Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 761 for complex (0.1 sec)

  1. src/test/java/org/codelibs/fess/helper/JobHelperTest.java

                // Mock implementation that doesn't require client
                entity.setLastUpdated(System.currentTimeMillis());
            }
        }
    
        // Simple mock class without complex interface requirements
        private static class MockLaCron implements LaCron {
            @Override
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 19 23:49:30 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/get-current-user.md

    But here's the key point.
    
    The security and dependency injection stuff is written once.
    
    And you can make it as complex as you want. And still, have it written only once, in a single place. With all the flexibility.
    
    But you can have thousands of endpoints (*path operations*) using the same security system.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/oauth2-jwt.md

    ## Recap { #recap }
    
    With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT.
    
    In almost any framework handling the security becomes a rather complex subject quite quickly.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  4. api/maven-api-xml/src/main/java/org/apache/maven/api/xml/XmlNode.java

        String SELF_COMBINATION_REMOVE = XmlService.SELF_COMBINATION_REMOVE;
    
        /**
         * In case of complex XML structures, combining can be done based on id.
         */
        @Deprecated(since = "4.0.0", forRemoval = true)
        String ID_COMBINATION_MODE_ATTRIBUTE = XmlService.ID_COMBINATION_MODE_ATTRIBUTE;
    
        /**
         * In case of complex XML structures, combining can be done based on keys.
         * This is a comma separated list of attribute names.
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Sat Jul 19 11:09:56 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  5. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  6. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

            ASN1EncodableVector authDataVector = new ASN1EncodableVector();
            ASN1EncodableVector authElementVector = new ASN1EncodableVector();
            // Use an auth type that doesn't require complex parsing (e.g., 999 - unknown type)
            authElementVector.add(new DERTaggedObject(0, new ASN1Integer(999))); // ad-type
            authElementVector.add(new DERTaggedObject(1, new DEROctetString(new byte[] { 1, 2, 3, 4 })));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  7. compat/maven-compat/src/main/java/org/apache/maven/artifact/resolver/ArtifactResolutionResult.java

     *   <li>network/transfer errors</li>
     *   <li>file system errors: permissions</li>
     * </ul>
     *
     * TODO carlos: all these possible has*Exceptions and get*Exceptions methods make the clients too
     *       complex requiring a long list of checks, need to create a parent/interface/encapsulation
     *       for the types of exceptions
     */
    @Deprecated
    public class ArtifactResolutionResult {
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 10K bytes
    - Viewed (0)
  8. SECURITY.md

        violates the use cases and security assumptions defined in the threat model.
        This will help us evaluate your report quickly, especially if the issue is
        complex.
      - Whether this vulnerability is public or known to third parties. If it is,
        please provide details.
    
    We will try to fix the problems as soon as possible. Vulnerabilities will, in
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  9. src/test/java/org/codelibs/fess/helper/DataIndexHelperTest.java

            } catch (Exception e) {
                // Expected
            }
            long duration = System.currentTimeMillis() - startTime;
    
            // Test should complete in under 1 second (much less than the original 25+ seconds)
            assertTrue("Test should complete quickly (duration: " + duration + "ms)", duration < 1000);
        }
    
        // Fast mock implementations to minimize overhead
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 12 05:35:01 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  10. futures/listenablefuture1/src/com/google/common/util/concurrent/ListenableFuture.java

       * The listener will run when the {@code Future}'s computation is {@linkplain Future#isDone()
       * complete} or, if the computation is already complete, immediately.
       *
       * <p>There is no guaranteed ordering of execution of listeners, but any listener added through
       * this method is guaranteed to be called once the computation is complete.
       *
       * <p>Exceptions thrown by a listener will be propagated up to the executor. Any exception thrown
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 8K bytes
    - Viewed (0)
Back to top