- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 557 for passWord (0.22 sec)
-
src/test/java/org/codelibs/fess/it/admin/UserTests.java
final Map<String, Object> requestBody = new HashMap<>(); final String keyProp = NAME_PREFIX + id; requestBody.put(KEY_PROPERTY, keyProp); requestBody.put("password", "password" + id); requestBody.put("confirm_password", "password" + id); return requestBody; } @Override protected Map<String, Object> getUpdateMap() { final Map<String, Object> updateMap = new HashMap<>();
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:37:57 UTC 2024 - 2.3K bytes - Viewed (0) -
samples/static-server/src/main/java/okhttp3/sample/SampleServer.java
if (args.length != 4) { System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>"); return; } String keystoreFile = args[0]; String password = args[1]; String root = args[2]; int port = Integer.parseInt(args[3]); SSLContext sslContext = sslContext(keystoreFile, password); SampleServer server = new SampleServer(sslContext, root, port); server.run();
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Wed Jan 02 02:50:44 UTC 2019 - 4.7K bytes - Viewed (0) -
docs/sts/dex.md
"arn:aws:s3:::*" ] } ] } ``` ### Visit <http://localhost:8080> You will be redirected to dex login screen - click "Login with email", enter username password > username: ******@****.*** > password: password and then click "Grant access" On the browser now you shall see the list of buckets output, along with your temporary credentials obtained from MinIO. ``` { "buckets": [
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 21 06:38:06 UTC 2023 - 3.8K bytes - Viewed (0) -
docs/em/docs/tutorial/extra-models.md
UserInDB(**user_dict) ``` 🔜 🏁 🕳 🌓: ```Python UserInDB( username="john", password="secret", email="******@****.***", full_name=None, ) ``` ⚖️ 🌅 ⚫️❔, ⚙️ `user_dict` 🔗, ⏮️ ⚫️❔ 🎚 ⚫️ 💪 ✔️ 🔮: ```Python UserInDB( username = user_dict["username"], password = user_dict["password"], email = user_dict["email"], full_name = user_dict["full_name"], ) ```
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 6.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/samr.idl
ACB_SVRTRUST = 0x00000100, /* 1 = Server trust account */ ACB_PWNOEXP = 0x00000200, /* 1 = User password does not expire */ ACB_AUTOLOCK = 0x00000400, /* 1 = Account auto locked */ ACB_ENC_TXT_PWD_ALLOWED = 0x00000800, /* 1 = Encryped text password is allowed */ ACB_SMARTCARD_REQUIRED = 0x00001000, /* 1 = Smart Card required */
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 3.1K bytes - Viewed (0) -
internal/event/target/nats_contrib_test.go
opts.Port = 14223 opts.Username = "testminio" opts.Password = "miniotest" s := natsserver.RunServer(&opts) defer s.Shutdown() clientConfig := &NATSArgs{ Enable: true, Address: xnet.Host{ Name: "localhost", Port: (xnet.Port(opts.Port)), IsPortSet: true, }, Subject: "test", Username: opts.Username, Password: opts.Password, } con, err := clientConfig.connectNats()
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 2.3K bytes - Viewed (0) -
docs/en/docs/tutorial/response-model.md
//// Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 18.1K bytes - Viewed (0) -
tests/test_filter_pydantic_sub_model/app_pv1.py
raise ValueError("name must end in A") return name async def get_model_c() -> ModelC: return ModelC(username="test-user", password="test-password") @app.get("/model/{name}", response_model=ModelA) async def get_model_a(name: str, model_c=Depends(get_model_c)):
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Jul 07 17:12:13 UTC 2023 - 784 bytes - Viewed (0) -
docs_src/security/tutorial005_py310.py
return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password): return pwd_context.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.1K bytes - Viewed (0) -
internal/config/certs.go
return tls.Certificate{}, ErrTLSUnexpectedData(nil).Msgf("The private key is not readable") } if x509.IsEncryptedPEMBlock(key) { password := env.Get(EnvCertPassword, "") if len(password) == 0 { return tls.Certificate{}, ErrTLSNoPassword(nil) } decryptedKey, decErr := x509.DecryptPEMBlock(key, []byte(password)) if decErr != nil { return tls.Certificate{}, ErrTLSWrongPassword(decErr) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 14 17:11:51 UTC 2024 - 3.8K bytes - Viewed (0)