Search Options

Results per page
Sort
Preferred Languages
Advance

Results 201 - 210 of 397 for explicit (0.05 sec)

  1. guava/src/com/google/common/collect/AbstractSetMultimap.java

        return (Set<V>) super.replaceValues(key, values);
      }
    
      /**
       * {@inheritDoc}
       *
       * <p>Though the method signature doesn't say so explicitly, the returned map has {@link Set}
       * values.
       */
      @Override
      public Map<K, Collection<V>> asMap() {
        return super.asMap();
      }
    
      /**
       * Stores a key-value pair in the multimap.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Mar 20 13:05:10 UTC 2025
    - 4.9K bytes
    - Viewed (0)
  2. docs/ru/docs/tutorial/security/index.md

        * Некоторые из этих "потоков" подходят для реализации аутентификации через сторонний сервис использующий OAuth 2.0 (например, Google, Facebook, X (Twitter), GitHub и т.д.):
            * `implicit`
            * `clientCredentials`
            * `authorizationCode`
        * Но есть один конкретный "поток", который может быть идеально использован для обработки аутентификации непосредственно в том же приложении:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  3. src/main/java/jcifs/smb1/netbios/NodeStatusResponse.java

                     * created for it because the original is potentially being actively
                     * referenced by other objects. We must populate the existing object's
                     * data explicitly (and carefully).
                     */
                    if (!addrFound && queryAddress.hostName.hexCode == hexCode
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 5.8K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/dataclasses.md

    So, even with the code above that doesn't use Pydantic explicitly, FastAPI is using Pydantic to convert those standard dataclasses to Pydantic's own flavor of dataclasses.
    
    And of course, it supports the same:
    
    * data validation
    * data serialization
    * data documentation, etc.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  5. docs/es/docs/tutorial/security/index.md

      * Varios de estos flujos son apropiados para construir un proveedor de autenticación OAuth 2.0 (como Google, Facebook, X (Twitter), GitHub, etc.):
        * `implicit`
        * `clientCredentials`
        * `authorizationCode`
      * Pero hay un "flujo" específico que puede usarse perfectamente para manejar la autenticación directamente en la misma aplicación:
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 4.6K bytes
    - Viewed (0)
  6. docs/bucket/retention/README.md

    ## Concepts
    
    - If an object is under legal hold, it cannot be deleted unless the legal hold is explicitly removed for the respective version id. DeleteObjectVersion() would fail otherwise.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 4K bytes
    - Viewed (0)
  7. android/guava-testlib/src/com/google/common/testing/EquivalenceTester.java

     *     .test();
     * }
     *
     * <p>Note that testing {@link Object#equals(Object)} is more simply done using the {@link
     * EqualsTester}. It includes an extra test against an instance of an arbitrary class without having
     * to explicitly add another equivalence group.
     *
     * @author Gregory Kick
     * @since 10.0
     */
    @GwtCompatible
    @NullMarked
    public final class EquivalenceTester<T> {
      private static final int REPETITIONS = 3;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  8. docs/de/docs/advanced/security/oauth2-scopes.md

    Am häufigsten ist der „Implicit“-Flow.
    
    Am sichersten ist der „Code“-Flow, die Implementierung ist jedoch komplexer, da mehr Schritte erforderlich sind. Da er komplexer ist, schlagen viele Anbieter letztendlich den „Implicit“-Flow vor.
    
    /// note | Hinweis
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/body-multiple-params.md

    Of course, you can also declare additional query parameters whenever you need, additional to any body parameters.
    
    As, by default, singular values are interpreted as query parameters, you don't have to explicitly add a `Query`, you can just do:
    
    ```Python
    q: Union[str, None] = None
    ```
    
    Or in Python 3.10 and above:
    
    ```Python
    q: str | None = None
    ```
    
    For example:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.9K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top