- Sort Score
- Num 10 results
- Language All
Results 61 - 70 of 730 for token1 (0.07 seconds)
-
internal/event/target/nats_contrib_test.go
defer s.Shutdown() clientConfig := &NATSArgs{ Enable: true, Address: xnet.Host{ Name: "localhost", Port: (xnet.Port(opts.Port)), IsPortSet: true, }, Subject: "test", Token: opts.Authorization, } con, err := clientConfig.connectNats() if err != nil { t.Errorf("Could not connect to nats: %v", err) } defer con.Close() } func TestNatsConnNKeySeed(t *testing.T) {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Apr 27 04:30:57 GMT 2025 - 3K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
<img src="/img/tutorial/security/image11.png"> ## JWT token with scopes { #jwt-token-with-scopes } Now, modify the token *path operation* to return the scopes requested. We are still using the same `OAuth2PasswordRequestForm`. It includes a property `scopes` with a `list` of `str`, with each scope it received in the request. And we return the scopes as part of the JWT token. /// danger
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0) -
src/main/webapp/js/marked.min.js
e)&&"tokens"in u.tokens[0]&&u.tokens[0].tokens?(u.tokens[0].raw=c.raw+u.tokens[0].raw,u.tokens[0].text=c.raw+u.tokens[0].text,u.tokens[0].tokens.unshift(c)):u.tokens.unshift({type:"paragraph",raw:c.raw,text:c.raw,tokens:[c]}):u.tokens.unshift(c)}}if(!i.loose){let p=u.tokens.filter(d=>d.type==="space"),c=p.length>0&&p.some(d=>this.rules.other.anyLine.test(d.raw));i.loose=c}}if(i.loose)for(let u of i.items){u.loose=!0;for(let p of u.tokens)p.type==="text"&&(p.type="paragraph")}return i}}html(e){let...
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 06:21:57 GMT 2026 - 41.5K bytes - Click Count (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/profile/activation/JdkVersionProfileActivator.java
for (String token : range.split(",")) { if (token.startsWith("[")) { ranges.add(new RangeValue(token.replace("[", ""), true)); } else if (token.startsWith("(")) { ranges.add(new RangeValue(token.replace("(", ""), false)); } else if (token.endsWith("]")) { ranges.add(new RangeValue(token.replace("]", ""), true));Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Tue Feb 25 08:27:34 GMT 2025 - 6.6K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/suggest/settings/AnalyzerSettingsTest.java
final List<AnalyzeToken> tokens = analyzer.analyze(text, "", null); final List<AnalyzeToken> readingTokens = analyzer.analyzeAndReading(text, "", null); int matchCount = 0; for (int i = 0; i < tokens.size(); i++) { final String term = tokens.get(i).getTerm(); final String reading = readingTokens.get(i).getTerm();
Created: Fri Apr 17 09:08:13 GMT 2026 - Last Modified: Sun Feb 01 12:48:24 GMT 2026 - 8K bytes - Click Count (0) -
docs/es/docs/advanced/security/oauth2-scopes.md
<img src="/img/tutorial/security/image11.png"> ## Token JWT con scopes { #jwt-token-with-scopes } Ahora, modifica la *path operation* del token para devolver los scopes solicitados. Todavía estamos usando el mismo `OAuth2PasswordRequestForm`. Incluye una propiedad `scopes` con una `list` de `str`, con cada scope que recibió en el request. Y devolvemos los scopes como parte del token JWT. /// danger | Peligro
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 14.1K bytes - Click Count (0) -
docs/ko/docs/tutorial/security/oauth2-jwt.md
# 패스워드(해싱 포함)를 사용하는 OAuth2, JWT 토큰을 사용하는 Bearer { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } 모든 보안 흐름을 구성했으므로, 이제 <abbr title="JSON 웹 토큰">JWT</abbr> 토큰과 안전한 패스워드 해싱을 사용해 애플리케이션을 실제로 안전하게 만들겠습니다. 이 코드는 실제로 애플리케이션에서 사용할 수 있으며, 패스워드 해시를 데이터베이스에 저장하는 등의 작업에 활용할 수 있습니다. 이전 장에서 멈춘 지점부터 시작해 내용을 확장해 나가겠습니다. ## JWT 알아보기 { #about-jwt } JWT는 "JSON Web Tokens"를 의미합니다. JSON 객체를 공백이 없는 길고 밀집된 문자열로 부호화하는 표준입니다. 다음과 같은 형태입니다: ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 13K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/app/service/AccessTokenService.java
} /** * Get the access token. * @param id The ID of the access token. * @return The access token. */ public OptionalEntity<AccessToken> getAccessToken(final String id) { return accessTokenBhv.selectByPK(id); } /** * Store the access token. * @param accessToken The access token. */ public void store(final AccessToken accessToken) {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Jul 17 08:28:31 GMT 2025 - 5.5K bytes - Click Count (0) -
docs/ja/docs/tutorial/security/oauth2-jwt.md
これでセキュリティの流れが全てわかったので、<abbr title="JSON Web Tokens - JSON Web Token">JWT</abbr>トークンと安全なパスワードのハッシュ化を使用して、実際にアプリケーションを安全にしてみましょう。 このコードは、アプリケーションで実際に使用したり、パスワードハッシュをデータベースに保存するといった用途に利用できます。 本章では、前章の続きから始めて、コードをアップデートしていきます。 ## JWT について { #about-jwt } JWTとは「JSON Web Tokens」の略称です。 JSONオブジェクトをスペースのない長く密集した文字列で表現したトークンの仕様です。例えば次のようになります: ```
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:07:17 GMT 2026 - 14.6K bytes - Click Count (1) -
tests/update_test.go
ID: owner.ID, Name: "user", Token: Token{Content: "token2"}, } o2, err := saveTokenOwner(&owner) if err != nil { t.Errorf("failed to save token owner, got error: %v", err) } if o2.Name != "user_name" { t.Errorf(`owner name should be "user_name", but got: "%s"`, o2.Name) } if o2.Token.Content != "token2_encrypted" {
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Mon Jul 21 02:46:58 GMT 2025 - 30.4K bytes - Click Count (0)