- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 95 for Restriction (0.11 sec)
-
docs/en/docs/tutorial/body-updates.md
/// note `PATCH` is less commonly used and known than `PUT`. And many teams use only `PUT`, even for partial updates. You are **free** to use them however you want, **FastAPI** doesn't impose any restrictions. But this guide shows you, more or less, how they are intended to be used. /// ### Using Pydantic's `exclude_unset` parameter { #using-pydantics-exclude-unset-parameter }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 4.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.12.md
* Disable proxy to loopback and linklocal ([#71980](https://github.com/kubernetes/kubernetes/pull/71980), [@micahhausler](https://github.com/micahhausler)) * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Feb 06 06:04:15 UTC 2020 - 293.8K bytes - Viewed (0) -
android/guava/src/com/google/common/net/PercentEscaper.java
* directly if required. While URI escapers impose specific semantics on which characters are * considered 'safe', this class has a minimal set of restrictions. * * <p>When escaping a String, the following rules apply: * * <ul> * <li>All specified safe characters remain unchanged.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 28 01:26:26 UTC 2024 - 8.6K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/helper/ProcessHelperTest.java
// Wait a bit for the processes to start Thread.sleep(50); // Destroy all processes processHelper.destroy(); // Wait a bit for destruction to complete Thread.sleep(100); assertFalse(processHelper.isProcessRunning()); } catch (Exception e) { fail("Unexpected exception: " + e.getMessage()); }
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 12 05:35:01 UTC 2025 - 15.1K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/annotation/SecuredTest.java
} // Test annotation on constructor (should not compile, but test for completeness) static class ConstructorClass { // Note: @Secured cannot be applied to constructors due to @Target restrictions public ConstructorClass() { } } public void test_constructorCannotBeAnnotated() throws NoSuchMethodException {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 15.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
OAuth2 has the notion of "scopes". You can use them to add a specific set of permissions to a JWT token. Then you can give this token to a user directly or a third party, to interact with your API with a set of restrictions. You can learn how to use them and how they are integrated into **FastAPI** later in the **Advanced User Guide**. ## Recap { #recap }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt
want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri May 17 19:14:22 UTC 2024 - 38.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
**Detection**: Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** **Additional Details**:
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
### Detection Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** #### Additional Details
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
docs/LICENSE
receives an offer from the Licensor to exercise the Licensed Rights under the terms and conditions of this Public License. b. No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, the
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon May 10 16:50:06 UTC 2021 - 18.2K bytes - Viewed (0)