Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 251 for authorization (0.09 sec)

  1. src/test/java/org/codelibs/fess/helper/AccessTokenHelperTest.java

            req.addHeader("Authorization", "Bearer " + token);
            assertEquals(token, accessTokenHelper.getAccessTokenFromRequest(req));
        }
    
        public void test_getAccessTokenFromRequest_ok1() {
            final String token = accessTokenHelper.generateAccessToken();
            MockletHttpServletRequest req = getMockRequest();
            req.addHeader("Authorization", token);
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Thu Feb 22 01:37:57 UTC 2024
    - 3.1K bytes
    - Viewed (0)
  2. common-protos/k8s.io/api/rbac/v1beta1/generated.proto

    }
    
    // ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRole, and will no longer be served in v1.22.
    message ClusterRole {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 8.6K bytes
    - Viewed (0)
  3. cmd/jwt_test.go

    		expectedErr error
    	}{
    		// Set valid authorization header.
    		{
    			req: &http.Request{
    				Header: http.Header{
    					"Authorization": []string{token},
    				},
    			},
    			expectedErr: nil,
    		},
    		// No authorization header.
    		{
    			req: &http.Request{
    				Header: http.Header{},
    			},
    			expectedErr: errNoAuthToken,
    		},
    		// Invalid authorization token.
    		{
    			req: &http.Request{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jul 22 07:04:48 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  4. common-protos/k8s.io/api/authorization/v1/generated.proto

    syntax = "proto2";
    
    package k8s.io.api.authorization.v1;
    
    import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto";
    import "k8s.io/apimachinery/pkg/runtime/generated.proto";
    import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto";
    
    // Package-wide variables from generator "generated".
    option go_package = "k8s.io/api/authorization/v1";
    
    // ExtraValue masks the value so protobuf can generate
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 11.9K bytes
    - Viewed (0)
  5. common-protos/k8s.io/api/rbac/v1alpha1/generated.proto

    }
    
    // ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.
    // Deprecated in v1.17 in favor of rbac.authorization.k8s.io/v1 ClusterRole, and will no longer be served in v1.22.
    message ClusterRole {
      // Standard object's metadata.
      // +optional
      optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/index.md

        * This automatic discovery is what is defined in the OpenID Connect specification.
    
    
    /// tip
    
    Integrating other authentication/authorization providers like Google, Facebook, Twitter, GitHub, etc. is also possible and relatively easy.
    
    The most complex problem is building an authentication/authorization provider like those, but **FastAPI** gives you the tools to do it easily, while doing the heavy lifting for you.
    
    ///
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  7. istioctl/pkg/proxyconfig/testdata/config_dump.json

                                "value": 100
                              },
                              "custom_tags": [
                                {
                                  "tag": "istio.authorization.dry_run.allow_policy.name",
                                  "metadata": {
                                    "kind": {
                                      "request": {}
                                    },
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jan 03 23:08:06 UTC 2024
    - 54.8K bytes
    - Viewed (0)
  8. tests/test_tutorial/test_security/test_tutorial003.py

        response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"})
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Invalid authentication credentials"}
        assert response.headers["WWW-Authenticate"] == "Bearer"
    
    
    def test_incorrect_token_type():
        response = client.get(
            "/users/me", headers={"Authorization": "Notexistent testtoken"}
        )
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jul 07 17:12:13 UTC 2023
    - 8K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_security/test_tutorial003_an_py39.py

            "/users/me", headers={"Authorization": "Notexistent testtoken"}
        )
        assert response.status_code == 401, response.text
        assert response.json() == {"detail": "Not authenticated"}
        assert response.headers["WWW-Authenticate"] == "Bearer"
    
    
    @needs_py39
    def test_inactive_user(client: TestClient):
        response = client.get("/users/me", headers={"Authorization": "Bearer alice"})
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Jul 07 17:12:13 UTC 2023
    - 8.4K bytes
    - Viewed (0)
  10. architecture/ambient/peer-authentication.md

    of ztunnel is to be a minimal L4 proxy, and as such, its xDS configuration is purposefully limited. In particular, ztunnel only supports 2 (custom) xDS resources: [`Workload`](../../pkg/workloadapi/workload.proto) and [`Authorization`](../../pkg/workloadapi/security/authorization.proto). As such, ztunnel does not receive `PeerAuthentication`s directly; when istiod detects a `PeerAuthentication` resource that targets an Ambient captured workload, it computes the effective policy for that workload...
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 01 20:04:20 UTC 2024
    - 3.9K bytes
    - Viewed (0)
Back to top