- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 799 for token (0.01 sec)
-
docs_src/security/tutorial001_py39.py
from fastapi import Depends, FastAPI from fastapi.security import OAuth2PasswordBearer app = FastAPI() oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") @app.get("/items/") async def read_items(token: str = Depends(oauth2_scheme)):
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 269 bytes - Viewed (0) -
tests/test_security_oauth2_authorization_code_bearer_description.py
app = FastAPI() oauth2_scheme = OAuth2AuthorizationCodeBearer( authorizationUrl="authorize", tokenUrl="token", description="OAuth2 Code Bearer", auto_error=True, ) @app.get("/items/") async def read_items(token: Optional[str] = Security(oauth2_scheme)): return {"token": token} client = TestClient(app) def test_no_token(): response = client.get("/items")
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Fri Jun 30 18:25:16 UTC 2023 - 2.4K bytes - Viewed (0) -
docs_src/security/tutorial002_py39.py
from pydantic import BaseModel app = FastAPI() oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") class User(BaseModel): username: str email: Union[str, None] = None full_name: Union[str, None] = None disabled: Union[bool, None] = None def fake_decode_token(token): return User( username=token + "fakedecoded", email="******@****.***", full_name="John Doe" )
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 755 bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
/// ## Return the token { #return-the-token } The response of the `token` endpoint must be a JSON object. It should have a `token_type`. In our case, as we are using "Bearer" tokens, the token type should be "`bearer`". And it should have an `access_token`, with a string containing our access token.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
/// ## Devolver el token { #return-the-token } El response del endpoint `token` debe ser un objeto JSON. Debe tener un `token_type`. En nuestro caso, como estamos usando tokens "Bearer", el tipo de token debe ser "`bearer`". Y debe tener un `access_token`, con un string que contenga nuestro token de acceso.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 10.3K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosAuthDataTest.java
} /** * Test parsing of {@link KerberosConstants#AUTH_DATA_PAC} with an invalid token. * Expects a {@link PACDecodingException} to be thrown. */ @Test void testParseAuthDataPacWithInvalidToken() { // GIVEN an invalid token for AUTH_DATA_PAC byte[] invalidToken = "invalid-pac-token".getBytes(); // WHEN parsing the auth data // THEN a PACDecodingException should be thrownRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 2.7K bytes - Viewed (0) -
docs_src/security/tutorial004_an_py39.py
return encoded_jwt async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub")
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 4.2K bytes - Viewed (0) -
src/main/java/jcifs/pac/kerberos/KerberosPacAuthData.java
/** * Constructs KerberosPacAuthData from token bytes. * * @param token the PAC token bytes * @param keys map of Kerberos keys indexed by key type * @throws PACDecodingException if PAC decoding fails */ public KerberosPacAuthData(byte[] token, Map<Integer, KerberosKey> keys) throws PACDecodingException { this.pac = new Pac(token, keys); } /** * Returns the PAC object.Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 1.6K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py310.py
): if current_user.disabled: raise HTTPException(status_code=400, detail="Inactive user") return current_user @app.post("/token") async def login_for_access_token( form_data: Annotated[OAuth2PasswordRequestForm, Depends()], ) -> Token: user = authenticate_user(fake_users_db, form_data.username, form_data.password) if not user:Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 5.3K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py39.py
): if current_user.disabled: raise HTTPException(status_code=400, detail="Inactive user") return current_user @app.post("/token") async def login_for_access_token( form_data: Annotated[OAuth2PasswordRequestForm, Depends()], ) -> Token: user = authenticate_user(fake_users_db, form_data.username, form_data.password) if not user:Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 5.3K bytes - Viewed (0)