- Sort Score
- Num 10 results
- Language All
Results 81 - 90 of 383 for bletch (0.22 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/main/java/org/codelibs/fess/ds/callback/FileListIndexUpdateCallbackImpl.java
protected CrawlerClientFactory crawlerClientFactory; /** * List of URLs to be deleted, cached for batch processing. * All access is synchronized via indexUpdateCallback lock. */ protected List<String> deleteUrlList = new ArrayList<>(); /** Maximum size of the delete URL cache before batch deletion is triggered. */ protected int maxDeleteDocumentCacheSize;Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 29.7K bytes - Click Count (3) -
docs/ru/docs/advanced/strict-content-type.md
Эти атаки используют то, что браузеры позволяют скриптам отправлять запросы без выполнения CORS preflight, когда они: - не имеют заголовка `Content-Type` (например, при использовании `fetch()` с телом `Blob`) - и не отправляют никаких учетных данных аутентификации. Этот тип атак в основном актуален, когда: - приложение запускается локально (например, на `localhost`) или во внутренней сети
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 5.6K bytes - Click Count (0) -
benchmarks/src/main/java/org/elasticsearch/benchmark/search/aggregations/TermsReduceBenchmark.java
SearchProgressListener.NOOP, shards.size(), exc -> {} ); CountDownLatch latch = new CountDownLatch(shards.size()); for (int i = 0; i < shards.size(); i++) { consumer.consumeResult(shards.get(i), () -> latch.countDown()); } latch.await(); SearchPhaseController.ReducedQueryPhase phase = consumer.reduce(); executor.shutdownNow();Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Fri Aug 20 15:45:38 GMT 2021 - 8.1K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/AndXServerMessageBlock.java
*/ @Override public ServerMessageBlock getNextResponse() { return this.andx; } /** * Gets the batch limit for chained commands * @param cfg the configuration * @param cmd the command byte * @return the batch limit */ protected int getBatchLimit(final Configuration cfg, final byte cmd) { /*Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 15.8K bytes - Click Count (0) -
dbflute_fess/dfprop/littleAdjustmentMap.dfprop
# - - - - - - - - - -/ # /- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - # o cursorSelectFetchSize: (NotRequired - Default null) # The fetch size of JDBC parameter for cursor select. # For example, specify Integer.MIN_VALUE to enable fetch of MySQL. # #; cursorSelectFetchSize = Integer.MIN_VALUE # - - - - - - - - - -/ # /- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Jul 25 06:04:16 GMT 2015 - 8.8K bytes - Click Count (0) -
docs/zh/docs/advanced/strict-content-type.md
## CSRF 风险 { #csrf-risk } 此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。 这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求: - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body) - 且不发送任何认证凭据。 这种攻击主要在以下情况下相关: - 应用在本地(如 `localhost`)或内网中运行 - 且应用没有任何认证,假定来自同一网络的请求都可信。 ## 攻击示例 { #example-attack } 假设你构建了一个本地运行的 AI 代理。 它提供了一个 API,地址为 ```Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:29:48 GMT 2026 - 3K bytes - Click Count (0) -
.github/workflows/upgrade-to-latest-wrapper.yml
steps: - name: Checkout repository uses: actions/checkout@v6 with: ref: devprod/upgrade-to-latest-wrapper token: ${{ secrets.GITHUB_TOKEN }} fetch-depth: 0 - name: Setup java uses: actions/setup-java@v5 with: distribution: temurin java-version: 17Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Thu Nov 20 22:15:20 GMT 2025 - 1.3K bytes - Click Count (0) -
.github/workflows/vulncheck.yml
name: VulnCheck on: pull_request: branches: - master push: branches: - master permissions: contents: read # to fetch code (actions/checkout) jobs: vulncheck: name: Analysis runs-on: ubuntu-latest steps: - name: Check out code into the Go module directory uses: actions/checkout@v4 - name: Set up Go uses: actions/setup-go@v5 with:Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Apr 24 23:34:11 GMT 2025 - 682 bytes - Click Count (0) -
src/main/java/org/codelibs/core/sql/StatementUtil.java
} catch (final SQLException ex) { throw new SQLRuntimeException(ex); } } /** * Sets the fetch size. * * @param statement * {@link Statement}. Must not be {@literal null}. * @param fetchSize * Fetch size. * @see Statement#setFetchSize(int) */ public static void setFetchSize(final Statement statement, final int fetchSize) {
Created: Fri Apr 03 20:58:12 GMT 2026 - Last Modified: Thu Jul 31 08:16:49 GMT 2025 - 5K bytes - Click Count (0) -
docs/es/docs/advanced/strict-content-type.md
Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando: * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`) * y no envían credenciales de autenticación. Este tipo de ataque es relevante principalmente cuando: * la aplicación corre localmente (p. ej. en `localhost`) o en una red interna
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:12:26 GMT 2026 - 3.4K bytes - Click Count (0)