Search Options

Results per page
Sort
Preferred Languages
Advance

Results 101 - 110 of 747 for token5 (0.08 sec)

  1. cmd/jwt.go

    	xjwt "github.com/minio/minio/internal/jwt"
    	"github.com/minio/pkg/v3/policy"
    )
    
    const (
    	jwtAlgorithm = "Bearer"
    
    	// Default JWT token for web handlers is one day.
    	defaultJWTExpiry = 24 * time.Hour
    
    	// Inter-node JWT token expiry is 100 years approx.
    	defaultInterNodeJWTExpiry = 100 * 365 * 24 * time.Hour
    )
    
    var (
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jul 22 07:04:48 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  2. tests/test_security_oauth2_password_bearer_optional_description.py

    app = FastAPI()
    
    oauth2_scheme = OAuth2PasswordBearer(
        tokenUrl="/token",
        description="OAuth2PasswordBearer security scheme",
        auto_error=False,
    )
    
    
    @app.get("/items/")
    async def read_items(token: Optional[str] = Security(oauth2_scheme)):
        if token is None:
            return {"msg": "Create an account first"}
        return {"token": token}
    
    
    client = TestClient(app)
    
    
    def test_no_token():
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jun 30 18:25:16 UTC 2023
    - 2.2K bytes
    - Viewed (0)
  3. internal/config/identity/openid/jwt_test.go

    	if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil {
    		t.Error(err)
    	}
    	// Build simple token with updated expiration claim
    	token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap)
    	tokenString, err := token.SignedString(signKey)
    	if err != nil {
    		t.Error(err)
    	}
    
    	// Parse token to be sure it is valid
    	err = jwtm.ParseWithClaims(tokenString, claimsMap, func(*jwtm.MapClaims) ([]byte, error) {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  4. docs_src/security/tutorial004.py

        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username: str = payload.get("sub")
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  5. docs_src/security/tutorial004_an_py310.py

        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username: str = payload.get("sub")
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  6. internal/config/lambda/event/arn.go

    		return nil, &ErrInvalidARN{s}
    	}
    
    	tokens := strings.Split(s, ":")
    	if len(tokens) != 6 {
    		return nil, &ErrInvalidARN{s}
    	}
    
    	if tokens[4] == "" || tokens[5] == "" {
    		return nil, &ErrInvalidARN{s}
    	}
    
    	return &ARN{
    		region: tokens[3],
    		TargetID: TargetID{
    			ID:   tokens[4],
    			Name: tokens[5],
    		},
    	}, nil
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Mar 07 16:12:41 UTC 2023
    - 1.6K bytes
    - Viewed (0)
  7. tests/test_tutorial/test_security/test_tutorial005_an_py39.py

                        },
                    },
                    "Token": {
                        "title": "Token",
                        "required": ["access_token", "token_type"],
                        "type": "object",
                        "properties": {
                            "access_token": {"title": "Access Token", "type": "string"},
                            "token_type": {"title": "Token Type", "type": "string"},
                        },
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  8. docs_src/security/tutorial002_an_py39.py

    from pydantic import BaseModel
    
    app = FastAPI()
    
    oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token")
    
    
    class User(BaseModel):
        username: str
        email: Union[str, None] = None
        full_name: Union[str, None] = None
        disabled: Union[bool, None] = None
    
    
    def fake_decode_token(token):
        return User(
            username=token + "fakedecoded", email="******@****.***", full_name="John Doe"
        )
    
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Mar 18 12:29:59 UTC 2023
    - 786 bytes
    - Viewed (0)
  9. docs_src/security/tutorial003_py310.py

            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def fake_decode_token(token):
        # This doesn't provide any security at all
        # Check the next version
        user = get_user(fake_users_db, token)
        return user
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        user = fake_decode_token(token)
        if not user:
            raise HTTPException(
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jan 07 14:11:31 UTC 2022
    - 2.4K bytes
    - Viewed (0)
  10. docs_src/security/tutorial003.py

            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def fake_decode_token(token):
        # This doesn't provide any security at all
        # Check the next version
        user = get_user(fake_users_db, token)
        return user
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        user = fake_decode_token(token)
        if not user:
            raise HTTPException(
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat May 14 11:59:59 UTC 2022
    - 2.4K bytes
    - Viewed (0)
Back to top