- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 175 for trusted (0.1 seconds)
-
src/main/java/org/codelibs/fess/helper/RateLimitHelper.java
* Only trusts X-Forwarded-For/X-Real-IP headers when the request comes from a trusted proxy. * @param request the HTTP request * @return the client IP address */ public String getClientIp(final HttpServletRequest request) { final String remoteAddr = request.getRemoteAddr(); // Only trust proxy headers if the request comes from a trusted proxyCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Dec 24 14:16:27 GMT 2025 - 9.4K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/helper/RateLimitHelperTest.java
assertEquals("192.168.1.100", rateLimitHelper.getClientIp(request)); } @Test public void test_getClientIp_xForwardedFor_trustedProxy() { // 127.0.0.1 is configured as a trusted proxy by default final MockletHttpServletRequest request = getMockRequest(); request.setRemoteAddr("127.0.0.1"); request.addHeader("X-Forwarded-For", "203.0.113.50, 70.41.3.18, 150.172.238.178");
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Wed Jan 14 14:29:07 GMT 2026 - 4K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* * * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or * intermediate. This is business as usual. * * ``` * pinnedRoot (trusted by CertificatePinner) * -> pinnedIntermediate (trusted by CertificatePinner) * -> realVictim * ``` * * The attacker compromises a CA. They take the public key from an intermediate certificate
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 24.4K bytes - Click Count (2) -
okhttp-tls/README.md
``` This handshake is successful because each party has prearranged to trust the root certificate that signs the other party's chain. Well-Known Certificate Authorities ---------------------------------- In these examples we've prearranged which root certificates to trust. But for regular HTTPS on the Internet this set of trusted root certificates is usually provided by default by the host platform.
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 9.1K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/AbstractFuture.java
// chain // We can only do this for Trusted, because Trusted implementations of cancel do // nothing but delegate to this method and do not permit user overrides. AbstractFuture<?> trusted = (AbstractFuture<?>) futureToPropagateTo; localValue = trusted.value(); if (localValue == null | localValue instanceof DelegatingToFuture) {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Mar 07 14:39:00 GMT 2026 - 43.6K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* called certificate authorities (CAs). * * Browsers and other HTTP clients need a set of trusted root certificates to authenticate their * peers. Sets of root certificates are managed by either the HTTP client (like Firefox), or the * host platform (like Android). In July 2018 Android had 134 trusted root certificates for its HTTP * clients to trust. * * For example, in order to establish a secure connection to `https://www.squareup.com/`,
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 21.6K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
/// Nevertheless, as the **application server** doesn't know it is behind a trusted **proxy**, by default, it wouldn't trust those headers. But you can configure the **application server** to trust the *forwarded* headers sent by the **proxy**. If you are using FastAPI CLI, you can use the *CLI Option* `--forwarded-allow-ips` to tell it from which IPs it should trust those *forwarded* headers.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 14K bytes - Click Count (0) -
docs/features/https.md
Use [CertificatePinner](https://square.github.io/okhttp/5.x/okhttp/okhttp3/-certificate-pinner/) to restrict which certificates and certificate authorities are trusted. Certificate pinning increases security, but limits your server team’s abilities to update their TLS certificates. **Do not use certificate pinning without the blessing of your server’s TLS administrator!**
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:01:42 GMT 2026 - 10.5K bytes - Click Count (0) -
KEYS.md
```bash gpg --verify plugin-publish-plugin-2.0.0.jar.asc plugin-publish-plugin-2.0.0.jar ``` If you see a warning message like `gpg: WARNING: This key is not certified with a trusted signature!`, you can locally sign the Gradle key after importing it. This tells your GPG installation that you trust this key and will prevent the warning from appearing again. To do this, run the following command: ```bash gpg --sign-key 1BD97A6A154E7810EE0BC832E2F38302C8075E3D
Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Thu Dec 04 14:29:13 GMT 2025 - 4.7K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
* the application is running locally (e.g. on `localhost`) or in an internal network * and the application doesn't have any authentication, it expects that any request from the same network can be trusted. ## Example Attack { #example-attack } Imagine you build a way to run a local AI agent. It provides an API at ``` http://localhost:8000/v1/agents/multivac ``` There's also a frontend at
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0)