Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 81 - 90 of 383 for bletch (0.22 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. src/main/java/org/codelibs/fess/ds/callback/FileListIndexUpdateCallbackImpl.java

        protected CrawlerClientFactory crawlerClientFactory;
    
        /**
         * List of URLs to be deleted, cached for batch processing.
         * All access is synchronized via indexUpdateCallback lock.
         */
        protected List<String> deleteUrlList = new ArrayList<>();
    
        /** Maximum size of the delete URL cache before batch deletion is triggered. */
        protected int maxDeleteDocumentCacheSize;
    
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Nov 28 16:29:12 GMT 2025
    - 29.7K bytes
    - Click Count (3)
  2. docs/ru/docs/advanced/strict-content-type.md

    Эти атаки используют то, что браузеры позволяют скриптам отправлять запросы без выполнения CORS preflight, когда они:
    
    - не имеют заголовка `Content-Type` (например, при использовании `fetch()` с телом `Blob`)
    - и не отправляют никаких учетных данных аутентификации.
    
    Этот тип атак в основном актуален, когда:
    
    - приложение запускается локально (например, на `localhost`) или во внутренней сети
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 5.6K bytes
    - Click Count (0)
  3. benchmarks/src/main/java/org/elasticsearch/benchmark/search/aggregations/TermsReduceBenchmark.java

                SearchProgressListener.NOOP,
                shards.size(),
                exc -> {}
            );
            CountDownLatch latch = new CountDownLatch(shards.size());
            for (int i = 0; i < shards.size(); i++) {
                consumer.consumeResult(shards.get(i), () -> latch.countDown());
            }
            latch.await();
            SearchPhaseController.ReducedQueryPhase phase = consumer.reduce();
            executor.shutdownNow();
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Fri Aug 20 15:45:38 GMT 2021
    - 8.1K bytes
    - Click Count (0)
  4. src/main/java/jcifs/internal/smb1/AndXServerMessageBlock.java

         */
        @Override
        public ServerMessageBlock getNextResponse() {
            return this.andx;
        }
    
        /**
         * Gets the batch limit for chained commands
         * @param cfg the configuration
         * @param cmd the command byte
         * @return the batch limit
         */
        protected int getBatchLimit(final Configuration cfg, final byte cmd) {
            /*
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 15.8K bytes
    - Click Count (0)
  5. dbflute_fess/dfprop/littleAdjustmentMap.dfprop

        # - - - - - - - - - -/
    
        # /- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
        # o cursorSelectFetchSize: (NotRequired - Default null)
        #  The fetch size of JDBC parameter for cursor select.
        #  For example, specify Integer.MIN_VALUE to enable fetch of MySQL.
        #
        #; cursorSelectFetchSize = Integer.MIN_VALUE
        # - - - - - - - - - -/
    
        # /- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Jul 25 06:04:16 GMT 2015
    - 8.8K bytes
    - Click Count (0)
  6. docs/zh/docs/advanced/strict-content-type.md

    ## CSRF 风险 { #csrf-risk }
    
    此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。
    
    这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求:
    
    - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body)
    - 且不发送任何认证凭据。
    
    这种攻击主要在以下情况下相关:
    
    - 应用在本地(如 `localhost`)或内网中运行
    - 且应用没有任何认证,假定来自同一网络的请求都可信。
    
    ## 攻击示例 { #example-attack }
    
    假设你构建了一个本地运行的 AI 代理。
    
    它提供了一个 API,地址为
    
    ```
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 14:29:48 GMT 2026
    - 3K bytes
    - Click Count (0)
  7. .github/workflows/upgrade-to-latest-wrapper.yml

        steps:
          - name: Checkout repository
            uses: actions/checkout@v6
            with:
              ref: devprod/upgrade-to-latest-wrapper
              token: ${{ secrets.GITHUB_TOKEN }}
              fetch-depth: 0
          - name: Setup java
            uses: actions/setup-java@v5
            with:
              distribution: temurin
              java-version: 17
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Thu Nov 20 22:15:20 GMT 2025
    - 1.3K bytes
    - Click Count (0)
  8. .github/workflows/vulncheck.yml

    name: VulnCheck
    on:
      pull_request:
        branches:
          - master
    
      push:
        branches:
          - master
    
    permissions:
      contents: read # to fetch code (actions/checkout)
    
    jobs:
      vulncheck:
        name: Analysis
        runs-on: ubuntu-latest
        steps:
          - name: Check out code into the Go module directory
            uses: actions/checkout@v4
          - name: Set up Go
            uses: actions/setup-go@v5
            with:
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Apr 24 23:34:11 GMT 2025
    - 682 bytes
    - Click Count (0)
  9. src/main/java/org/codelibs/core/sql/StatementUtil.java

            } catch (final SQLException ex) {
                throw new SQLRuntimeException(ex);
            }
        }
    
        /**
         * Sets the fetch size.
         *
         * @param statement
         *            {@link Statement}. Must not be {@literal null}.
         * @param fetchSize
         *            Fetch size.
         * @see Statement#setFetchSize(int)
         */
        public static void setFetchSize(final Statement statement, final int fetchSize) {
    Created: Fri Apr 03 20:58:12 GMT 2026
    - Last Modified: Thu Jul 31 08:16:49 GMT 2025
    - 5K bytes
    - Click Count (0)
  10. docs/es/docs/advanced/strict-content-type.md

    Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando:
    
    * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`)
    * y no envían credenciales de autenticación.
    
    Este tipo de ataque es relevante principalmente cuando:
    
    * la aplicación corre localmente (p. ej. en `localhost`) o en una red interna
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:12:26 GMT 2026
    - 3.4K bytes
    - Click Count (0)
Back to Top