- Sort Score
- Num 10 results
- Language All
Results 71 - 80 of 130 for beraber (0.03 seconds)
-
tests/test_security_oauth2_authorization_code_bearer.py
assert response.status_code == 401, response.text assert response.json() == {"detail": "Not authenticated"} def test_token(): response = client.get("/items", headers={"Authorization": "Bearer testtoken"}) assert response.status_code == 200, response.text assert response.json() == {"token": "testtoken"} def test_openapi_schema(): response = client.get("/openapi.json")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Fri Jun 30 18:25:16 GMT 2023 - 2.3K bytes - Click Count (0) -
tests/test_security_oauth2_authorization_code_bearer_scopes_openapi_simple.py
async def read_admin(): return {"message": "Admin Access"} client = TestClient(app) def test_read_admin(): response = client.get("/admin", headers={"Authorization": "Bearer faketoken"}) assert response.status_code == 200, response.text assert response.json() == {"message": "Admin Access"} def test_openapi_schema(): response = client.get("/openapi.json")
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 2.6K bytes - Click Count (0) -
internal/event/target/webhook.go
// <Key> <Token> like format, if this is // already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2: req.Header.Set("Authorization", target.args.AuthToken) case 1: req.Header.Set("Authorization", "Bearer "+target.args.AuthToken) } req.Header.Set("Content-Type", "application/json")
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Sep 06 23:06:30 GMT 2024 - 8.8K bytes - Click Count (0) -
cmd/batch-replicate_test.go
value: "image/*" # match objects with 'content-type', with all values starting with 'image/' # notify: # endpoint: "https://notify.endpoint" # notification endpoint to receive job status events # token: "Bearer xxxxx" # optional authentication token for the notification endpoint # # retry: # attempts: 10 # number of retries for the job before giving up # delay: "500ms" # least amount of delay between each retry `
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 01 12:53:30 GMT 2024 - 7.9K bytes - Click Count (0) -
internal/event/target/kafka.go
} return target, nil } func isKafkaConnErr(err error) bool { // Sarama opens the circuit breaker after 3 consecutive connection failures. return err == sarama.ErrLeaderNotAvailable || err.Error() == "circuit breaker is open"
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Sep 06 23:06:30 GMT 2024 - 13.6K bytes - Click Count (0) -
fastapi/security/open_id_connect_url.py
def make_not_authenticated_error(self) -> HTTPException: return HTTPException( status_code=HTTP_401_UNAUTHORIZED, detail="Not authenticated", headers={"WWW-Authenticate": "Bearer"}, ) async def __call__(self, request: Request) -> Optional[str]: authorization = request.headers.get("Authorization") if not authorization: if self.auto_error:Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 3.1K bytes - Click Count (0) -
docs/sts/wso2.md
"token_type": "Bearer", "expires_in": 3600 } ``` ### 4. JWT Claims The id_token received is a signed JSON Web Token (JWT). Use a JWT decoder to decode the id_token to access the payload of the token that includes following JWT claims:
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.7K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
# OAuth2 com Senha (e hashing), Bearer com tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras. Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc. Vamos começar de onde paramos no capítulo anterior e incrementá-lo.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 11.4K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/index.md
OpenAPI 有一种定义多个安全「方案」的方法。 通过使用它们,你可以利用所有这些基于标准的工具,包括这些交互式文档系统。 OpenAPI 定义了以下安全方案: * `apiKey`:一个特定于应用程序的密钥,可以来自: * 查询参数。 * 请求头。 * cookie。 * `http`:标准的 HTTP 身份认证系统,包括: * `bearer`: 一个值为 `Bearer` 加令牌字符串的 `Authorization` 请求头。这是从 OAuth2 继承的。 * HTTP Basic 认证方式。 * HTTP Digest,等等。 * `oauth2`:所有的 OAuth2 处理安全性的方式(称为「流程」)。 *以下几种流程适合构建 OAuth 2.0 身份认证的提供者(例如 Google,Facebook,X (Twitter),GitHub 等):Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 10:49:48 GMT 2025 - 4.2K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
# OAuth2 with Password (and hashing), Bearer with JWT tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Now that we have all the security flow, let's make the application actually secure, using <abbr title="JSON Web Tokens">JWT</abbr> tokens and secure password hashing. This code is something you can actually use in your application, save the password hashes in your database, etc.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 10.6K bytes - Click Count (0)