- Sort Score
- Result 10 results
- Languages All
Results 311 - 320 of 427 for credential (0.45 sec)
-
cni/pkg/install/install.go
// If the configuration is invalid, a full redeployal of config, binaries, and svcAcct credentials to the // shared node CNI dir will be attempted. // // If changes occurred but the config is still valid, only the binaries and (optionally) svcAcct credentials // will be redeployed. func (in *Installer) Run(ctx context.Context) error { installedBins, err := in.installAll(ctx) if err != nil {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Aug 09 21:33:51 UTC 2024 - 13.5K bytes - Viewed (0) -
docs_src/security/tutorial004_an.py
async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4.2K bytes - Viewed (0) -
cmd/kms-handlers_test.go
t.Errorf("want status code %d, got %d", http.StatusNotImplemented, rec.Code) } }) } // Test when the GlobalKMS is configured but the credentials are invalid GlobalKMS = kms.NewStub("default-test-key") for _, test := range tests { t.Run(test.name+" invalid credentials", func(t *testing.T) { req := buildKMSRequest(t, test.method, test.path, userAccessKey, userSecretKey, test.query) rec := httptest.NewRecorder()
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 22.3K bytes - Viewed (0) -
docs_src/security/tutorial004_py310.py
return encoded_jwt async def get_current_user(token: str = Depends(oauth2_scheme)): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4K bytes - Viewed (0) -
src/test/java/jcifs/tests/SessionTest.java
import org.junit.runners.Parameterized; import org.junit.runners.Parameterized.Parameters; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import jcifs.CIFSContext; import jcifs.CIFSException; import jcifs.Credentials; import jcifs.SmbResource; import jcifs.SmbTransport; import jcifs.config.DelegatingConfiguration; import jcifs.smb.NtStatus; import jcifs.smb.NtlmNtHashAuthenticator; import jcifs.smb.NtlmPasswordAuthentication;
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Thu Jan 05 13:09:03 UTC 2023 - 15.8K bytes - Viewed (0) -
SECURITY.md
Please, provide a detailed explanation of the issue. In particular, outline the type of the security issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do you need access credentials for a successful exploit). If you have not received a reply to your email within 48 hours or you have not heard from the security team for the past five days please contact the security team directly:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 2.2K bytes - Viewed (0) -
cmd/warm-backend.go
Remove(ctx context.Context, object string, rv remoteVersionID) error InUse(ctx context.Context) (bool, error) } const probeObject = "probeobject" // checkWarmBackend checks if tier config credentials have sufficient privileges // to perform all operations defined in the WarmBackend interface. func checkWarmBackend(ctx context.Context, w WarmBackend) error {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 4K bytes - Viewed (0) -
internal/logger/reqinfo.go
VersionID string `json:",omitempty"` // corresponding versionID for the object Objects []ObjectVersion `json:",omitempty"` // Only set during MultiObject delete handler. Cred auth.Credentials `json:"-"` Region string `json:"-"` Owner bool `json:"-"` AuthType string `json:"-"` tags []KeyVal // Any additional info not accommodated by above fields
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 13 22:22:04 UTC 2024 - 4.4K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial003_an.py
def test_incorrect_token(): response = client.get("/users/me", headers={"Authorization": "Bearer nonexistent"}) assert response.status_code == 401, response.text assert response.json() == {"detail": "Invalid authentication credentials"} assert response.headers["WWW-Authenticate"] == "Bearer" def test_incorrect_token_type(): response = client.get( "/users/me", headers={"Authorization": "Notexistent testtoken"} )
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Jul 07 17:12:13 UTC 2023 - 8K bytes - Viewed (0) -
docs_src/security/tutorial004.py
return encoded_jwt async def get_current_user(token: str = Depends(oauth2_scheme)): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None:
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4.1K bytes - Viewed (0)