- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 21 for permissions (0.17 sec)
-
.github/workflows/publish.yml
Others - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Apr 30 06:38:13 GMT 2024 - 1K bytes - Viewed (0) -
fastapi/security/oauth2.py
You could have custom internal logic to separate it by colon caracters (`:`) or similar, and get the two parts `items` and `read`. Many applications do that to group and organize permissions, you could do it as well in your application, just know that that it is application specific, it's not part of the specification. """ def __init__( self, *,
Python - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Apr 02 02:48:51 GMT 2024 - 21.1K bytes - Viewed (1) -
tests/test_tutorial/test_security/test_tutorial005_an.py
response = client.get( "/users/me", headers={"Authorization": f"Bearer {access_token}"} ) assert response.status_code == 401, response.text assert response.json() == {"detail": "Not enough permissions"} assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"' def test_token_nonexistent_user(): response = client.get( "/users/me", headers={
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Wed Mar 13 19:07:10 GMT 2024 - 15.4K bytes - Viewed (0) -
fastapi/param_functions.py
Python - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Apr 18 19:40:57 GMT 2024 - 62.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 13K bytes - Viewed (0) -
docs_src/security/tutorial005_an.py
for scope in security_scopes.scopes: if scope not in token_data.scopes: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Not enough permissions", headers={"WWW-Authenticate": authenticate_value}, ) return user async def get_current_active_user(
Python - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 5.3K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial005_py39.py
response = client.get( "/users/me", headers={"Authorization": f"Bearer {access_token}"} ) assert response.status_code == 401, response.text assert response.json() == {"detail": "Not enough permissions"} assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"' @needs_py39 def test_token_nonexistent_user(client: TestClient): response = client.get( "/users/me",
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Wed Mar 13 19:07:10 GMT 2024 - 16.3K bytes - Viewed (0) -
docs/en/docs/release-notes.md
* This is useful, for example, to require authentication or permissions in specific group of *path operations*. * Different `dependencies` can be applied to different routers.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Fri May 03 23:25:42 GMT 2024 - 388.1K bytes - Viewed (1) -
.github/workflows/smokeshow.yml
name: Smokeshow on: workflow_run: workflows: [Test] types: [completed] permissions: statuses: write jobs: smokeshow: if: ${{ github.event.workflow_run.conclusion == 'success' }} runs-on: ubuntu-latest steps: - name: Dump GitHub context env: GITHUB_CONTEXT: ${{ toJson(github) }} run: echo "$GITHUB_CONTEXT" - uses: actions/setup-python@v5 with:
Others - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Mar 19 01:33:28 GMT 2024 - 1.1K bytes - Viewed (0) -
docs_src/security/tutorial005_py310.py
for scope in security_scopes.scopes: if scope not in token_data.scopes: raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Not enough permissions", headers={"WWW-Authenticate": authenticate_value}, ) return user async def get_current_active_user( current_user: User = Security(get_current_user, scopes=["me"]),
Python - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 5.1K bytes - Viewed (0)