- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 34 for Schaper (0.23 sec)
-
docs/en/docs/tutorial/security/simple-oauth2.md
# Simple OAuth2 with Password and Bearer Now let's build from the previous chapter and add the missing parts to have a complete security flow. ## Get the `username` and `password` We are going to use **FastAPI** security utilities to get the `username` and `password`. OAuth2 specifies that when using the "password flow" (that we are using) the client/user must send a `username` and `password` fields as form data.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 12.5K bytes - Viewed (0) -
docs/en/docs/tutorial/request-forms.md
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Wed Mar 13 19:02:19 GMT 2024 - 3.2K bytes - Viewed (0) -
maven-api-impl/src/main/java/org/apache/maven/internal/impl/PathModularizationCache.java
* * @see #getModuleInfo(Path) */ private final Map<Path, PathModularization> moduleInfo; /** * Whether JAR files are modular. This map is redundant with {@link #moduleInfo}, * but cheaper to compute when the module names are not needed. * * @see #getPathType(Path) */ private final Map<Path, PathType> pathTypes; /** * Creates an initially empty cache. */
Java - Registered: Sun May 05 03:35:11 GMT 2024 - Last Modified: Mon Mar 25 10:50:01 GMT 2024 - 5.2K bytes - Viewed (0) -
guava/src/com/google/common/collect/Collections2.java
* * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the * first permutation will be in ascending order, and the last will be in descending order. *
Java - Registered: Fri Apr 05 12:43:09 GMT 2024 - Last Modified: Mon Apr 01 16:15:01 GMT 2024 - 23.1K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/AggregateFutureState.java
*/ Set<Throwable> seenExceptionsLocal = seenExceptions; if (seenExceptionsLocal == null) { // TODO(cpovirk): Should we use a simpler (presumably cheaper) data structure? /* * Using weak references here could let us release exceptions earlier, but: * * 1. On Android, querying a WeakReference blocks if the GC is doing an otherwise-concurrent
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Thu Dec 14 20:35:03 GMT 2023 - 8.5K bytes - Viewed (0) -
docs/kms/IAM.md
to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU. - Root credentials can now be changed easily. Before, a two-step process was required to change the cluster root credentials since they were used to en/decrypt the IAM data.
Plain Text - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Viewed (0) -
maven-core/src/main/java/org/apache/maven/internal/impl/PathModularizationCache.java
* * @see #getModuleInfo(Path) */ private final Map<Path, PathModularization> moduleInfo; /** * Whether JAR files are modular. This map is redundant with {@link #moduleInfo}, * but cheaper to compute when the module names are not needed. * * @see #getPathType(Path) */ private final Map<Path, PathType> pathTypes; /** * Creates an initially empty cache. */
Java - Registered: Sun Mar 24 03:35:10 GMT 2024 - Last Modified: Fri Mar 01 17:18:13 GMT 2024 - 5.2K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu May 02 22:37:31 GMT 2024 - 18K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md
!!! info In this example we use invented custom headers `X-Key` and `X-Token`. But in real cases, when implementing security, you would get more benefits from using the integrated [Security utilities (the next chapter)](../security/index.md){.internal-link target=_blank}. ## Dependencies errors and return values You can use the same dependency *functions* you use normally. ### Dependency requirements
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Oct 17 05:59:11 GMT 2023 - 4.1K bytes - Viewed (0) -
docs/bucket/lifecycle/README.md
transitioning of older objects to a different cluster or the public cloud by setting up transition rules in the bucket lifecycle configuration. This feature enables applications to optimize storage costs by moving less frequently accessed data to a cheaper storage without compromising accessibility of data. To transition objects in a bucket to a destination bucket on a different cluster, applications need to specify a transition tier defined on MinIO instead of storage class while setting...
Plain Text - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Sat Aug 26 07:33:25 GMT 2023 - 9K bytes - Viewed (1)