- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 157 for Complex (0.04 sec)
-
src/test/java/org/codelibs/fess/helper/JobHelperTest.java
// Mock implementation that doesn't require client entity.setLastUpdated(System.currentTimeMillis()); } } // Simple mock class without complex interface requirements private static class MockLaCron implements LaCron { @Override
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 19 23:49:30 UTC 2025 - 6.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/get-current-user.md
But here's the key point. The security and dependency injection stuff is written once. And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility. But you can have thousands of endpoints (*path operations*) using the same security system.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 4K bytes - Viewed (0) -
api/maven-api-xml/src/main/java/org/apache/maven/api/xml/XmlNode.java
String SELF_COMBINATION_REMOVE = XmlService.SELF_COMBINATION_REMOVE; /** * In case of complex XML structures, combining can be done based on id. */ @Deprecated(since = "4.0.0", forRemoval = true) String ID_COMBINATION_MODE_ATTRIBUTE = XmlService.ID_COMBINATION_MODE_ATTRIBUTE; /** * In case of complex XML structures, combining can be done based on keys. * This is a comma separated list of attribute names.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Sat Jul 19 11:09:56 UTC 2025 - 18.2K bytes - Viewed (0) -
doc/go_mem.html
do exactly this. </p> <p> A read of an array, struct, or complex number may be implemented as a read of each individual sub-value (array element, struct field, or real/imaginary component), in any order. Similarly, a write of an array, struct, or complex number may be implemented as a write of each individual sub-value, in any order. </p> <p>
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 05 15:41:37 UTC 2025 - 26.6K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
ASN1EncodableVector authDataVector = new ASN1EncodableVector(); ASN1EncodableVector authElementVector = new ASN1EncodableVector(); // Use an auth type that doesn't require complex parsing (e.g., 999 - unknown type) authElementVector.add(new DERTaggedObject(0, new ASN1Integer(999))); // ad-type authElementVector.add(new DERTaggedObject(1, new DEROctetString(new byte[] { 1, 2, 3, 4 })));
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 13.5K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/entity/QueryContextTest.java
assertEquals("custom_field", queryContext.getDefaultField()); queryContext.setDefaultField(null); assertNull(queryContext.getDefaultField()); } // Test complex scenario with multiple operations public void test_complexScenario() { getMockRequest().setAttribute(Constants.FIELD_LOGS, new HashMap<String, List<String>>());
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 17.4K bytes - Viewed (0) -
SECURITY.md
violates the use cases and security assumptions defined in the threat model. This will help us evaluate your report quickly, especially if the issue is complex. - Whether this vulnerability is public or known to third parties. If it is, please provide details. We will try to fix the problems as soon as possible. Vulnerabilities will, in
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/artifact/resolver/ArtifactResolutionResult.java
* <li>network/transfer errors</li> * <li>file system errors: permissions</li> * </ul> * * TODO carlos: all these possible has*Exceptions and get*Exceptions methods make the clients too * complex requiring a long list of checks, need to create a parent/interface/encapsulation * for the types of exceptions */ @Deprecated public class ArtifactResolutionResult {
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Jun 06 14:28:57 UTC 2025 - 10K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/entity/DataStoreParamsTest.java
assertNotNull(dataStoreParams.get("camelCaseKey")); dataStoreParams.put("snake_case_key", "value2"); assertNotNull(dataStoreParams.get("snake_case_key")); } // Test with complex object values public void test_complexObjectValues() { Map<String, String> complexObject = new HashMap<>(); complexObject.put("nested", "value");
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 10.5K bytes - Viewed (0)