- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 1,772 for content1 (0.05 seconds)
-
docs/pt/docs/advanced/strict-content-type.md
# Verificação Estrita de Content-Type { #strict-content-type-checking } Por padrão, o **FastAPI** usa verificação estrita do cabeçalho `Content-Type` para corpos de requisição JSON; isso significa que requisições JSON devem incluir um `Content-Type` válido (por exemplo, `application/json`) para que o corpo seja interpretado como JSON. ## Risco de CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
# Vérifier strictement le Content-Type { #strict-content-type-checking } Par défaut, FastAPI applique une vérification stricte de l’en-tête `Content-Type` pour les corps de requêtes JSON ; cela signifie que les requêtes JSON doivent inclure un en-tête `Content-Type` valide (par ex. `application/json`) pour que le corps soit analysé comme JSON. ## Risque CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
docs/zh-hant/docs/advanced/strict-content-type.md
# 嚴格的 Content-Type 檢查 { #strict-content-type-checking } 預設情況下,FastAPI 會對 JSON 請求主體使用嚴格的 `Content-Type` 標頭檢查。也就是說,JSON 請求必須包含有效的 `Content-Type` 標頭(例如 `application/json`),請求主體(body)才能被解析為 JSON。 ## CSRF 風險 { #csrf-risk } 這個預設行為在某個非常特定的情境下,能對一類跨站請求偽造(CSRF, Cross-Site Request Forgery)攻擊提供保護。 這類攻擊利用了瀏覽器在以下情況下允許腳本發送請求而不進行任何 CORS 預檢(preflight)檢查的事實: - 沒有 `Content-Type` 標頭(例如以 `fetch()` 並使用 `Blob` 作為 body) - 且沒有送出任何身分驗證憑證 這種攻擊主要與以下情境相關:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:33:04 GMT 2026 - 3.1K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
# 엄격한 Content-Type 확인 { #strict-content-type-checking } 기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0) -
docs/ja/docs/advanced/strict-content-type.md
# Content-Type の厳格チェック { #strict-content-type-checking } 既定では、FastAPI は JSON リクエストボディに対して厳格な `Content-Type` ヘッダーのチェックを行います。つまり、JSON のリクエストを JSON として解析するには、有効な `Content-Type` ヘッダー(例: `application/json`)を必ず含める必要があります。 ## CSRF のリスク { #csrf-risk } この既定の挙動は、ある特定の状況における Cross-Site Request Forgery(CSRF)攻撃の一種に対する保護を提供します。 これらの攻撃は、次の条件を満たすときにブラウザが CORS のプリフライトチェックを行わずにスクリプトからリクエストを送信できる事実を悪用します。 - `Content-Type` ヘッダーがない(例: `Blob` をボディにして `fetch()` を使う)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:55:22 GMT 2026 - 4.4K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/query/QueryCommandTemplateMethodTest.java
FessConfig fessConfig = ComponentUtil.getFessConfig(); QueryContext context1 = new QueryContext("test", true); QueryContext context2 = new QueryContext("test", true); // Using template method QueryBuilder result1 = queryCommand.convertWithFieldCheck(fessConfig, context1, "title", "test", 1.0f, (field, boost) -> QueryBuilders.matchQuery(field, "test").boost(boost),
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 12.5K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/lease/DirectoryLeaseContextTest.java
DirectoryLeaseContext context = new DirectoryLeaseContext(key, leaseState, scope); assertEquals(key, context.getLeaseKey()); assertEquals(leaseState, context.getLeaseState()); assertEquals(scope, context.getCacheScope()); assertEquals(30000L, context.getMaxCacheAge()); assertTrue(context.isNotificationEnabled()); assertEquals(0, context.getNotificationFilter()); }Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 23 01:47:47 GMT 2025 - 10.1K bytes - Click Count (0) -
doc/README.md
That will merge the `.md` files in `next` into a single file. Atomically (as close to it as possible) add that file to `_content/doc` directory of the website repository and remove the `doc/next` directory in this repository. To begin the next release development cycle, populate the contents of `next` with those of `initial`. From the repo root: > cd doc > cp -R initial/ nextCreated: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon Jul 22 17:55:04 GMT 2024 - 3.1K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/MultipartBodyTest.kt
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 10.5K bytes - Click Count (0) -
cmd/api-response.go
} content.Key = s3EncodeName(object.Name, encodingType) content.LastModified = amztime.ISO8601Format(object.ModTime.UTC()) if object.ETag != "" { content.ETag = "\"" + object.ETag + "\"" } content.Size = object.Size if object.StorageClass != "" { content.StorageClass = filterStorageClass(ctx, object.StorageClass) } else { content.StorageClass = globalMinioDefaultStorageClass } content.Owner = owner
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Oct 24 04:05:19 GMT 2025 - 35K bytes - Click Count (0)