- Sort Score
- Result 10 results
- Languages All
Results 111 - 120 of 133 for dangan (0.07 sec)
-
docs/em/docs/advanced/security/oauth2-scopes.md
## 🥙 🤝 ⏮️ ↔ 🔜, 🔀 🤝 *➡ 🛠️* 📨 ↔ 📨. 👥 ⚙️ 🎏 `OAuth2PasswordRequestForm`. ⚫️ 🔌 🏠 `scopes` ⏮️ `list` `str`, ⏮️ 🔠 ↔ ⚫️ 📨 📨. & 👥 📨 ↔ 🍕 🥙 🤝. /// danger 🦁, 📥 👥 ❎ ↔ 📨 🔗 🤝. ✋️ 👆 🈸, 💂♂, 👆 🔜 ⚒ 💭 👆 🕴 🚮 ↔ 👈 👩💻 🤙 💪 ✔️, ⚖️ 🕐 👆 ✔️ 🔁. /// ```Python hl_lines="155" {!../../docs_src/security/tutorial005.py!} ```
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 11K bytes - Viewed (0) -
docs/en/docs/tutorial/response-model.md
In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger Never store the plain password of a user or send it in a response like this, unless you know all the caveats and you know what you are doing. /// ## Add an output model
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 18.1K bytes - Viewed (0) -
src/main/webapp/WEB-INF/orig/view/advance.jsp
<li class="nav-item" data-toggle="tooltip" data-placement="left" title="<la:message key="labels.eol_error" />"> <a class="nav-link active" href="${eolLink}" target="_olh"><em class="fas fa-times-circle text-danger"></a> </li> </c:if> <c:if test="${developmentMode}"> <li class="nav-item" data-toggle="tooltip" data-placement="left" title="<la:message key="labels.development_mode_warning" />"
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Sat Oct 26 01:07:52 UTC 2024 - 14.9K bytes - Viewed (0) -
cmd/erasure-healing.go
VersionID: versionID, }) errs = make([]error, len(errs)) if derr == nil { derr = errFileNotFound if versionID != "" { derr = errFileVersionNotFound } // We did find a new danging object return er.defaultHealResult(m, storageDisks, storageEndpoints, errs, bucket, object, versionID), derr } return er.defaultHealResult(m, storageDisks, storageEndpoints,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Oct 02 17:50:41 UTC 2024 - 34.4K bytes - Viewed (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
We are still using the same `OAuth2PasswordRequestForm`. It includes a property `scopes` with a `list` of `str`, with each scope it received in the request. And we return the scopes as part of the JWT token. /// danger For simplicity, here we are just adding the scopes received directly to the token.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Oct 29 11:02:16 UTC 2024 - 13.1K bytes - Viewed (0) -
docs/em/docs/tutorial/response-model.md
``` //// 🔜, 🕐❔ 🖥 🏗 👩💻 ⏮️ 🔐, 🛠️ 🔜 📨 🎏 🔐 📨. 👉 💼, ⚫️ 💪 🚫 ⚠, ↩️ ⚫️ 🎏 👩💻 📨 🔐. ✋️ 🚥 👥 ⚙️ 🎏 🏷 ➕1️⃣ *➡ 🛠️*, 👥 💪 📨 👆 👩💻 🔐 🔠 👩💻. /// danger 🙅 🏪 ✅ 🔐 👩💻 ⚖️ 📨 ⚫️ 📨 💖 👉, 🚥 👆 💭 🌐 ⚠ & 👆 💭 ⚫️❔ 👆 🔨. /// ## 🚮 🔢 🏷 👥 💪 ↩️ ✍ 🔢 🏷 ⏮️ 🔢 🔐 & 🔢 🏷 🍵 ⚫️: //// tab | 🐍 3️⃣.6️⃣ & 🔛
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 15.8K bytes - Viewed (0) -
docs/ja/docs/tutorial/response-model.md
``` これで、ブラウザがパスワードを使ってユーザーを作成する際に、APIがレスポンスで同じパスワードを返すようになりました。 この場合、ユーザー自身がパスワードを送信しているので問題ないかもしれません。 しかし、同じモデルを別の*path operation*に使用すると、すべてのクライアントにユーザーのパスワードを送信してしまうことになります。 /// danger | "危険" ユーザーの平文のパスワードを保存したり、レスポンスで送信したりすることは絶対にしないでください。 /// ## 出力モデルの追加 代わりに、平文のパスワードを持つ入力モデルと、パスワードを持たない出力モデルを作成することができます: ```Python hl_lines="9 11 16"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0) -
docs/ru/docs/tutorial/response-model.md
Но что если мы захотим использовать эту модель для какой-либо другой *операции пути*? Мы можем, сами того не желая, отправить пароль любому другому пользователю. /// danger | "Осторожно"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 30.4K bytes - Viewed (0) -
src/main/webapp/js/admin/plugins/form-validator/jquery.form-validator.min.js
.find("."+d.errorMessageClass+".help-block"),0===e.length&&(e=a("<span></span>").addClass("help-block").addClass(d.errorMessageClass),e.appendTo(j)),h(e)}},setMessageInTopOfForm:function(b,c,d,e){var f='<div class="{errorMessageClass} alert alert-danger"><strong>{errorTitle}</strong><ul>{fields}</ul></div>',g=!1;if("function"!=typeof d.submitErrorMessageCallback||(g=d.submitErrorMessageCallback(b,c,d))){var h={errorTitle:e.errorTitle,fields:"",errorMessageClass:d.errorMessageClass};a.each(c,func...
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Mon Jan 01 05:12:47 UTC 2018 - 32.8K bytes - Viewed (0) -
docs/de/docs/advanced/security/oauth2-scopes.md
Und wir geben die Scopes als Teil des JWT-Tokens zurück. /// danger | "Gefahr" Der Einfachheit halber fügen wir hier die empfangenen Scopes direkt zum Token hinzu.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 22.5K bytes - Viewed (0)