Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 225 for having (0.05 sec)

  1. docs/en/docs/tutorial/security/index.md

    **FastAPI** provides several tools to help you deal with **Security** easily, rapidly, in a standard way, without having to study and learn all the security specifications.
    
    But first, let's check some small concepts.
    
    ## In a hurry? { #in-a-hurry }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  2. android/guava-tests/test/com/google/common/net/InternetDomainNameTest.java

      private static final ImmutableSet<String> NO_PS =
          ImmutableSet.of("www", "foo.ihopethiswillneverbeapublicsuffix", "x.y.z");
    
      /**
       * Having a public suffix is equivalent to having a registry suffix, because all registry suffixes
       * are public suffixes, and all public suffixes have registry suffixes.
       */
      private static final ImmutableSet<String> NO_RS = NO_PS;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 17.5K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/query-params.md

    ```
    
    ...this would work:
    
    ```JSON
    {
        "item_id": "foo-item",
        "needy": "sooooneedy"
    }
    ```
    
    And of course, you can define some parameters as required, some as having a default value, and some entirely optional:
    
    {* ../../docs_src/query_params/tutorial006_py310.py hl[8] *}
    
    In this case, there are 3 query parameters:
    
    * `needy`, a required `str`.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:29:01 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/bigger-applications.md

        * You can also add [`Security` dependencies with `scopes`](../advanced/security/oauth2-scopes.md){.internal-link target=_blank}.
    
    /// tip
    
    Having `dependencies` in the `APIRouter` can be used, for example, to require authentication for a whole group of *path operations*. Even if the dependencies are not added individually to each one of them.
    
    ///
    
    /// check
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 19.1K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/Hashing.java

       * specific length.
       *
       * <p>For example, if you need 1024-bit hash codes, you could join two {@link Hashing#sha512} hash
       * functions together: {@code Hashing.concatenating(Hashing.sha512(), Hashing.sha512())}.
       *
       * @since 19.0
       */
      public static HashFunction concatenating(
          HashFunction first, HashFunction second, HashFunction... rest) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:06:57 UTC 2025
    - 31.1K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/events.md

    The same way, you can define logic (code) that should be executed when the application is **shutting down**. In this case, this code will be executed **once**, **after** having handled possibly **many requests**.
    
    Because this code is executed before the application **starts** taking requests, and right after it **finishes** handling requests, it covers the whole application **lifespan** (the word "lifespan" will be important in a second 😉).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  7. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/publicsuffix/PublicSuffixDatabase.kt

          val rule = publicSuffixList.bytes.binarySearch(domainLabelsUtf8Bytes, i)
          if (rule != null) {
            exactMatch = rule
            break
          }
        }
    
        // In theory, wildcard rules are not restricted to having the wildcard in the leftmost position.
        // In practice, wildcards are always in the leftmost position. For now, this implementation
        // cheats and does not attempt every possible permutation. Instead, it only considers wildcards
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon Jul 28 07:33:49 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  8. src/test/java/jcifs/internal/smb2/lease/DirectoryCacheEntryTest.java

            assertTrue(entry.isExpired());
            assertTrue(entry.needsRefresh());
        }
    
        @Test
        public void testNeedsRefresh() {
            assertFalse(entry.needsRefresh());
    
            // Mark as having changes
            entry.updateChild("file1.txt", 1024L, 1000L, false, 0x20, 500L, 800L);
            assertTrue(entry.hasChanges());
            assertTrue(entry.needsRefresh());
    
            // Mark as complete (clears changes)
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 23 01:47:47 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/ComparisonChain.java

       * @since 12.0 (present as {@code compare} since 2.0)
       */
      public abstract ComparisonChain compareFalseFirst(boolean left, boolean right);
    
      /**
       * Ends this comparison chain and returns its result: a value having the same sign as the first
       * nonzero comparison result in the chain, or zero if every result was zero.
       */
      public abstract int result();
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 11.1K bytes
    - Viewed (0)
  10. docs/sts/README.md

    Following are advantages for using temporary credentials:
    
    - Eliminates the need to embed long-term credentials with an application.
    - Eliminates the need to provide access to buckets and objects without having to define static credentials.
    - Temporary credentials have a limited lifetime, there is no need to rotate them or explicitly revoke them. Expired temporary credentials cannot be reused.
    
    ## Identity Federation
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
Back to top