Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 98 for danger (0.05 sec)

  1. docs/en/docs/how-to/custom-request-and-route.md

    In particular, this may be a good alternative to logic in a middleware.
    
    For example, if you want to read or manipulate the request body before it is processed by your application.
    
    /// danger
    
    This is an "advanced" feature.
    
    If you are just starting with **FastAPI** you might want to skip this section.
    
    ///
    
    ## Use cases { #use-cases }
    
    Some use cases include:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.6K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/extra-models.md

    * The **input model** needs to be able to have a password.
    * The **output model** should not have a password.
    * The **database model** would probably need to have a hashed password.
    
    /// danger
    
    Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  3. docs/en/mkdocs.yml

          class: mermaid
          format: !!python/name:pymdownx.superfences.fence_code_format ''
      pymdownx.tilde: null
      pymdownx.blocks.admonition:
        types:
        - note
        - attention
        - caution
        - danger
        - error
        - tip
        - hint
        - warning
        - info
        - check
      pymdownx.blocks.details: null
      pymdownx.blocks.tab:
        alternate_style: true
      mdx_include: null
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 9.8K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/response-model.md

    In this case, it might not be a problem, because it's the same user sending the password.
    
    But if we use the same model for another *path operation*, we could be sending our user's passwords to every client.
    
    /// danger
    
    Never store the plain password of a user or send it in a response like this, unless you know all the caveats and you know what you are doing.
    
    ///
    
    ## Add an output model { #add-an-output-model }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 16K bytes
    - Viewed (0)
  5. okhttp/src/jvmTest/kotlin/okhttp3/CacheTest.kt

        val response2 = get(server.url("/"))
        assertThat(response2.body.string()).isEqualTo("A")
        assertThat(response2.header("Warning")).isNull()
      }
    
      @Test
      fun getHeadersRetainsCached200LevelWarnings() {
        server.enqueue(
          MockResponse
            .Builder()
            .addHeader("Warning: 299 test danger")
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sat Aug 16 09:39:51 UTC 2025
    - 113.6K bytes
    - Viewed (0)
  6. docs/ko/docs/tutorial/extra-models.md

    # 추가 모델
    
    지난 예제에 이어서, 연관된 모델을 여러개 갖는 것은 흔한 일입니다.
    
    특히 사용자 모델의 경우에 그러한데, 왜냐하면:
    
    * **입력 모델** 은 비밀번호를 가져야 합니다.
    * **출력 모델** 은 비밀번호를 가지면 안됩니다.
    * **데이터베이스 모델** 은 해시처리된 비밀번호를 가질 것입니다.
    
    /// danger | 위험
    
    절대 사용자의 비밀번호를 평문으로 저장하지 마세요. 항상 이후에 검증 가능한 "안전한 해시(secure hash)"로 저장하세요.
    
    만약 이게 무엇인지 모르겠다면, [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.에서 비밀번호 해시에 대해 배울 수 있습니다.
    
    ///
    
    ## 다중 모델
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Fri May 30 13:38:33 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  7. docs/en/docs/advanced/security/oauth2-scopes.md

    We are still using the same `OAuth2PasswordRequestForm`. It includes a property `scopes` with a `list` of `str`, with each scope it received in the request.
    
    And we return the scopes as part of the JWT token.
    
    /// danger
    
    For simplicity, here we are just adding the scopes received directly to the token.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  8. docs/de/docs/advanced/security/oauth2-scopes.md

    Und wir geben die Scopes als Teil des JWT-Tokens zurück.
    
    /// danger | Gefahr
    
    Der Einfachheit halber fügen wir hier die empfangenen Scopes direkt zum Token hinzu.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  9. docs/em/docs/advanced/security/oauth2-scopes.md

    ## 🥙 🤝 ⏮️ ↔
    
    🔜, 🔀 🤝 *➡ 🛠️* 📨 ↔ 📨.
    
    👥 ⚙️ 🎏 `OAuth2PasswordRequestForm`. ⚫️ 🔌 🏠 `scopes` ⏮️ `list` `str`, ⏮️ 🔠 ↔ ⚫️ 📨 📨.
    
    & 👥 📨 ↔ 🍕 🥙 🤝.
    
    /// danger
    
    🦁, 📥 👥 ❎ ↔ 📨 🔗 🤝.
    
    ✋️ 👆 🈸, 💂‍♂, 👆 🔜 ⚒ 💭 👆 🕴 🚮 ↔ 👈 👩‍💻 🤙 💪 ✔️, ⚖️ 🕐 👆 ✔️ 🔁.
    
    ///
    
    {* ../../docs_src/security/tutorial005.py hl[156] *}
    
    ## 📣 ↔ *➡ 🛠️* & 🔗
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:03:10 UTC 2025
    - 10.8K bytes
    - Viewed (0)
  10. docs/pt/docs/advanced/security/oauth2-scopes.md

    E nós retornamos os escopos como parte do token JWT.
    
    /// danger | Cuidado
    
    Para manter as coisas simples, aqui nós estamos apenas adicionando os escopos recebidos diretamente ao token.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 14.5K bytes
    - Viewed (0)
Back to top