Celery 2.5 Documentationto sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should CELERY_TASK_SERIALIZER setting to use the auth serializer. Also required is configuring the paths used to locate private keys and certificates on the file-system: the CELERY_SECURITY_KEY, CELERY_SECURITY_CERTIFICATE and example configuration using the auth serializer, with the private key and certificate files located in :/etc/ssl. CELERY_SECURITY_KEY = "/etc/ssl/private/worker.key" CELERY_SECURITY_CERTIFICATE = "/etc/ssl/certs/worker0 码力 | 400 页 | 1.40 MB | 1 年前3
Celery v5.0.1 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should event protocol, set event_serializer to auth. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2313 页 | 2.13 MB | 1 年前3
Celery v5.0.2 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should event protocol, set event_serializer to auth. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2313 页 | 2.14 MB | 1 年前3
Celery v5.0.0 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should event protocol, set event_serializer to auth. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2309 页 | 2.13 MB | 1 年前3
Celery v5.0.5 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should event protocol, set event_serializer to auth. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2315 页 | 2.14 MB | 1 年前3
Celery 3.0 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should task_serializer setting to use the auth serializer. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2110 页 | 2.23 MB | 1 年前3
Celery v4.0.0 Documentationby default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should task_serializer setting to use the auth serializer. Also required is configuring the paths used to locate private keys and certificates on the file-system: the security_key, security_certificate, and security_cert_store0 码力 | 2106 页 | 2.23 MB | 1 年前3
Celery 2.5 Documentationto sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should CELERY_TASK_SERIALIZER setting to use the auth serializer. Also required is configuring the paths used to locate private keys and certificates on the file-system: the CELERY_SECURITY_KEY, CELERY_SECURITY_CERTIFICATE and example configuration using the auth serializer, with the private key and certificate files located in :/etc/ssl. CELERY_SECURITY_KEY = "/etc/ssl/private/worker.key" CELERY_SECURITY_CERTIFICATE = "/etc/ssl/certs/worker0 码力 | 647 页 | 1011.88 KB | 1 年前3
Celery 3.1 Documentationaffected by the virtual host setting. This is caused by a limitation in Redis. The Redis PUB/SUB channels are global and not affected by the database number. • Redis may evict keys from the database in by default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should0 码力 | 607 页 | 2.27 MB | 1 年前3
Celery 3.1 Documentationaffected by the virtual host setting. This is caused by a limitation in Redis. The Redis PUB/SUB channels are global and not affected by the database number. Redis may evict keys from the database in some by default, but if the shared argument to the task decorator is disabled, then the task will be private to the app it’s bound to. 2. Evaluate all pending task decorators. 3. Make sure all tasks are bound to sign message using Public-key cryptography, where messages sent by clients are signed using a private key and then later verified by the worker using a public certificate. Optimally certificates should0 码力 | 887 页 | 1.22 MB | 1 年前3
共 47 条
- 1
- 2
- 3
- 4
- 5













