- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 31 for fetch (0.03 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/main/resources/fess_config.properties
page.user.max.fetch.size=1000 # Maximum number of role records to fetch per page. page.role.max.fetch.size=1000 # Maximum number of group records to fetch per page. page.group.max.fetch.size=1000 # Maximum number of crawling info parameters to fetch per page. page.crawling.info.param.max.fetch.size=100 # Maximum number of crawling info records to fetch per page. page.crawling.info.max.fetch.size=1000
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 59.3K bytes - Click Count (0) -
android/guava/src/com/google/common/net/HttpHeaders.java
/** * The HTTP <a href="https://w3c.github.io/webappsec-fetch-metadata/">{@code Sec-Fetch-Site}</a> * header field name. * * @since 27.1 */ public static final String SEC_FETCH_SITE = "Sec-Fetch-Site"; /** * The HTTP <a href="https://w3c.github.io/webappsec-fetch-metadata/">{@code Sec-Fetch-User}</a> * header field name. * * @since 27.1
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Feb 24 14:36:23 GMT 2026 - 35.6K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they: * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body) * and don't send any authentication credentials. This type of attack is mainly relevant when: * the application is running locally (e.g. on `localhost`) or in an internal network
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/zh/docs/advanced/strict-content-type.md
## CSRF 风险 { #csrf-risk } 此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。 这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求: - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body) - 且不发送任何认证凭据。 这种攻击主要在以下情况下相关: - 应用在本地(如 `localhost`)或内网中运行 - 且应用没有任何认证,假定来自同一网络的请求都可信。 ## 攻击示例 { #example-attack } 假设你构建了一个本地运行的 AI 代理。 它提供了一个 API,地址为 ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:29:48 GMT 2026 - 3K bytes - Click Count (0) -
.github/workflows/auto-assign-pr-to-author.yml
name: 'Auto Assign PR to Author' on: pull_request: types: [opened] permissions: {} jobs: add-reviews: permissions: contents: read # for kentaro-m/auto-assign-action to fetch config file pull-requests: write # for kentaro-m/auto-assign-action to assign PR reviewers runs-on: ubuntu-latest steps:
Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Fri Mar 20 22:04:14 GMT 2026 - 381 bytes - Click Count (0) -
build-logic/build-update-utils/src/main/kotlin/gradlebuild/buildutils/tasks/PreparePatchRelease.kt
val response = HttpClient.newHttpClient().send(request, HttpResponse.BodyHandlers.ofString()) if (response.statusCode() > 399) { throw RuntimeException("Failed to fetch versions from Gradle services: ${response.statusCode()} ${response.body()}") } val versions = Gson().fromJson(response.body(), Array<GradleServicesVersion>::class.java)
Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Mon Mar 23 14:47:12 GMT 2026 - 2.8K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
/** The key of the configuration. e.g. 1000 */ String PAGE_USER_MAX_FETCH_SIZE = "page.user.max.fetch.size"; /** The key of the configuration. e.g. 1000 */ String PAGE_ROLE_MAX_FETCH_SIZE = "page.role.max.fetch.size"; /** The key of the configuration. e.g. 1000 */ String PAGE_GROUP_MAX_FETCH_SIZE = "page.group.max.fetch.size";Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 576.9K bytes - Click Count (2) -
.github/workflows/build-reusable.yml
env: GIT_CONFIG_PARAMETERS: "'checkout.workers=12' 'core.featureManyFiles=true'" with: ref: ${{ github.sha }} persist-credentials: false fetch-depth: 1 - name: Build and test env: TFCI: ${{ inputs.tfci }} TFCI_GITHUB_ACTIONS: trueCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Sat Mar 28 04:33:01 GMT 2026 - 2.2K bytes - Click Count (0) -
docs/zh-hant/docs/advanced/strict-content-type.md
## CSRF 風險 { #csrf-risk } 這個預設行為在某個非常特定的情境下,能對一類跨站請求偽造(CSRF, Cross-Site Request Forgery)攻擊提供保護。 這類攻擊利用了瀏覽器在以下情況下允許腳本發送請求而不進行任何 CORS 預檢(preflight)檢查的事實: - 沒有 `Content-Type` 標頭(例如以 `fetch()` 並使用 `Blob` 作為 body) - 且沒有送出任何身分驗證憑證 這種攻擊主要與以下情境相關: - 應用在本機(例如 `localhost`)或內部網路中執行 - 並且應用沒有任何身分驗證,假設同一個網路中的任何請求都可被信任 ## 攻擊範例 { #example-attack } 假設你打造了一個在本機執行 AI 代理(AI agent)的方法。 它提供一個 API:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:33:04 GMT 2026 - 3.1K bytes - Click Count (0) -
src/main/webapp/WEB-INF/orig/view/chat/chat.jsp
<span class="step-label"><la:message key="labels.chat_step_evaluate" /></span> </div> <div class="progress-step" data-phase="fetch"> <div class="step-icon"><i class="fa fa-file-text-o" aria-hidden="true"></i></div> <span class="step-label"><la:message key="labels.chat_step_fetch" /></span> </div>
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 06:21:57 GMT 2026 - 10.4K bytes - Click Count (0)