Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 36 for Schaper (0.21 sec)

  1. android/guava/src/com/google/common/graph/MapIteratorCache.java

      @CheckForNull
      V getIfCached(@CheckForNull Object key) {
        Entry<K, V> entry = cacheEntry; // store local reference for thread-safety
    
        // Check cache. We use == on purpose because it's cheaper and a cache miss is ok.
        if (entry != null && entry.getKey() == key) {
          return entry.getValue();
        }
        return null;
      }
    
      void clearCache() {
        cacheEntry = null;
      }
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Wed Oct 06 00:47:57 GMT 2021
    - 4.7K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/simple-oauth2.md

    # Simple OAuth2 with Password and Bearer
    
    Now let's build from the previous chapter and add the missing parts to have a complete security flow.
    
    ## Get the `username` and `password`
    
    We are going to use **FastAPI** security utilities to get the `username` and `password`.
    
    OAuth2 specifies that when using the "password flow" (that we are using) the client/user must send a `username` and `password` fields as form data.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 12.5K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/request-forms.md

        Data from forms is normally encoded using the "media type" `application/x-www-form-urlencoded`.
    
        But when the form includes files, it is encoded as `multipart/form-data`. You'll read about handling files in the next chapter.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Wed Mar 13 19:02:19 GMT 2024
    - 3.2K bytes
    - Viewed (0)
  4. docs/en/docs/deployment/concepts.md

    But for now, let's check these important **conceptual ideas**. These concepts also apply to any other type of web API. 💡
    
    ## Security - HTTPS
    
    In the [previous chapter about HTTPS](https.md){.internal-link target=_blank} we learned about how HTTPS provides encryption for your API.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu May 02 22:37:31 GMT 2024
    - 18K bytes
    - Viewed (0)
  5. maven-api-impl/src/main/java/org/apache/maven/internal/impl/PathModularizationCache.java

         *
         * @see #getModuleInfo(Path)
         */
        private final Map<Path, PathModularization> moduleInfo;
    
        /**
         * Whether JAR files are modular. This map is redundant with {@link #moduleInfo},
         * but cheaper to compute when the module names are not needed.
         *
         * @see #getPathType(Path)
         */
        private final Map<Path, PathType> pathTypes;
    
        /**
         * Creates an initially empty cache.
         */
    Java
    - Registered: Sun May 05 03:35:11 GMT 2024
    - Last Modified: Mon Mar 25 10:50:01 GMT 2024
    - 5.2K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/util/concurrent/AggregateFutureState.java

         */
        Set<Throwable> seenExceptionsLocal = seenExceptions;
        if (seenExceptionsLocal == null) {
          // TODO(cpovirk): Should we use a simpler (presumably cheaper) data structure?
          /*
           * Using weak references here could let us release exceptions earlier, but:
           *
           * 1. On Android, querying a WeakReference blocks if the GC is doing an otherwise-concurrent
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Thu Dec 14 20:35:03 GMT 2023
    - 8.5K bytes
    - Viewed (0)
  7. docs/kms/IAM.md

       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    - Root credentials can now be changed easily. Before, a two-step process was required to
       change the cluster root credentials since they were used to en/decrypt the IAM data.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/Collections2.java

       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
       * first permutation will be in ascending order, and the last will be in descending order.
       *
    Java
    - Registered: Fri Apr 05 12:43:09 GMT 2024
    - Last Modified: Mon Apr 01 16:15:01 GMT 2024
    - 23.1K bytes
    - Viewed (0)
  9. maven-core/src/main/java/org/apache/maven/internal/impl/PathModularizationCache.java

         *
         * @see #getModuleInfo(Path)
         */
        private final Map<Path, PathModularization> moduleInfo;
    
        /**
         * Whether JAR files are modular. This map is redundant with {@link #moduleInfo},
         * but cheaper to compute when the module names are not needed.
         *
         * @see #getPathType(Path)
         */
        private final Map<Path, PathType> pathTypes;
    
        /**
         * Creates an initially empty cache.
         */
    Java
    - Registered: Sun Mar 24 03:35:10 GMT 2024
    - Last Modified: Fri Mar 01 17:18:13 GMT 2024
    - 5.2K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md

    !!! info
        In this example we use invented custom headers `X-Key` and `X-Token`.
    
        But in real cases, when implementing security, you would get more benefits from using the integrated [Security utilities (the next chapter)](../security/index.md){.internal-link target=_blank}.
    
    ## Dependencies errors and return values
    
    You can use the same dependency *functions* you use normally.
    
    ### Dependency requirements
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Oct 17 05:59:11 GMT 2023
    - 4.1K bytes
    - Viewed (0)
Back to top