Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 21 for permissions (0.17 sec)

  1. .github/workflows/publish.yml

    name: Publish
    
    on:
      release:
        types:
          - created
    
    jobs:
      publish:
        runs-on: ubuntu-latest
        strategy:
          matrix:
            package:
              - fastapi
              - fastapi-slim
        permissions:
          id-token: write
        steps:
          - name: Dump GitHub context
            env:
              GITHUB_CONTEXT: ${{ toJson(github) }}
            run: echo "$GITHUB_CONTEXT"
          - uses: actions/checkout@v4
    Others
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Apr 30 06:38:13 GMT 2024
    - 1K bytes
    - Viewed (0)
  2. fastapi/security/oauth2.py

        You could have custom internal logic to separate it by colon caracters (`:`) or
        similar, and get the two parts `items` and `read`. Many applications do that to
        group and organize permissions, you could do it as well in your application, just
        know that that it is application specific, it's not part of the specification.
        """
    
        def __init__(
            self,
            *,
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Apr 02 02:48:51 GMT 2024
    - 21.1K bytes
    - Viewed (1)
  3. tests/test_tutorial/test_security/test_tutorial005_an.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    def test_token_nonexistent_user():
        response = client.get(
            "/users/me",
            headers={
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 15.4K bytes
    - Viewed (0)
  4. fastapi/param_functions.py

                dependency.
    
                The term "scope" comes from the OAuth2 specification, it seems to be
                intentionaly vague and interpretable. It normally refers to permissions,
                in cases to roles.
    
                These scopes are integrated with OpenAPI (and the API docs at `/docs`).
                So they are visible in the OpenAPI specification.
                )
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:40:57 GMT 2024
    - 62.5K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/security/oauth2-jwt.md

    JWT might be used for other things apart from identifying a user and allowing them to perform operations directly on your API.
    
    For example, you could identify a "car" or a "blog post".
    
    Then you could add permissions about that entity, like "drive" (for the car) or "edit" (for the blog).
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  6. docs_src/security/tutorial005_an.py

        for scope in security_scopes.scopes:
            if scope not in token_data.scopes:
                raise HTTPException(
                    status_code=status.HTTP_401_UNAUTHORIZED,
                    detail="Not enough permissions",
                    headers={"WWW-Authenticate": authenticate_value},
                )
        return user
    
    
    async def get_current_active_user(
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 5.3K bytes
    - Viewed (0)
  7. tests/test_tutorial/test_security/test_tutorial005_py39.py

        response = client.get(
            "/users/me", headers={"Authorization": f"Bearer {access_token}"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not enough permissions"}
        assert response.headers["WWW-Authenticate"] == 'Bearer scope="me"'
    
    
    @needs_py39
    def test_token_nonexistent_user(client: TestClient):
        response = client.get(
            "/users/me",
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:07:10 GMT 2024
    - 16.3K bytes
    - Viewed (0)
  8. docs/en/docs/release-notes.md

            * This is useful, for example, to require authentication or permissions in specific group of *path operations*.
            * Different `dependencies` can be applied to different routers.
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Fri May 03 23:25:42 GMT 2024
    - 388.1K bytes
    - Viewed (1)
  9. .github/workflows/smokeshow.yml

    name: Smokeshow
    
    on:
      workflow_run:
        workflows: [Test]
        types: [completed]
    
    permissions:
      statuses: write
    
    jobs:
      smokeshow:
        if: ${{ github.event.workflow_run.conclusion == 'success' }}
        runs-on: ubuntu-latest
    
        steps:
          - name: Dump GitHub context
            env:
              GITHUB_CONTEXT: ${{ toJson(github) }}
            run: echo "$GITHUB_CONTEXT"
          - uses: actions/setup-python@v5
            with:
    Others
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 19 01:33:28 GMT 2024
    - 1.1K bytes
    - Viewed (0)
  10. docs_src/security/tutorial005_py310.py

        for scope in security_scopes.scopes:
            if scope not in token_data.scopes:
                raise HTTPException(
                    status_code=status.HTTP_401_UNAUTHORIZED,
                    detail="Not enough permissions",
                    headers={"WWW-Authenticate": authenticate_value},
                )
        return user
    
    
    async def get_current_active_user(
        current_user: User = Security(get_current_user, scopes=["me"]),
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 5.1K bytes
    - Viewed (0)
Back to top