Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 116 for independence (0.16 sec)

  1. src/test/java/org/codelibs/fess/job/AggregateLogJobTest.java

            // Second execution
            String result2 = aggregateLogJob.execute();
            assertNotNull(result2);
            assertTrue(result2.contains("Error 2"));
    
            // Results should be independent
            assertFalse(result1.equals(result2));
        }
    
        public void test_execute_withEmptyStringException() {
            // Setup mock SearchLogHelper that throws exception with empty message
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  2. docs/pt/docs/tutorial/security/first-steps.md

    O "fluxo" da `senha` é um dos caminhos ("fluxos") definidos no OAuth2, para lidar com a segurança e autenticação.
    
    OAuth2 foi projetado para que o backend ou a API pudesse ser independente do servidor que autentica o usuário.
    
    Mas nesse caso, a mesma aplicação **FastAPI** irá lidar com a API e a autenticação.
    
    Então, vamos rever de um ponto de vista simplificado:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. src/test/java/org/codelibs/fess/ds/DataStoreTest.java

            // Execute on both instances
            dataStore1.store(config, callback, params);
            dataStore2.store(config, callback, params);
            dataStore2.store(config, callback, params);
    
            // Verify independent operation
            assertEquals(1, store1CallCount.get());
            assertEquals(2, store2CallCount.get());
        }
    
        // Test implementation of IndexUpdateCallback for testing purposes
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 13K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/JAASAuthenticatorTest.java

            assertNull(pc.getPassword());
            verify(spyAuth, times(1)).getPasswordAsCharArray();
        }
    
        @Test
        @DisplayName("clone: copies fields and cached subject; instances are independent")
        void testCloneCopiesFieldsAndIndependence() throws Exception {
            // Use configuration-based constructor to also exercise copying of configuration/service fields
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.9K bytes
    - Viewed (0)
  5. src/test/java/org/codelibs/fess/exception/InvalidAccessTokenExceptionTest.java

                assertEquals(type, iate.getType());
                assertEquals(message, e.getMessage());
            }
        }
    
        public void test_multipleExceptionInstances() {
            // Test multiple instances are independent
            InvalidAccessTokenException exception1 = new InvalidAccessTokenException("Type1", "Message1");
            InvalidAccessTokenException exception2 = new InvalidAccessTokenException("Type2", "Message2");
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 10.4K bytes
    - Viewed (0)
  6. src/test/java/jcifs/internal/SmbNegotiationTest.java

            SmbNegotiation anotherNegotiation =
                    new SmbNegotiation(anotherRequest, anotherResponse, anotherRequestBuffer, anotherResponseBuffer);
    
            // Verify the instances are independent
            assertNotSame(negotiation.getRequest(), anotherNegotiation.getRequest());
            assertNotSame(negotiation.getResponse(), anotherNegotiation.getResponse());
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/events.md

    That's what we'll solve, let's load the model before the requests are handled, but only right before the application starts receiving requests, not while  the code is being loaded.
    
    ## Lifespan { #lifespan }
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  8. src/test/java/org/codelibs/fess/rank/fusion/SearchResultTest.java

            // Document list size should remain the same
            assertEquals(1, result.getDocumentList().size());
        }
    
        public void test_multipleBuilds() {
            // Test that each builder creates independent results
            // Create first result with one document
            SearchResult.SearchResultBuilder builder1 = SearchResult.create();
            Map<String, Object> doc1 = new HashMap<>();
            doc1.put("id", "1");
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 12.9K bytes
    - Viewed (0)
  9. src/test/java/org/codelibs/fess/entity/DataStoreParamsTest.java

            // Create a copy
            DataStoreParams copy = dataStoreParams.newInstance();
    
            // Modify original
            dataStoreParams.put("key5", "value5");
    
            // Verify copy is independent
            assertTrue(dataStoreParams.containsKey("key5"));
            assertFalse(copy.containsKey("key5"));
    
            // Get as map and verify
            Map<String, Object> map = dataStoreParams.asMap();
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/first-steps.md

    Now let's go back a bit and understand what is all that.
    
    The `password` "flow" is one of the ways ("flows") defined in OAuth2, to handle security and authentication.
    
    OAuth2 was designed so that the backend or API could be independent of the server that authenticates the user.
    
    But in this case, the same **FastAPI** application will handle the API and the authentication.
    
    So, let's review it from that simplified point of view:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
Back to top