- Sort Score
- Num 10 results
- Language All
Results 451 - 460 of 2,125 for convert (0.04 seconds)
-
tests/test_generate_unique_id_function.py
"post": { "summary": "Post Root", "operationId": "foo_post_root", "requestBody": { "content": { "application/json": { "schema": { "$ref": "#/components/schemas/Body_foo_post_root"
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sun Feb 08 10:18:38 GMT 2026 - 75K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/CallTest.kt
"encrypted response from the origin server", ) val connect = server.takeRequest() assertThat(connect.headers["Private"]).isNull() assertThat(connect.headers["User-Agent"]).isEqualTo(USER_AGENT) assertThat(connect.headers["Proxy-Connection"]).isEqualTo("Keep-Alive") assertThat(connect.headers["Host"]).isEqualTo("android.com:443") val get = server.takeRequest()
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Mar 15 09:02:18 GMT 2026 - 146.5K bytes - Click Count (0) -
tensorflow/c/c_api_experimental.cc
TF_CAPI_EXPORT extern void TFE_AbortCollectiveOps(TFE_Context* ctx, TF_Status* status) { tensorflow::EagerContext* context = tensorflow::ContextFromInterface(tensorflow::unwrap(ctx)); auto collective_executor_handle = context->GetCollectiveExecutorHandle(); collective_executor_handle->get()->StartAbort(status->status); } TF_CAPI_EXPORT extern void TFE_CollectiveOpsCheckPeerHealth(
Created: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Sat Oct 04 05:55:32 GMT 2025 - 29.4K bytes - Click Count (0) -
cmd/object-handlers-common.go
return true } } // Object content should be written to http.ResponseWriter return false } // Validates the preconditions. Returns true if PUT operation should not proceed. // Preconditions supported are: // // x-minio-source-mtime // x-minio-source-etag func checkPreconditionsPUT(ctx context.Context, w http.ResponseWriter, r *http.Request, objInfo ObjectInfo, opts ObjectOptions) bool {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Jul 23 12:36:06 GMT 2025 - 15.2K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
# Strict Content-Type Checking { #strict-content-type-checking } By default, **FastAPI** uses strict `Content-Type` header checking for JSON request bodies, this means that JSON requests **must** include a valid `Content-Type` header (e.g. `application/json`) in order for the body to be parsed as JSON. ## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
# Strikte Content-Type-Prüfung { #strict-content-type-checking } Standardmäßig verwendet **FastAPI** eine strikte Prüfung des `Content-Type`-Headers für JSON-Requestbodys. Das bedeutet, dass JSON-Requests einen gültigen `Content-Type`-Header (z. B. `application/json`) enthalten MÜSSEN, damit der Body als JSON geparst wird. ## CSRF-Risiko { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
# 엄격한 Content-Type 확인 { #strict-content-type-checking } 기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0) -
docs/ja/docs/advanced/strict-content-type.md
# Content-Type の厳格チェック { #strict-content-type-checking } 既定では、FastAPI は JSON リクエストボディに対して厳格な `Content-Type` ヘッダーのチェックを行います。つまり、JSON のリクエストを JSON として解析するには、有効な `Content-Type` ヘッダー(例: `application/json`)を必ず含める必要があります。 ## CSRF のリスク { #csrf-risk } この既定の挙動は、ある特定の状況における Cross-Site Request Forgery(CSRF)攻撃の一種に対する保護を提供します。 これらの攻撃は、次の条件を満たすときにブラウザが CORS のプリフライトチェックを行わずにスクリプトからリクエストを送信できる事実を悪用します。 - `Content-Type` ヘッダーがない(例: `Blob` をボディにして `fetch()` を使う)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:55:22 GMT 2026 - 4.4K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
# Vérifier strictement le Content-Type { #strict-content-type-checking } Par défaut, FastAPI applique une vérification stricte de l’en-tête `Content-Type` pour les corps de requêtes JSON ; cela signifie que les requêtes JSON doivent inclure un en-tête `Content-Type` valide (par ex. `application/json`) pour que le corps soit analysé comme JSON. ## Risque CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
# Verificação Estrita de Content-Type { #strict-content-type-checking } Por padrão, o **FastAPI** usa verificação estrita do cabeçalho `Content-Type` para corpos de requisição JSON; isso significa que requisições JSON devem incluir um `Content-Type` válido (por exemplo, `application/json`) para que o corpo seja interpretado como JSON. ## Risco de CSRF { #csrf-risk }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0)