Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 22 for Schaper (0.26 sec)

  1. docs/en/docs/tutorial/security/simple-oauth2.md

    # Simple OAuth2 with Password and Bearer
    
    Now let's build from the previous chapter and add the missing parts to have a complete security flow.
    
    ## Get the `username` and `password`
    
    We are going to use **FastAPI** security utilities to get the `username` and `password`.
    
    OAuth2 specifies that when using the "password flow" (that we are using) the client/user must send a `username` and `password` fields as form data.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 12.5K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.14.md

    - Makes locally attached (non-network attached) storage available as a persistent volume source.
    - Allows users to take advantage of the typically cheaper and improved performance of persistent local storage
    Plain Text
    - Registered: Fri Apr 26 09:05:10 GMT 2024
    - Last Modified: Mon Jun 14 22:06:39 GMT 2021
    - 271.5K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md

    !!! info
        In this example we use invented custom headers `X-Key` and `X-Token`.
    
        But in real cases, when implementing security, you would get more benefits from using the integrated [Security utilities (the next chapter)](../security/index.md){.internal-link target=_blank}.
    
    ## Dependencies errors and return values
    
    You can use the same dependency *functions* you use normally.
    
    ### Dependency requirements
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Tue Oct 17 05:59:11 GMT 2023
    - 4.1K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    This text was produced by Project Gutenberg www.gutenberg.org,
    an organization that produces free electronic books, mostly of
    works old enough that they have passed into the public domain.
    
    
                                CHAPTER I
    
                          Down the Rabbit-Hole
    
    
      Alice was beginning to get very tired of sitting by her sister
    on the bank, and of having nothing to do:  once or twice she had
    Plain Text
    - Registered: Fri Apr 12 12:43:09 GMT 2024
    - Last Modified: Mon Oct 29 21:35:03 GMT 2012
    - 145.2K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/body-nested-models.md

    To see all the options you have, checkout the docs for <a href="https://docs.pydantic.dev/latest/concepts/types/" class="external-link" target="_blank">Pydantic's exotic types</a>. You will see some examples in the next chapter.
    
    For example, as in the `Image` model we have a `url` field, we can declare it to be an instance of Pydantic's `HttpUrl` instead of a `str`:
    
    === "Python 3.10+"
    
        ```Python hl_lines="2  8"
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Fri Mar 22 01:42:11 GMT 2024
    - 9.5K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/dependencies/index.md

    And that function takes parameters in the same way that *path operation functions* do.
    
    !!! tip
        You'll see what other "things", apart from functions, can be used as dependencies in the next chapter.
    
    Whenever a new request arrives, **FastAPI** will take care of:
    
    * Calling your dependency ("dependable") function with the correct parameters.
    * Get the result from your function.
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 11.6K bytes
    - Viewed (0)
  7. RELEASE.md

    Serv-Inc, Severen Redwood, Shahzad Lone, Shashank Gupta, shashvat, Shashvat
    Chand Shahi, Shubham Goyal, Shashi, Sigrid Keydana, Siju, Siju Samuel,
    sleighsoft, smilu97, Snease-Abq, Son Tran, Spencer Schaber, sremedios, Srini511,
    srinivasan.narayanamoorthy, Steve Lang, Steve Nesae, Subin, Sumesh Udayakumaran,
    Sungmann Cho, sunway513, Supriya Rao, sxwang, Tae-Hwan Jung, Taehoon Lee, Takeo
    Plain Text
    - Registered: Tue Apr 23 12:39:09 GMT 2024
    - Last Modified: Wed Apr 03 20:27:38 GMT 2024
    - 727.4K bytes
    - Viewed (8)
  8. docs/en/docs/deployment/server-workers.md

        In particular, when running on **Kubernetes** you will probably **not** want to use Gunicorn and instead run **a single Uvicorn process per container**, but I'll tell you about it later in that chapter.
    
    ## Gunicorn with Uvicorn Workers
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 9.1K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/request-forms.md

        Data from forms is normally encoded using the "media type" `application/x-www-form-urlencoded`.
    
        But when the form includes files, it is encoded as `multipart/form-data`. You'll read about handling files in the next chapter.
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Wed Mar 13 19:02:19 GMT 2024
    - 3.2K bytes
    - Viewed (0)
  10. docs/kms/IAM.md

       to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU.
       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    - Root credentials can now be changed easily. Before, a two-step process was required to
       change the cluster root credentials since they were used to en/decrypt the IAM data.
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
Back to top