Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 111 - 120 of 304 for nors (0.02 seconds)

  1. docs/tr/docs/advanced/strict-content-type.md

    ## CSRF Riski { #csrf-risk }
    
    Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar.
    
    Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:
    
    - bir Content-Type header’ı yoksa (örn. body olarak Blob ile fetch() kullanıldığında)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:51:35 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  2. docs/fr/docs/translation-banner.md

    Cette traduction a été réalisée par une IA guidée par des humains. 🤝
    
    Elle peut contenir des erreurs d'interprétation du sens original, ou paraître peu naturelle, etc. 🤖
    
    Vous pouvez améliorer cette traduction en [nous aidant à mieux guider le LLM d'IA](https://fastapi.tiangolo.com/fr/contributing/#translations).
    
    [Version anglaise](ENGLISH_VERSION_URL)
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Sat Feb 14 08:12:41 GMT 2026
    - 425 bytes
    - Click Count (0)
  3. docs/uk/docs/advanced/strict-content-type.md

    Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії.
    
    Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:
    
    * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`)
    * і не надсилають жодних облікових даних автентифікації.
    
    Такий тип атаки головним чином актуальний, коли:
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:25:54 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  4. docs/fr/docs/advanced/security/http-basic-auth.md

    Pour gérer cela, nous convertissons d'abord `username` et `password` en `bytes` en les encodant en UTF-8.
    
    Nous pouvons ensuite utiliser `secrets.compare_digest()` pour vérifier que `credentials.username` est « stanleyjobson » et que `credentials.password` est « swordfish ».
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 5.8K bytes
    - Click Count (0)
  5. docs/de/docs/advanced/strict-content-type.md

    Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario.
    
    Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:
    
    * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body)
    * und keine Authentifizierungsdaten senden.
    
    Diese Art von Angriff ist vor allem relevant, wenn:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  6. docs/fr/docs/advanced/dataclasses.md

    Dans ce cas, vous pouvez simplement remplacer les `dataclasses` standard par `pydantic.dataclasses`, qui est un remplacement drop‑in :
    
    {* ../../docs_src/dataclasses_/tutorial003_py310.py hl[1,4,7:10,13:16,22:24,27] *}
    
    1. Nous continuons à importer `field` depuis les `dataclasses` standard.
    
    2. `pydantic.dataclasses` est un remplacement drop‑in pour `dataclasses`.
    
    3. La dataclass `Author` inclut une liste de dataclasses `Item`.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 4.7K bytes
    - Click Count (0)
  7. docs/zh/docs/advanced/strict-content-type.md

    默认情况下,FastAPI 对 JSON 请求体使用严格的 `Content-Type` 头检查。这意味着,JSON 请求必须包含有效的 `Content-Type` 头(例如 `application/json`),其请求体才会被按 JSON 解析。
    
    ## CSRF 风险 { #csrf-risk }
    
    此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。
    
    这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求:
    
    - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body)
    - 且不发送任何认证凭据。
    
    这种攻击主要在以下情况下相关:
    
    - 应用在本地(如 `localhost`)或内网中运行
    - 且应用没有任何认证,假定来自同一网络的请求都可信。
    
    ## 攻击示例 { #example-attack }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 14:29:48 GMT 2026
    - 3K bytes
    - Click Count (0)
  8. docs/en/docs/advanced/strict-content-type.md

    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    * and don't send any authentication credentials.
    
    This type of attack is mainly relevant when:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  9. docs/pt/docs/advanced/strict-content-type.md

    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`)
    - e não enviam nenhuma credencial de autenticação.
    
    Esse tipo de ataque é relevante principalmente quando:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  10. docs_src/cors/tutorial001_py310.py

    from fastapi import FastAPI
    from fastapi.middleware.cors import CORSMiddleware
    
    app = FastAPI()
    
    origins = [
        "http://localhost.tiangolo.com",
        "https://localhost.tiangolo.com",
        "http://localhost",
        "http://localhost:8080",
    ]
    
    app.add_middleware(
        CORSMiddleware,
        allow_origins=origins,
        allow_credentials=True,
        allow_methods=["*"],
        allow_headers=["*"],
    )
    
    
    @app.get("/")
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 13:19:43 GMT 2026
    - 459 bytes
    - Click Count (0)
Back to Top