- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 22 for Schaper (0.26 sec)
-
docs/en/docs/tutorial/security/simple-oauth2.md
# Simple OAuth2 with Password and Bearer Now let's build from the previous chapter and add the missing parts to have a complete security flow. ## Get the `username` and `password` We are going to use **FastAPI** security utilities to get the `username` and `password`. OAuth2 specifies that when using the "password flow" (that we are using) the client/user must send a `username` and `password` fields as form data.
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 12.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
- Makes locally attached (non-network attached) storage available as a persistent volume source. - Allows users to take advantage of the typically cheaper and improved performance of persistent local storage
Plain Text - Registered: Fri Apr 26 09:05:10 GMT 2024 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/dependencies-in-path-operation-decorators.md
!!! info In this example we use invented custom headers `X-Key` and `X-Token`. But in real cases, when implementing security, you would get more benefits from using the integrated [Security utilities (the next chapter)](../security/index.md){.internal-link target=_blank}. ## Dependencies errors and return values You can use the same dependency *functions* you use normally. ### Dependency requirements
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Tue Oct 17 05:59:11 GMT 2023 - 4.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
This text was produced by Project Gutenberg www.gutenberg.org, an organization that produces free electronic books, mostly of works old enough that they have passed into the public domain. CHAPTER I Down the Rabbit-Hole Alice was beginning to get very tired of sitting by her sister on the bank, and of having nothing to do: once or twice she had
Plain Text - Registered: Fri Apr 12 12:43:09 GMT 2024 - Last Modified: Mon Oct 29 21:35:03 GMT 2012 - 145.2K bytes - Viewed (0) -
docs/en/docs/tutorial/body-nested-models.md
To see all the options you have, checkout the docs for <a href="https://docs.pydantic.dev/latest/concepts/types/" class="external-link" target="_blank">Pydantic's exotic types</a>. You will see some examples in the next chapter. For example, as in the `Image` model we have a `url` field, we can declare it to be an instance of Pydantic's `HttpUrl` instead of a `str`: === "Python 3.10+" ```Python hl_lines="2 8"
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Fri Mar 22 01:42:11 GMT 2024 - 9.5K bytes - Viewed (0) -
docs/en/docs/tutorial/dependencies/index.md
And that function takes parameters in the same way that *path operation functions* do. !!! tip You'll see what other "things", apart from functions, can be used as dependencies in the next chapter. Whenever a new request arrives, **FastAPI** will take care of: * Calling your dependency ("dependable") function with the correct parameters. * Get the result from your function.
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 11.6K bytes - Viewed (0) -
RELEASE.md
Serv-Inc, Severen Redwood, Shahzad Lone, Shashank Gupta, shashvat, Shashvat Chand Shahi, Shubham Goyal, Shashi, Sigrid Keydana, Siju, Siju Samuel, sleighsoft, smilu97, Snease-Abq, Son Tran, Spencer Schaber, sremedios, Srini511, srinivasan.narayanamoorthy, Steve Lang, Steve Nesae, Subin, Sumesh Udayakumaran, Sungmann Cho, sunway513, Supriya Rao, sxwang, Tae-Hwan Jung, Taehoon Lee, Takeo
Plain Text - Registered: Tue Apr 23 12:39:09 GMT 2024 - Last Modified: Wed Apr 03 20:27:38 GMT 2024 - 727.4K bytes - Viewed (8) -
docs/en/docs/deployment/server-workers.md
In particular, when running on **Kubernetes** you will probably **not** want to use Gunicorn and instead run **a single Uvicorn process per container**, but I'll tell you about it later in that chapter. ## Gunicorn with Uvicorn Workers
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Thu Apr 18 19:53:19 GMT 2024 - 9.1K bytes - Viewed (0) -
docs/en/docs/tutorial/request-forms.md
Plain Text - Registered: Sun Apr 28 07:19:10 GMT 2024 - Last Modified: Wed Mar 13 19:02:19 GMT 2024 - 3.2K bytes - Viewed (0) -
docs/kms/IAM.md
to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU. - Root credentials can now be changed easily. Before, a two-step process was required to change the cluster root credentials since they were used to en/decrypt the IAM data.
Plain Text - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Viewed (0)