- Sort Score
- Num 10 results
- Language All
Results 61 - 70 of 991 for Bearer (0.03 seconds)
-
internal/event/target/webhook.go
// already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2: req.Header.Set("Authorization", target.args.AuthToken) case 1: req.Header.Set("Authorization", "Bearer "+target.args.AuthToken) } req.Header.Set("Content-Type", "application/json") resp, err := target.httpClient.Do(req)
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Sep 06 23:06:30 GMT 2024 - 8.8K bytes - Click Count (0) -
tests/test_security_oauth2_password_bearer_optional_description.py
assert response.status_code == 200, response.text assert response.json() == {"msg": "Create an account first"} def test_token(): response = client.get("/items", headers={"Authorization": "Bearer testtoken"}) assert response.status_code == 200, response.text assert response.json() == {"token": "testtoken"} def test_incorrect_token():Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Fri Jun 30 18:25:16 GMT 2023 - 2.2K bytes - Click Count (0) -
fastapi/security/open_id_connect_url.py
Doc( """ By default, if no HTTP Authorization header is provided, required for OpenID Connect authentication, it will automatically cancel the request and send the client an error. If `auto_error` is set to `False`, when the HTTP Authorization header is not available, instead of erroring out, the dependency result will
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 3.1K bytes - Click Count (0) -
cmd/batch-expire_test.go
# retainVersions: 5 # keep the latest 5 versions of the object including delete markers. notify: endpoint: https://notify.endpoint # notification endpoint to receive job completion status token: Bearer xxxxx # optional authentication token for the notification endpoint retry: attempts: 10 # number of retries for the job before giving up delay: 500ms # least amount of delay between each retry `Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 01 12:53:30 GMT 2024 - 5.5K bytes - Click Count (0) -
tests/test_security_oauth2_authorization_code_bearer.py
assert response.status_code == 401, response.text assert response.json() == {"detail": "Not authenticated"} def test_token(): response = client.get("/items", headers={"Authorization": "Bearer testtoken"}) assert response.status_code == 200, response.text assert response.json() == {"token": "testtoken"} def test_openapi_schema(): response = client.get("/openapi.json")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Fri Jun 30 18:25:16 GMT 2023 - 2.3K bytes - Click Count (0) -
docs/ru/docs/tutorial/security/oauth2-jwt.md
# OAuth2 с паролем (и хешированием), Bearer с JWT-токенами { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Теперь, когда у нас определен процесс обеспечения безопасности, давайте сделаем приложение действительно безопасным, используя токены <abbr title="JSON Web Tokens – веб‑токены JSON">JWT</abbr> и безопасное хеширование паролей. Этот код можно реально использовать в своем приложении, сохранять хэши паролей в базе данных и т.д.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Sep 30 11:24:39 GMT 2025 - 19.1K bytes - Click Count (0) -
tests/test_security_oauth2_authorization_code_bearer_scopes_openapi_simple.py
async def read_admin(): return {"message": "Admin Access"} client = TestClient(app) def test_read_admin(): response = client.get("/admin", headers={"Authorization": "Bearer faketoken"}) assert response.status_code == 200, response.text assert response.json() == {"message": "Admin Access"} def test_openapi_schema(): response = client.get("/openapi.json")
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 2.6K bytes - Click Count (0) -
cmd/batch-replicate_test.go
value: "image/*" # match objects with 'content-type', with all values starting with 'image/' # notify: # endpoint: "https://notify.endpoint" # notification endpoint to receive job status events # token: "Bearer xxxxx" # optional authentication token for the notification endpoint # # retry: # attempts: 10 # number of retries for the job before giving up # delay: "500ms" # least amount of delay between each retry `
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 01 12:53:30 GMT 2024 - 7.9K bytes - Click Count (0) -
docs/sts/wso2.md
"token_type": "Bearer", "expires_in": 3600 } ``` ### 4. JWT Claims The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.7K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
# OAuth2 com Senha (e hashing), Bearer com tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras. Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc. Vamos começar de onde paramos no capítulo anterior e incrementá-lo.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 11.4K bytes - Click Count (0)