Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 804 for zoeken (0.14 sec)

  1. src/cmd/asm/internal/lex/lex.go

    	// Text returns the original string representation of the token.
    	Text() string
    	// File reports the source file name of the token.
    	File() string
    	// Base reports the position base of the token.
    	Base() *src.PosBase
    	// SetBase sets the position base.
    	SetBase(*src.PosBase)
    	// Line reports the source line number of the token.
    	Line() int
    	// Col reports the source column number of the token.
    	Col() int
    Go
    - Registered: Tue Apr 30 11:13:12 GMT 2024
    - Last Modified: Tue Aug 29 18:31:05 GMT 2023
    - 4.1K bytes
    - Viewed (0)
  2. docs_src/security/tutorial004.py

                headers={"WWW-Authenticate": "Bearer"},
            )
        access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)
        access_token = create_access_token(
            data={"sub": user.username}, expires_delta=access_token_expires
        )
        return Token(access_token=access_token, token_type="bearer")
    
    
    @app.get("/users/me/", response_model=User)
    async def read_users_me(current_user: User = Depends(get_current_active_user)):
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 4K bytes
    - Viewed (0)
  3. docs_src/security/tutorial004_an.py

                headers={"WWW-Authenticate": "Bearer"},
            )
        access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)
        access_token = create_access_token(
            data={"sub": user.username}, expires_delta=access_token_expires
        )
        return Token(access_token=access_token, token_type="bearer")
    
    
    @app.get("/users/me/", response_model=User)
    async def read_users_me(
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 4.1K bytes
    - Viewed (0)
  4. docs_src/dependencies/tutorial006_an.py

    from fastapi import Depends, FastAPI, Header, HTTPException
    from typing_extensions import Annotated
    
    app = FastAPI()
    
    
    async def verify_token(x_token: Annotated[str, Header()]):
        if x_token != "fake-super-secret-token":
            raise HTTPException(status_code=400, detail="X-Token header invalid")
    
    
    async def verify_key(x_key: Annotated[str, Header()]):
        if x_key != "fake-super-secret-key":
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Sat Mar 18 12:29:59 GMT 2023
    - 643 bytes
    - Viewed (0)
  5. internal/config/identity/openid/jwt_test.go

    	if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil {
    		t.Error(err)
    	}
    	// Build simple token with updated expiration claim
    	token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap)
    	tokenString, err := token.SignedString(signKey)
    	if err != nil {
    		t.Error(err)
    	}
    
    	// Parse token to be sure it is valid
    	err = jwtm.ParseWithClaims(tokenString, claimsMap, func(*jwtm.MapClaims) ([]byte, error) {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 8.3K bytes
    - Viewed (0)
  6. cmd/auth-handler.go

    	token := getSessionToken(r)
    	if token != "" && cred.AccessKey == "" {
    		// x-amz-security-token is not allowed for anonymous access.
    		return nil, ErrNoAccessKey
    	}
    
    	if token == "" && cred.IsTemp() && !cred.IsServiceAccount() {
    		// Temporary credentials should always have x-amz-security-token
    		return nil, ErrInvalidToken
    	}
    
    	if token != "" && !cred.IsTemp() {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
  7. docs/sts/wso2.md

      "token_type": "Bearer",
      "expires_in": 3600
    }
    ```
    
    ### 4. JWT Claims
    
    The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.7K bytes
    - Viewed (0)
  8. docs_src/websockets/tutorial002_an_py310.py

            <script>
            var ws = null;
                function connect(event) {
                    var itemId = document.getElementById("itemId")
                    var token = document.getElementById("token")
                    ws = new WebSocket("ws://localhost:8000/items/" + itemId.value + "/ws?token=" + token.value);
                    ws.onmessage = function(event) {
                        var messages = document.getElementById('messages')
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Sat Mar 18 12:29:59 GMT 2023
    - 2.8K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/oauth2-jwt.md

    But it's signed. So, when you receive a token that you emitted, you can verify that you actually emitted it.
    
    That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  10. src/cmd/asm/internal/lex/input.go

    	// end of the token. It's where you are now, and you just read this token.
    	if tok == '(' && in.Stack.Col() == prevCol+1 {
    		// Macro has arguments. Scan list of formals.
    		acceptArg := true
    		args = []string{} // Zero length but not nil.
    	Loop:
    		for {
    			tok = in.Stack.Next()
    			switch tok {
    			case ')':
    				tok = in.Stack.Next() // First token of macro definition.
    				break Loop
    Go
    - Registered: Tue Apr 30 11:13:12 GMT 2024
    - Last Modified: Tue Aug 29 07:48:38 GMT 2023
    - 12.6K bytes
    - Viewed (0)
Back to top