- Sort Score
- Result 10 results
- Languages All
Results 801 - 810 of 919 for Sections (0.21 sec)
-
docs/security/README.md
The MinIO server requires an available KMS to en/decrypt SSE-S3 encrypted objects. Therefore it is possible to erase or lock some or all encrypted objects. For example in case of a detected attack or other emergency situations the following actions can be taken:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 13.8K bytes - Viewed (0) -
common-protos/k8s.io/api/extensions/v1beta1/generated.proto
// If this field is not specified, it will default based on the existence of Ingress or Egress rules; // policies that contain an Egress section are assumed to affect Egress, and all policies // (whether or not they contain an Ingress section) are assumed to affect Ingress. // If you want to write an egress-only policy, you must explicitly specify policyTypes [ "Egress" ].
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 45.6K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Then you could add permissions about that entity, like "drive" (for the car) or "edit" (for the blog). And then, you could give that JWT token to a user (or bot), and they could use it to perform those actions (drive the car, or edit the blog post) without even needing to have an account, just with the JWT token your API generated for that. Using these ideas, JWT can be used for way more sophisticated scenarios.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ServerMessageBlock.java
" but readBytesWireFormat returned " + n ); } } // Don't think we can rely on n being correct here. Must use byteCount. // Last paragraph of section 3.13.3 eludes to this. bufferIndex += byteCount; } length = bufferIndex - start; return length; } int writeHeaderWireFormat( byte[] dst, int dstIndex ) {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 21K bytes - Viewed (0) -
cmd/sftp-server.go
chacha20Poly1305ID, "aes128-ctr", "aes192-ctr", "aes256-ctr", } // supportedMACs specifies a default set of MAC algorithms in preference order. // This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed // because they have reached the end of their useful life. // https://cs.opensource.google/go/x/crypto/+/refs/tags/v0.22.0:ssh/common.go;l=85 var supportedMACs = []string{
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0) -
internal/rest/client.go
// return true if the string includes a port. func hasPort(s string) bool { return strings.LastIndex(s, ":") > strings.LastIndex(s, "]") } // removeEmptyPort strips the empty port in ":port" to "" // as mandated by RFC 3986 Section 6.2.3. func removeEmptyPort(host string) string { if hasPort(host) { return strings.TrimSuffix(host, ":") } return host }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 26 12:55:01 UTC 2024 - 14.7K bytes - Viewed (0) -
guava/src/com/google/common/net/InternetDomainName.java
* <li>Underscores ('_') are permitted wherever dashes ('-') are permitted. * <li>Parts other than the final part may start with a digit, as mandated by <a * href="https://tools.ietf.org/html/rfc1123#section-2">RFC 1123</a>. * </ul> * * @param domain A domain name (not IP address) * @throws IllegalArgumentException if {@code domain} is not syntactically valid according to * {@link #isValid}
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Feb 05 20:47:23 UTC 2024 - 28K bytes - Viewed (0) -
api/go1.8.txt
pkg debug/pe, type Reloc struct pkg debug/pe, type Reloc struct, SymbolTableIndex uint32 pkg debug/pe, type Reloc struct, Type uint16 pkg debug/pe, type Reloc struct, VirtualAddress uint32 pkg debug/pe, type Section struct, Relocs []Reloc pkg debug/pe, type StringTable []uint8 pkg encoding/base64, method (Encoding) Strict() *Encoding pkg encoding/json, method (RawMessage) MarshalJSON() ([]uint8, error)
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Wed Dec 21 05:25:57 UTC 2016 - 16.3K bytes - Viewed (0) -
architecture/networking/pilot.md
Along with caching, partial computations are a critical performance optimization to ensure that we do not need to build (or send) every resource to every proxy on every change. This is discussed more in the Config Serving section. ### Config Serving Config serving is the layer that actually accepts proxy clients, connected over bidirectional gRPC streams, and serve them the required configuration.
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Feb 07 17:53:24 UTC 2024 - 19.1K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
/// ## Dependencies with `yield`, `HTTPException`, `except` and Background Tasks /// warning You most probably don't need these technical details, you can skip this section and continue below. These details are useful mainly if you were using a version of FastAPI prior to 0.106.0 and used resources from dependencies with `yield` in background tasks. ///
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 14K bytes - Viewed (0)