- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 465 for userHome (0.04 sec)
-
compat/maven-embedder/src/main/java/org/apache/maven/cli/configuration/SettingsXmlConfigurationProcessor.java
@Deprecated public class SettingsXmlConfigurationProcessor implements ConfigurationProcessor { public static final String HINT = "settings"; public static final String USER_HOME = System.getProperty("user.home"); public static final File USER_MAVEN_CONFIGURATION_HOME = new File(USER_HOME, ".m2"); public static final File DEFAULT_USER_SETTINGS_FILE = new File(USER_MAVEN_CONFIGURATION_HOME, "settings.xml");Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Sat Apr 19 18:49:57 UTC 2025 - 12K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessProp.java
default String getLdapSecurityPrincipal(final String username) { final String value; final int maxLength = getLdapMaxUsernameLengthAsInteger(); if (username == null) { value = StringUtil.EMPTY; } else if (maxLength >= 0 && username.length() > maxLength) { value = username.substring(0, maxLength); } else { value = username; }
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Dec 13 02:21:17 UTC 2025 - 88.2K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py310.py
def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False if not verify_password(password, user.hashed_password):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 5.3K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py39.py
def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False if not verify_password(password, user.hashed_password):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 5.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/base/login/SpnegoCredential.java
*/ public SpnegoCredential(final String username) { this.username = username; } /** * Gets the user identifier from this credential. * * @return The username from SPNEGO authentication */ @Override public String getUserId() { return username; } /** * Returns a string representation of this credential. *Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 1.9K bytes - Viewed (1) -
docs_src/security/tutorial004_an_py39.py
payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception token_data = TokenData(username=username) except InvalidTokenError: raise credentials_exception user = get_user(fake_users_db, username=token_data.username) if user is None: raise credentials_exception return user
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 4.2K bytes - Viewed (0) -
tests/test_multipart_installation.py
with pytest.raises(RuntimeError, match=multipart_incorrect_install_error): app = FastAPI() @app.post("/") async def root(username: str = Form()): return username # pragma: nocover def test_incorrect_multipart_installed_file_upload(monkeypatch): monkeypatch.setattr("python_multipart.__version__", "0.0.12") with warnings.catch_warnings(record=True):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Oct 27 21:46:26 UTC 2024 - 5.7K bytes - Viewed (0) -
docs_src/security/tutorial005_py39.py
def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False if not verify_password(password, user.hashed_password):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 5.3K bytes - Viewed (0) -
docs_src/security/tutorial003_py310.py
oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") class User(BaseModel): username: str email: str | None = None full_name: str | None = None disabled: bool | None = None class UserInDB(User): hashed_password: str def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def fake_decode_token(token):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Nov 24 19:03:06 UTC 2025 - 2.4K bytes - Viewed (0) -
docs_src/security/tutorial004_py310.py
try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception token_data = TokenData(username=username) except InvalidTokenError: raise credentials_exception user = get_user(fake_users_db, username=token_data.username) if user is None: raise credentials_exception return userRegistered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 4K bytes - Viewed (0)