Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 368 for fakefs (0.15 sec)

  1. docs_src/security/tutorial004_an.py

    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
        if not verify_password(password, user.hashed_password):
            return False
        return user
    
    
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 4.1K bytes
    - Viewed (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/DerWriter.kt

        // Write the tagClass, tag, and constructed bit. This takes 1 byte if tag is less than 31.
        if (tag < 31) {
          val byte0 = tagClass or constructedBit or tag.toInt()
          sink.writeByte(byte0)
        } else {
          val byte0 = tagClass or constructedBit or 0b0001_1111
          sink.writeByte(byte0)
          writeVariableLengthLong(tag)
        }
    
        // Write the length. This takes 1 byte if length is less than 128.
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Mon Jan 08 01:13:22 GMT 2024
    - 5.7K bytes
    - Viewed (0)
  3. docs_src/security/tutorial004_py310.py

    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
        if not verify_password(password, user.hashed_password):
            return False
        return user
    
    
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 4K bytes
    - Viewed (0)
  4. mockwebserver/README.md

    MockWebServer
    =============
    
    A scriptable web server for testing HTTP clients
    
    
    ### Motivation
    
    This library makes it easy to test that your app Does The Right Thing when it
    makes HTTP and HTTPS calls. It lets you specify which responses to return and
    then verify that requests were made as expected.
    
    Because it exercises your full HTTP stack, you can be confident that you're
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Sun Dec 17 15:34:10 GMT 2023
    - 5K bytes
    - Viewed (1)
  5. guava-tests/test/com/google/common/collect/OrderingTest.java

        Ordering<Integer> integers = Ordering.explicit(1);
    
        // Like by like equals like
        Ordering<Number> a = numbers.compound(numbers);
    
        // The compound takes the more specific type of the two, regardless of order
    
        Ordering<Number> b = numbers.compound(objects);
        Ordering<Number> c = objects.compound(numbers);
    
        Ordering<Integer> d = numbers.compound(integers);
    Java
    - Registered: Fri Apr 19 12:43:09 GMT 2024
    - Last Modified: Thu Mar 07 18:34:03 GMT 2024
    - 42.5K bytes
    - Viewed (0)
  6. android/guava-tests/test/com/google/common/collect/OrderingTest.java

        Ordering<Integer> integers = Ordering.explicit(1);
    
        // Like by like equals like
        Ordering<Number> a = numbers.compound(numbers);
    
        // The compound takes the more specific type of the two, regardless of order
    
        Ordering<Number> b = numbers.compound(objects);
        Ordering<Number> c = objects.compound(numbers);
    
        Ordering<Integer> d = numbers.compound(integers);
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Thu Mar 07 18:34:03 GMT 2024
    - 42.5K bytes
    - Viewed (0)
  7. docs_src/security/tutorial003_an.py

            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def fake_decode_token(token):
        # This doesn't provide any security at all
        # Check the next version
        user = get_user(fake_users_db, token)
        return user
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        user = fake_decode_token(token)
        if not user:
            raise HTTPException(
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 2.5K bytes
    - Viewed (0)
  8. docs_src/security/tutorial003_an_py310.py

            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def fake_decode_token(token):
        # This doesn't provide any security at all
        # Check the next version
        user = get_user(fake_users_db, token)
        return user
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        user = fake_decode_token(token)
        if not user:
            raise HTTPException(
    Python
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Mar 26 16:56:53 GMT 2024
    - 2.5K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_dependencies/test_tutorial012_an.py

        response = client.get(
            "/items/", headers={"X-Token": "fake-super-secret-token", "X-Key": "invalid"}
        )
        assert response.status_code == 400, response.text
        assert response.json() == {"detail": "X-Key header invalid"}
    
    
    def test_get_invalid_second_header_users():
        response = client.get(
            "/users/", headers={"X-Token": "fake-super-secret-token", "X-Key": "invalid"}
        )
    Python
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:40:57 GMT 2024
    - 8.4K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/TopKSelector.java

     * #offer} and a call to {@link #topK}, with O(k) memory. In comparison, quickselect has the same
     * asymptotics but requires O(n) memory, and a {@code PriorityQueue} implementation takes O(n log
     * k). In benchmarks, this implementation performs at least as well as either implementation, and
     * degrades more gracefully for worst-case input.
     *
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Mon Apr 01 16:15:01 GMT 2024
    - 11.2K bytes
    - Viewed (0)
Back to top