- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 66 for sitea (0.05 seconds)
-
src/test/java/org/codelibs/fess/helper/VirtualHostHelperTest.java
new Tuple3<>("Custom-Header", "custom.value", "site3") }; } }); String[] paths = virtualHostHelper.getVirtualHostPaths(); assertNotNull(paths); assertEquals(3, paths.length); assertEquals("/site1", paths[0]); assertEquals("/site2", paths[1]);
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 11.8K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/cors/CorsHandlerTest.java
public void test_multipleProcessCalls() { HttpServletRequest request = createMockRequest(); HttpServletResponse response = createMockResponse(); String[] origins = { "https://site1.com", "https://site2.com", "https://site3.com" }; for (String origin : origins) { processCalled = false; corsHandler.process(origin, request, response);
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 21 06:04:58 GMT 2026 - 26.3K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/net/InternetDomainNameTest.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 16 15:59:55 GMT 2026 - 17.8K bytes - Click Count (0) -
guava-tests/test/com/google/common/net/InternetDomainNameTest.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 16 15:59:55 GMT 2026 - 17.8K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Então um de seus usuários poderia instalá-lo e executá-lo localmente. Em seguida, poderia abrir um site malicioso, por exemplo: ``` https://evilhackers.example.com ``` E esse site malicioso envia requisições usando `fetch()` com um corpo `Blob` para a API local em ``` http://localhost:8000/v1/agents/multivac ```
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Il pourrait ensuite ouvrir un site malveillant, par exemple quelque chose comme ``` https://evilhackers.example.com ``` Et ce site malveillant enverrait des requêtes en utilisant `fetch()` avec un corps `Blob` vers l’API locale à l’adresse ``` http://localhost:8000/v1/agents/multivac ```
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
.github/workflows/build-docs.yml
- name: Build Docs run: uv run ./scripts/docs.py build-lang ${{ matrix.lang }} - uses: actions/upload-artifact@v7 with: name: docs-site-${{ matrix.lang }} path: ./site/** include-hidden-files: true # https://github.com/marketplace/actions/alls-green#why docs-all-green: # This job does nothing and is only used for the branch protectionCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Mar 14 15:01:34 GMT 2026 - 3.3K bytes - Click Count (0) -
test_docs.sh
cat README.md | grep -v 'project website' > docs/index.md cp CHANGELOG.md docs/changelogs/changelog.md cp CONTRIBUTING.md docs/contribute/contributing.md # Build the site locally
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 753 bytes - Click Count (1) -
docs/tr/docs/advanced/strict-content-type.md
## CSRF Riski { #csrf-risk } Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar. Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:51:35 GMT 2026 - 3.6K bytes - Click Count (0) -
.gitignore
.idea *.iml *.ipr *.iws *.log classes obj .DS_Store # Special Mkdocs files docs/5.x docs/changelog.md docs/contributing.md docs/index.md # jenv /.java-version /site/
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Wed Mar 18 00:48:52 GMT 2026 - 345 bytes - Click Count (0)