Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 8,480 for to (0.14 sec)

  1. docs/en/docs/tutorial/security/index.md

    If you don't care about any of these terms and you just need to add security with authentication based on username and password *right now*, skip to the next chapters.
    
    ## OAuth2
    
    OAuth2 is a specification that defines several ways to handle authentication and authorization.
    
    It is quite an extensive specification and covers several complex use cases.
    
    It includes ways to authenticate using a "third party".
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Sat Jun 24 14:47:15 GMT 2023
    - 4.3K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/Multiset.java

     * to add or remove multiple occurrences of an element at once, or to set the count of an element to
     * a specific value. These modification operations are optional, but implementations which support
     * the standard collection operations {@link #add(Object)} or {@link #remove(Object)} are encouraged
     * to implement the related methods as well. Finally, two collection views are provided: {@link
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Sat Jun 17 14:40:53 GMT 2023
    - 19.7K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/collect/ForwardingSortedMultiset.java

       * #descendingMultiset()} will not reflect any changes you make to the behavior of methods such as
       * {@link #add(Object)} or {@link #pollFirstEntry}. This skeleton implementation correctly
       * delegates each of its operations to the appropriate methods of this {@code
       * ForwardingSortedMultiset}.
       *
       * <p>In many cases, you may wish to override {@link #descendingMultiset()} to return an instance
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Fri May 12 15:26:39 GMT 2023
    - 8.7K bytes
    - Viewed (0)
  4. docs/bucket/replication/README.md

    that are now eligible to be replicated will eventually be synced to the target cluster as the scanner schedules them. This may be slower depending on the load on the cluster, latency and size of the namespace.
    
    In the rare event that target DR site is entirely lost and previously replicated objects to the DR cluster need to be re-replicated, `mc replicate resync start alias/bucket --remote-bucket <arn>` can be used to initiate a reset. This would initiate a re-sync between the two clusters...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 24 23:46:33 GMT 2023
    - 18.2K bytes
    - Viewed (0)
  5. internal/store/queuestore_test.go

    		if err := tearDownQueueStore(); err != nil {
    			t.Fatal("Failed to tear down store ", err)
    		}
    	}()
    	// The max limit is set to 5.
    	store, err := setUpQueueStore(queueDir, 5)
    	if err != nil {
    		t.Fatal("Failed to create a queue store ", err)
    	}
    	for i := 0; i < 5; i++ {
    		if err := store.Put(testItem); err != nil {
    			t.Fatal("Failed to put to queue store ", err)
    		}
    	}
    	// Should not allow 6th Put.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 04 17:52:24 GMT 2023
    - 5.9K bytes
    - Viewed (0)
  6. architecture/standards/0001-use-architectural-decision-records.md

    ## Decision
    
    The *Build Tool Team* has decided to use Architectural Decision Records (aka ADR) to track decisions we want to follow.
    
    The main logic with ADRs is to describe (architectural) decisions made:
    
    * To provide best practices and solutions we (as the *build tool* team) want to promote.
    * To avoid asking the same thing multiple times during code review.
    Plain Text
    - Registered: Wed May 08 11:36:15 GMT 2024
    - Last Modified: Sat Mar 02 21:54:40 GMT 2024
    - 2.8K bytes
    - Viewed (0)
  7. fastapi/routing.py

                Doc(
                    """
                    Configuration passed to Pydantic to define if the response data should
                    exclude fields set to `None`.
    
                    This is much simpler (less smart) than `response_model_exclude_unset`
                    and `response_model_exclude_defaults`. You probably want to use one of
                    those two instead of this one, as those allow returning `None` values
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Apr 02 02:48:51 GMT 2024
    - 170.1K bytes
    - Viewed (0)
  8. internal/store/batch_test.go

    		t.Fatalf("unable to get the items from the batch; %v", err)
    	}
    	if len(items) != 1 {
    		t.Fatalf("Expected length of the batch items to be 1 but got %v", len(items))
    	}
    	if len(keys) != 1 {
    		t.Fatalf("Expected length of the batch keys to be 1 but got %v", len(items))
    	}
    	// try adding again after Get.
    	for i := 0; i < int(limit); i++ {
    		if err := batch.Add(i, i); err != nil {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Oct 07 15:07:38 GMT 2023
    - 3.8K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/util/concurrent/AggregateFuture.java

          // call to addListener() will callback to setOneValue(), transitively call our cleanup
          // listener, and set this.futures to null.
          // This is not actually a problem, since the foreach only needs this.futures to be non-null
          // at the beginning of the loop.
          int i = 0;
          for (ListenableFuture<? extends InputT> future : futures) {
            int index = i++;
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Thu Feb 01 21:46:34 GMT 2024
    - 15.4K bytes
    - Viewed (0)
  10. docs/sts/README.md

    - Temporary credentials do not need to be stored with the application but are generated dynamically and provided to the application when requested. When (or even before) the temporary credentials expire, the application can request new credentials.
    
    Following are advantages for using temporary credentials:
    
    - Eliminates the need to embed long-term credentials with an application.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Oct 25 00:44:15 GMT 2022
    - 7.8K bytes
    - Viewed (1)
Back to top