- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 225 for having (0.04 sec)
-
docs/en/docs/tutorial/security/index.md
**FastAPI** provides several tools to help you deal with **Security** easily, rapidly, in a standard way, without having to study and learn all the security specifications. But first, let's check some small concepts. ## In a hurry? { #in-a-hurry }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 4.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/net/InternetDomainNameTest.java
private static final ImmutableSet<String> NO_PS = ImmutableSet.of("www", "foo.ihopethiswillneverbeapublicsuffix", "x.y.z"); /** * Having a public suffix is equivalent to having a registry suffix, because all registry suffixes * are public suffixes, and all public suffixes have registry suffixes. */ private static final ImmutableSet<String> NO_RS = NO_PS;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 17.5K bytes - Viewed (0) -
docs/en/docs/tutorial/query-params.md
``` ...this would work: ```JSON { "item_id": "foo-item", "needy": "sooooneedy" } ``` And of course, you can define some parameters as required, some as having a default value, and some entirely optional: {* ../../docs_src/query_params/tutorial006_py310.py hl[8] *} In this case, there are 3 query parameters: * `needy`, a required `str`.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:29:01 UTC 2025 - 4.5K bytes - Viewed (0) -
docs/en/docs/tutorial/bigger-applications.md
* You can also add [`Security` dependencies with `scopes`](../advanced/security/oauth2-scopes.md){.internal-link target=_blank}. /// tip Having `dependencies` in the `APIRouter` can be used, for example, to require authentication for a whole group of *path operations*. Even if the dependencies are not added individually to each one of them. /// /// check
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 19.1K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hashing.java
* specific length. * * <p>For example, if you need 1024-bit hash codes, you could join two {@link Hashing#sha512} hash * functions together: {@code Hashing.concatenating(Hashing.sha512(), Hashing.sha512())}. * * @since 19.0 */ public static HashFunction concatenating( HashFunction first, HashFunction second, HashFunction... rest) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:06:57 UTC 2025 - 31.1K bytes - Viewed (0) -
docs/en/docs/advanced/events.md
The same way, you can define logic (code) that should be executed when the application is **shutting down**. In this case, this code will be executed **once**, **after** having handled possibly **many requests**. Because this code is executed before the application **starts** taking requests, and right after it **finishes** handling requests, it covers the whole application **lifespan** (the word "lifespan" will be important in a second 😉).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.9K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/publicsuffix/PublicSuffixDatabase.kt
val rule = publicSuffixList.bytes.binarySearch(domainLabelsUtf8Bytes, i) if (rule != null) { exactMatch = rule break } } // In theory, wildcard rules are not restricted to having the wildcard in the leftmost position. // In practice, wildcards are always in the leftmost position. For now, this implementation // cheats and does not attempt every possible permutation. Instead, it only considers wildcards
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon Jul 28 07:33:49 UTC 2025 - 8.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/lease/DirectoryCacheEntryTest.java
assertTrue(entry.isExpired()); assertTrue(entry.needsRefresh()); } @Test public void testNeedsRefresh() { assertFalse(entry.needsRefresh()); // Mark as having changes entry.updateChild("file1.txt", 1024L, 1000L, false, 0x20, 500L, 800L); assertTrue(entry.hasChanges()); assertTrue(entry.needsRefresh()); // Mark as complete (clears changes)
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 23 01:47:47 UTC 2025 - 8.4K bytes - Viewed (0) -
guava/src/com/google/common/collect/ComparisonChain.java
* @since 12.0 (present as {@code compare} since 2.0) */ public abstract ComparisonChain compareFalseFirst(boolean left, boolean right); /** * Ends this comparison chain and returns its result: a value having the same sign as the first * nonzero comparison result in the chain, or zero if every result was zero. */ public abstract int result();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 11.1K bytes - Viewed (0) -
docs/sts/README.md
Following are advantages for using temporary credentials: - Eliminates the need to embed long-term credentials with an application. - Eliminates the need to provide access to buckets and objects without having to define static credentials. - Temporary credentials have a limited lifetime, there is no need to rotate them or explicitly revoke them. Expired temporary credentials cannot be reused. ## Identity Federation
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.8K bytes - Viewed (0)