Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 158 for complexF3 (0.08 sec)

  1. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap { #recap }
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/helper/JobHelperTest.java

                // Mock implementation that doesn't require client
                entity.setLastUpdated(System.currentTimeMillis());
            }
        }
    
        // Simple mock class without complex interface requirements
        private static class MockLaCron implements LaCron {
            @Override
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 19 23:49:30 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/get-current-user.md

    But here's the key point.
    
    The security and dependency injection stuff is written once.
    
    And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility.
    
    But you can have thousands of endpoints (*path operations*) using the same security system.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4K bytes
    - Viewed (0)
  4. api/maven-api-xml/src/main/java/org/apache/maven/api/xml/XmlNode.java

        String SELF_COMBINATION_REMOVE = XmlService.SELF_COMBINATION_REMOVE;
    
        /**
         * In case of complex XML structures, combining can be done based on id.
         */
        @Deprecated(since = "4.0.0", forRemoval = true)
        String ID_COMBINATION_MODE_ATTRIBUTE = XmlService.ID_COMBINATION_MODE_ATTRIBUTE;
    
        /**
         * In case of complex XML structures, combining can be done based on keys.
         * This is a comma separated list of attribute names.
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Sat Jul 19 11:09:56 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  5. docs/pt/docs/tutorial/body-nested-models.md

    * Conversão de dados
    * Validação de dados
    * Documentação automatica
    
    ## Tipos especiais e validação
    
    Além dos tipos singulares normais como `str`, `int`, `float`, etc. Você também pode usar tipos singulares mais complexos que herdam de `str`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 7.2K bytes
    - Viewed (0)
  6. docs/fr/docs/async.md

    ---
    
    Des exemples communs d'opérations "CPU bounds" sont les procédés qui requièrent des traitements mathématiques complexes.
    
    Par exemple :
    
    * Traitements d'**audio** et d'**images**.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:56:21 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  7. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

            ASN1EncodableVector authDataVector = new ASN1EncodableVector();
            ASN1EncodableVector authElementVector = new ASN1EncodableVector();
            // Use an auth type that doesn't require complex parsing (e.g., 999 - unknown type)
            authElementVector.add(new DERTaggedObject(0, new ASN1Integer(999))); // ad-type
            authElementVector.add(new DERTaggedObject(1, new DEROctetString(new byte[] { 1, 2, 3, 4 })));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  8. docs/pt/docs/tutorial/body.md

    Enviar um corpo em uma requisição `GET` não tem um comportamento definido nas especificações, porém é suportado pelo FastAPI, apenas para casos de uso bem complexos/extremos.
    
    Como é desencorajado, a documentação interativa com Swagger UI não irá mostrar a documentação para o corpo da requisição para um `GET`, e proxies que intermediarem podem não suportar o corpo da requisição.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 7K bytes
    - Viewed (0)
  9. doc/go_mem.html

    do exactly this.
    </p>
    
    <p>
    A read of an array, struct, or complex number
    may be implemented as a read of each individual sub-value
    (array element, struct field, or real/imaginary component),
    in any order.
    Similarly, a write of an array, struct, or complex number
    may be implemented as a write of each individual sub-value,
    in any order.
    </p>
    
    <p>
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 05 15:41:37 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top