- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 158 for Complex (0.08 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/test/java/org/codelibs/fess/helper/JobHelperTest.java
// Mock implementation that doesn't require client entity.setLastUpdated(System.currentTimeMillis()); } } // Simple mock class without complex interface requirements private static class MockLaCron implements LaCron { @Override
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 6.5K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
## Recap { #recap } With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT. In almost any framework handling the security becomes a rather complex subject quite quickly.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/AbstractMapBasedMultiset.java
} @Override public final void clear() { backingMap.clear(); size = 0; } /** * Skeleton of per-entry iterators. We could push this down and win a few bytes, but it's complex * enough it's not especially worth it. */ abstract class Itr<T extends @Nullable Object> implements Iterator<T> { int entryIndex = backingMap.firstIndex(); int toRemove = -1;
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Dec 05 23:15:58 GMT 2025 - 7.9K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/util/ParameterUtilTest.java
configParameters = "config.equation=a=b+c\nfield.xpath.complex=//div[@class='content']"; result = ParameterUtil.createConfigParameterMap(configParameters); assertEquals("a=b+c", result.get(ConfigName.CONFIG).get("equation")); assertEquals("//div[@class='content']", result.get(ConfigName.XPATH).get("complex")); // Test with special characters in keys and values
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 22.8K bytes - Click Count (0) -
docs/en/docs/tutorial/security/get-current-user.md
But here's the key point. The security and dependency injection stuff is written once. And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility. But you can have thousands of endpoints (*path operations*) using the same security system.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 13:19:43 GMT 2026 - 4K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/exception/ThumbnailGenerationExceptionTest.java
} @Test public void test_constructorWithThrowableCause_NestedErrorAndException() { // Test with nested Error and Exception String message = "Complex error during thumbnail generation"; Exception innerException = new IllegalArgumentException("Invalid argument"); Error middleError = new AssertionError("Assertion failed", innerException);Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Jan 11 08:43:05 GMT 2026 - 10.3K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
ASN1EncodableVector authDataVector = new ASN1EncodableVector(); ASN1EncodableVector authElementVector = new ASN1EncodableVector(); // Use an auth type that doesn't require complex parsing (e.g., 999 - unknown type) authElementVector.add(new DERTaggedObject(0, new ASN1Integer(999))); // ad-type authElementVector.add(new DERTaggedObject(1, new DEROctetString(new byte[] { 1, 2, 3, 4 })));Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 7.7K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0) -
api/maven-api-xml/src/main/java/org/apache/maven/api/xml/XmlNode.java
String SELF_COMBINATION_REMOVE = XmlService.SELF_COMBINATION_REMOVE; /** * In case of complex XML structures, combining can be done based on id. */ @Deprecated(since = "4.0.0", forRemoval = true) String ID_COMBINATION_MODE_ATTRIBUTE = XmlService.ID_COMBINATION_MODE_ATTRIBUTE; /** * In case of complex XML structures, combining can be done based on keys. * This is a comma separated list of attribute names.Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Dec 17 15:20:44 GMT 2025 - 18.3K bytes - Click Count (0) -
src/test/java/jcifs/pac/kerberos/KerberosPacAuthDataTest.java
KerberosKey kdcKey = new KerberosKey(null, keyBytes, PacSignature.HMAC_SHA1_96_AES256, 1); keys.put(PacSignature.ETYPE_AES256_CTS_HMAC_SHA1_96, kdcKey); // Mock Pac construction to bypass complex validation try (MockedConstruction<Pac> pacMock = Mockito.mockConstruction(Pac.class, (mock, context) -> { // Setup mock behavior PacLogonInfo mockLogonInfo = Mockito.mock(PacLogonInfo.class);
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 6.3K bytes - Click Count (0)