- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 566 for dashed (0.23 sec)
-
docs/de/docs/tutorial/security/oauth2-jwt.md
Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich). ## `passlib` installieren PassLib ist ein großartiges Python-Package, um Passwort-Hashes zu handhaben.
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Sat Mar 30 20:27:06 GMT 2024 - 15.1K bytes - Viewed (0) -
tests/test_response_model_data_filter_no_inheritance.py
async def read_pet(pet_id: int): user = UserDB( email="******@****.***", hashed_password="secrethashed", ) pet = PetDB(name="Nibbler", owner=user) return pet @app.get("/pets/", response_model=List[PetOut]) async def read_pets(): user = UserDB( email="******@****.***", hashed_password="secrethashed", ) pet1 = PetDB(name="Nibbler", owner=user)
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Fri Jul 07 17:12:13 GMT 2023 - 1.7K bytes - Viewed (0) -
docs/metrics/prometheus/grafana/minio-replication.json
"panels": [ { "aliasColors": { "Replication Errors": "light-red", "Replication Requests": "light-green" }, "bars": false, "dashLength": 10, "dashes": false, "datasource": { "type": "prometheus", "uid": "${DS_PROMETHEUS}" }, "fill": 1, "fillGradient": 0, "gridPos": { "h": 6, "w": 6,
Json - Registered: Sun Feb 25 19:28:16 GMT 2024 - Last Modified: Tue Feb 20 09:45:00 GMT 2024 - 61.5K bytes - Viewed (1) -
docs/debugging/hash-set/main.go
k0, k1 := binary.LittleEndian.Uint64(id[0:8]), binary.LittleEndian.Uint64(id[8:16]) sum64 := siphash.Hash(k0, k1, []byte(key)) return int(sum64 % uint64(cardinality)) } // hashOrder - hashes input key to return consistent // hashed integer slice. Returned integer order is salted // with an input key. This results in consistent order. // NOTE: collisions are fine, we are not looking for uniqueness // in the slices returned.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Sep 19 18:05:16 GMT 2022 - 3.7K bytes - Viewed (0) -
docs/en/docs/how-to/nosql-databases-couchbase.md
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Tue Jan 16 13:23:25 GMT 2024 - 6K bytes - Viewed (0) -
docs_src/sql_databases_peewee/sql_app/crud.py
def get_users(skip: int = 0, limit: int = 100): return list(models.User.select().offset(skip).limit(limit)) def create_user(user: schemas.UserCreate): fake_hashed_password = user.password + "notreallyhashed" db_user = models.User(email=user.email, hashed_password=fake_hashed_password) db_user.save() return db_user def get_items(skip: int = 0, limit: int = 100): return list(models.Item.select().offset(skip).limit(limit))
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Thu Mar 26 19:09:53 GMT 2020 - 843 bytes - Viewed (0) -
docs_src/security/tutorial003_an.py
if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"}
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 2.5K bytes - Viewed (0) -
docs_src/security/tutorial003_an_py310.py
if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"}
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 2.5K bytes - Viewed (0) -
docs_src/security/tutorial003_py310.py
if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"}
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Fri Jan 07 14:11:31 GMT 2022 - 2.4K bytes - Viewed (0) -
docs_src/security/tutorial004_py310.py
disabled: bool | None = None class UserInDB(User): hashed_password: str pwd_context = CryptContext(schemes=["bcrypt"], deprecated="auto") oauth2_scheme = OAuth2PasswordBearer(tokenUrl="token") app = FastAPI() def verify_password(plain_password, hashed_password): return pwd_context.verify(plain_password, hashed_password) def get_password_hash(password):
Python - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 4K bytes - Viewed (0)