Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 24 for permissions (0.19 sec)

  1. docs/en/docs/how-to/conditional-openapi.md

    * Make sure you have well defined Pydantic models for your request bodies and responses.
    * Configure any required permissions and roles using dependencies.
    * Never store plaintext passwords, only password hashes.
    * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc.
    * Add more granular permission controls with OAuth2 scopes where needed.
    * ...etc.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sat Aug 19 19:54:04 GMT 2023
    - 2.3K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/oauth2-jwt.md

    JWT might be used for other things apart from identifying a user and allowing them to perform operations directly on your API.
    
    For example, you could identify a "car" or a "blog post".
    
    Then you could add permissions about that entity, like "drive" (for the car) or "edit" (for the blog).
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  3. docs_src/security/tutorial005_an.py

        for scope in security_scopes.scopes:
            if scope not in token_data.scopes:
                raise HTTPException(
                    status_code=status.HTTP_401_UNAUTHORIZED,
                    detail="Not enough permissions",
                    headers={"WWW-Authenticate": authenticate_value},
                )
        return user
    
    
    async def get_current_active_user(
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 5.3K bytes
    - Viewed (0)
  4. tests/test_tutorial/test_security/test_tutorial005_py39.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    @needs_py39
    def test_token_nonexistent_user(client: TestClient):
        response = client.get(
            "/users/me",
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 16.3K bytes
    - Viewed (0)
  5. LICENSE

    The MIT License (MIT)
    
    Copyright (c) 2018 Sebastián Ramírez
    
    Permission is hereby granted, free of charge, to any person obtaining a copy
    of this software and associated documentation files (the "Software"), to deal
    in the Software without restriction, including without limitation the rights
    to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
    copies of the Software, and to permit persons to whom the Software is
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sat Dec 08 07:57:18 GMT 2018
    - 1.1K bytes
    - Viewed (0)
  6. docs/en/docs/release-notes.md

            * This is useful, for example, to require authentication or permissions in specific group of *path operations*.
            * Different `dependencies` can be applied to different routers.
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Sun Apr 28 00:28:00 GMT 2024
    - 385.5K bytes
    - Viewed (1)
  7. tests/test_tutorial/test_security/test_tutorial005_an_py39.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    @needs_py39
    def test_token_nonexistent_user(client: TestClient):
        response = client.get(
            "/users/me",
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 16.3K bytes
    - Viewed (0)
  8. tests/test_tutorial/test_security/test_tutorial005_py310.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    @needs_py310
    def test_token_nonexistent_user(client: TestClient):
        response = client.get(
            "/users/me",
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 16.3K bytes
    - Viewed (0)
  9. fastapi/security/oauth2.py

        You could have custom internal logic to separate it by colon caracters (`:`) or
        similar, and get the two parts `items` and `read`. Many applications do that to
        group and organize permissions, you could do it as well in your application, just
        know that that it is application specific, it's not part of the specification.
        """
    
        def __init__(
            self,
            *,
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Tue Apr 02 02:48:51 GMT 2024
    - 21.1K bytes
    - Viewed (1)
  10. tests/test_tutorial/test_security/test_tutorial005_an.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    def test_token_nonexistent_user():
        response = client.get(
            "/users/me",
            headers={
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 15.4K bytes
    - Viewed (0)
Back to top