints in a namespace", Long: "Show the status of waypoints for the namespace provided or default namespace if none is provided", Example: ` # Show the status of the waypoint in the default namespace istioctl waypoint status # Show the status of the waypoint in a specific namespace istioctl waypoint status --namespace default`,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 09 16:05:45 UTC 2024 - 19.6K bytes - Viewed (0) -
istioctl/pkg/version/version.go
return err } return nil } versionCmd.Example = ` # Retrieve version information directly from the control plane, using token security # (This is the usual way to get the control plane version with an out-of-cluster control plane.) istioctl x version --xds-address istio.cloudprovider.example.com:15012 # Retrieve version information via Kubernetes config, using token security
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 29 21:11:35 UTC 2024 - 8.3K bytes - Viewed (0) -
docs/de/docs/tutorial/body-nested-models.md
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 10.3K bytes - Viewed (0) -
docs_src/security/tutorial002_an_py310.py
username: str email: str | None = None full_name: str | None = None disabled: bool | None = None def fake_decode_token(token): return User( username=token + "fakedecoded", email="john@example.com", full_name="John Doe" ) async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): user = fake_decode_token(token) return user @app.get("/users/me")
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Mar 18 12:29:59 UTC 2023 - 761 bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
* certificate is issued to `example.com` and the request is to `localhost`, the connection will * fail. Use a custom [HostnameVerifier] to ignore such problems. * * Other TLS features are still used but provide no security benefits in absence of the above * gaps. For example, an insecure TLS connection is capable of negotiating HTTP/2 with ALPN and
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
} // Test for common pitfall regarding sign extension. // For example: (long) data[i++] | (long) data[i++] << 8 | ... // If data[i] == (byte) 0x80, the first cast will sign-extend it to 0xffffffffffffff80, // masking the remaining seven bytes. // To test this, we give an input where bit 7 is not cleared. For example: // (1) 00 01 02 03 04 05 06 07 80 // (2) 00 01 02 03 04 05 06 07 81
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
} // Test for common pitfall regarding sign extension. // For example: (long) data[i++] | (long) data[i++] << 8 | ... // If data[i] == (byte) 0x80, the first cast will sign-extend it to 0xffffffffffffff80, // masking the remaining seven bytes. // To test this, we give an input where bit 7 is not cleared. For example: // (1) 00 01 02 03 04 05 06 07 80 // (2) 00 01 02 03 04 05 06 07 81
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.6K bytes - Viewed (0) -
android/guava-testlib/src/com/google/common/collect/testing/IteratorTester.java
* possible sequences of these operations, up to a given number of steps. So, if the caller * specifies to use <i>n</i> steps, a total of <i>3^n</i> tests are actually performed. * * <p>For instance, if <i>steps</i> is 5, one example sequence that will be tested is: * * <ol> * <li>remove(); * <li>hasNext() * <li>hasNext(); * <li>remove(); * <li>next(); * </ol> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Feb 21 16:49:06 UTC 2024 - 4.3K bytes - Viewed (0)