- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of over 10,000 for usen (0.02 seconds)
-
docs/en/docs/alternatives.md
/// check | Inspired **FastAPI** to Adopt and use an open standard for API specifications, instead of a custom schema. And integrate standards-based user interface tools: * [Swagger UI](https://github.com/swagger-api/swagger-ui) * [ReDoc](https://github.com/Rebilly/ReDoc)
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 22.2K bytes - Click Count (0) -
LICENSE
case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Mon Jan 18 20:25:38 GMT 2016 - 25.8K bytes - Click Count (0) -
apache-maven/src/assembly/maven/conf/settings.xml
<!-- | This is the configuration file for Maven. It can be specified at two levels: | | 1. User Level. This settings.xml file provides configuration for a single user, | and is normally provided in ${user.home}/.m2/settings.xml. | | NOTE: This location can be overridden with the CLI option: | | -s /path/to/user/settings.xml | | 2. Installation Level.Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Jan 22 07:44:50 GMT 2025 - 11.1K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
When one of these security schemes uses OAuth2, you can also declare and use scopes. Each "scope" is just a string (without spaces). They are normally used to declare specific security permissions, for example: * `users:read` or `users:write` are common examples. * `instagram_basic` is used by Facebook / Instagram. * `https://www.googleapis.com/auth/drive` is used by Google. /// info
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0) -
guava/src/com/google/common/collect/MapMaker.java
* * <p><b>Note:</b> by default, the returned map uses equality comparisons (the {@link Object#equals * equals} method) to determine equality for keys or values. However, if {@link #weakKeys} was * specified, the map uses identity ({@code ==}) comparisons instead for keys. Likewise, if {@link * #weakValues} was specified, the map uses identity comparisons for values. *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 12.8K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
```JSON { "detail": "Not authenticated" } ``` ### Inactive user { #inactive-user } Now try with an inactive user, authenticate with: User: `alice` Password: `secret2` And try to use the operation `GET` with the path `/users/me`. You will get an "Inactive user" error, like: ```JSON { "detail": "Inactive user" } ``` ## Recap { #recap }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
src/main/java/jcifs/smb/Kerb5Authenticator.java
} /** * Set the user name which is used to setup <code>GSSContext</code>. If null * is set, the default user will be used which is retrieved from the first * TGT found in <code>Subject</code> . * * @param name * the user name used to setup <code>GSSContext</code> */ public void setUser(String name) { this.user = name; } /**Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 13.2K bytes - Click Count (0) -
docs/en/docs/tutorial/security/first-steps.md
* Normally, a token is set to expire after some time. * So, the user will have to log in again at some point later. * And if the token is stolen, the risk is less. It is not like a permanent key that will work forever (in most of the cases). * The frontend stores that token temporarily somewhere.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Mar 07 09:29:03 GMT 2026 - 8.3K bytes - Click Count (0) -
docs/changelogs/changelog_2x.md
* Fix: Allow interceptors to change the request method. * Fix: Don’t use the request's `User-Agent` or `Proxy-Authorization` when connecting to an HTTPS server via an HTTP tunnel. The `Proxy-Authorization` header was being leaked to the origin server. * Fix: Digits may be used in a URL scheme. * Fix: Improve connection timeout recovery.
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 26.6K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RoutePlanner.kt
/** * Policy on choosing which connection to use for an exchange and any retries that follow. This uses * the following strategies: * * 1. If the current call already has a connection that can satisfy the request it is used. Using * the same connection for an initial exchange and its follow-ups may improve locality. * * 2. If there is a connection in the pool that can satisfy the request it is used. Note that it is
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue May 27 14:58:02 GMT 2025 - 4.2K bytes - Click Count (0)