Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 95 for Restriction (0.11 sec)

  1. docs/en/docs/tutorial/body-updates.md

    /// note
    
    `PATCH` is less commonly used and known than `PUT`.
    
    And many teams use only `PUT`, even for partial updates.
    
    You are **free** to use them however you want, **FastAPI** doesn't impose any restrictions.
    
    But this guide shows you, more or less, how they are intended to be used.
    
    ///
    
    ### Using Pydantic's `exclude_unset` parameter { #using-pydantics-exclude-unset-parameter }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.7K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.12.md

    * Disable proxy to loopback and linklocal ([#71980](https://github.com/kubernetes/kubernetes/pull/71980), [@micahhausler](https://github.com/micahhausler))
    * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 293.8K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/net/PercentEscaper.java

     * directly if required. While URI escapers impose specific semantics on which characters are
     * considered 'safe', this class has a minimal set of restrictions.
     *
     * <p>When escaping a String, the following rules apply:
     *
     * <ul>
     *   <li>All specified safe characters remain unchanged.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 28 01:26:26 UTC 2024
    - 8.6K bytes
    - Viewed (0)
  4. src/test/java/org/codelibs/fess/helper/ProcessHelperTest.java

                // Wait a bit for the processes to start
                Thread.sleep(50);
    
                // Destroy all processes
                processHelper.destroy();
    
                // Wait a bit for destruction to complete
                Thread.sleep(100);
    
                assertFalse(processHelper.isProcessRunning());
            } catch (Exception e) {
                fail("Unexpected exception: " + e.getMessage());
            }
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 12 05:35:01 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  5. src/test/java/org/codelibs/fess/annotation/SecuredTest.java

        }
    
        // Test annotation on constructor (should not compile, but test for completeness)
        static class ConstructorClass {
            // Note: @Secured cannot be applied to constructors due to @Target restrictions
            public ConstructorClass() {
            }
        }
    
        public void test_constructorCannotBeAnnotated() throws NoSuchMethodException {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 15.2K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    OAuth2 has the notion of "scopes".
    
    You can use them to add a specific set of permissions to a JWT token.
    
    Then you can give this token to a user directly or a third party, to interact with your API with a set of restrictions.
    
    You can learn how to use them and how they are integrated into **FastAPI** later in the **Advanced User Guide**.
    
    ## Recap { #recap }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  7. apache-maven/src/main/appended-resources/licenses/CDDL+GPLv2-with-classpath-exception.txt

    want it, that you can change the software or use pieces of it in new
    free programs; and that you know you can do these things.
    
    To protect your rights, we need to make restrictions that forbid anyone
    to deny you these rights or to ask you to surrender the rights. These
    restrictions translate to certain responsibilities for you if you
    distribute copies of the software, or if you modify it.
    
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri May 17 19:14:22 UTC 2024
    - 38.5K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.23.md

    **Detection**:
    
    Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as.
    
    If you find evidence that this vulnerability has been exploited, please contact ******@****.***
    
    **Additional Details**:
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
  9. CHANGELOG/CHANGELOG-1.22.md

    ### Detection
    
    Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as.
    
    If you find evidence that this vulnerability has been exploited, please contact ******@****.***
    
    #### Additional Details
    
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  10. docs/LICENSE

                   receives an offer from the Licensor to exercise the
                   Licensed Rights under the terms and conditions of this
                   Public License.
    
                b. No downstream restrictions. You may not offer or impose
                   any additional or different terms or conditions on, or
                   apply any Effective Technological Measures to, the
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 10 16:50:06 UTC 2021
    - 18.2K bytes
    - Viewed (0)
Back to top