Search Options

Results per page
Sort
Preferred Languages
Advance

Results 311 - 320 of 427 for credential (0.13 sec)

  1. cni/pkg/install/install.go

    // If the configuration is invalid, a full redeployal of config, binaries, and svcAcct credentials to the
    // shared node CNI dir will be attempted.
    //
    // If changes occurred but the config is still valid, only the binaries and (optionally) svcAcct credentials
    // will be redeployed.
    func (in *Installer) Run(ctx context.Context) error {
    	installedBins, err := in.installAll(ctx)
    	if err != nil {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Aug 09 21:33:51 UTC 2024
    - 13.5K bytes
    - Viewed (0)
  2. docs_src/security/tutorial004_an.py

    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username: str = payload.get("sub")
            if username is None:
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  3. cmd/kms-handlers_test.go

    				t.Errorf("want status code %d, got %d", http.StatusNotImplemented, rec.Code)
    			}
    		})
    	}
    
    	// Test when the GlobalKMS is configured but the credentials are invalid
    	GlobalKMS = kms.NewStub("default-test-key")
    	for _, test := range tests {
    		t.Run(test.name+" invalid credentials", func(t *testing.T) {
    			req := buildKMSRequest(t, test.method, test.path, userAccessKey, userSecretKey, test.query)
    			rec := httptest.NewRecorder()
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 22.3K bytes
    - Viewed (0)
  4. docs_src/security/tutorial004_py310.py

        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username: str = payload.get("sub")
            if username is None:
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4K bytes
    - Viewed (0)
  5. src/test/java/jcifs/tests/SessionTest.java

    import org.junit.runners.Parameterized;
    import org.junit.runners.Parameterized.Parameters;
    import org.slf4j.Logger;
    import org.slf4j.LoggerFactory;
    
    import jcifs.CIFSContext;
    import jcifs.CIFSException;
    import jcifs.Credentials;
    import jcifs.SmbResource;
    import jcifs.SmbTransport;
    import jcifs.config.DelegatingConfiguration;
    import jcifs.smb.NtStatus;
    import jcifs.smb.NtlmNtHashAuthenticator;
    import jcifs.smb.NtlmPasswordAuthentication;
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Thu Jan 05 13:09:03 UTC 2023
    - 15.8K bytes
    - Viewed (0)
  6. SECURITY.md

    Please, provide a detailed explanation of the issue. In particular, outline the type of the security
    issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do
    you need access credentials for a successful exploit).
    
    If you have not received a reply to your email within 48 hours or you have not heard from the security team
    for the past five days please contact the security team directly:
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 2.2K bytes
    - Viewed (0)
  7. cmd/warm-backend.go

    	Remove(ctx context.Context, object string, rv remoteVersionID) error
    	InUse(ctx context.Context) (bool, error)
    }
    
    const probeObject = "probeobject"
    
    // checkWarmBackend checks if tier config credentials have sufficient privileges
    // to perform all operations defined in the WarmBackend interface.
    func checkWarmBackend(ctx context.Context, w WarmBackend) error {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 4K bytes
    - Viewed (0)
  8. internal/logger/reqinfo.go

    	VersionID    string           `json:",omitempty"` // corresponding versionID for the object
    	Objects      []ObjectVersion  `json:",omitempty"` // Only set during MultiObject delete handler.
    	Cred         auth.Credentials `json:"-"`
    	Region       string           `json:"-"`
    	Owner        bool             `json:"-"`
    	AuthType     string           `json:"-"`
    	tags         []KeyVal         // Any additional info not accommodated by above fields
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 13 22:22:04 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_security/test_tutorial003_an.py

    def test_incorrect_token():
        response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"})
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Invalid authentication credentials"}
        assert response.headers["WWW-Authenticate"] == "Bearer"
    
    
    def test_incorrect_token_type():
        response = client.get(
            "/users/me", headers={"Authorization": "Notexistent testtoken"}
        )
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jul 07 17:12:13 UTC 2023
    - 8K bytes
    - Viewed (0)
  10. docs_src/security/tutorial004.py

        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
            detail="Could not validate credentials",
            headers={"WWW-Authenticate": "Bearer"},
        )
        try:
            payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM])
            username: str = payload.get("sub")
            if username is None:
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.1K bytes
    - Viewed (0)
Back to top