- Sort Score
- Num 10 results
- Language All
Results 201 - 210 of 318 for sitt (0.06 seconds)
-
docs/en/docs/contributing.md
## Docs First, make sure you set up your environment as described above, that will install all the requirements. ### Docs live During local development, there is a script that builds the site and checks for any changes, live-reloading: <div class="termy"> ```console $ python ./scripts/docs.py live <span style="color: green;">[INFO]</span> Serving on http://127.0.0.1:8008
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Mar 23 13:59:26 GMT 2026 - 10.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/helper/ViewHelper.java
} buf.append(segment); return buf.toString(); } /** * Gets the site path for display purposes. * Extracts and formats the site path from document URL. * * @param docMap the document data map * @return the formatted site path */ public Object getSitePath(final Map<String, Object> docMap) {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 52.6K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/lifecycle/DefaultLifecycles.java
// wiring and reference and external source for the lifecycle configuration. @Named @Singleton public class DefaultLifecycles { public static final String[] STANDARD_LIFECYCLES = {"clean", "default", "site"}; private final Logger logger = LoggerFactory.getLogger(getClass()); // @Configuration(source="org/apache/maven/lifecycle/lifecycles.xml") private final Lookup lookup;Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Sat Apr 05 11:52:05 GMT 2025 - 6.6K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
## Ризик CSRF { #csrf-risk } Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
cmd/routers.go
// Limits all body and header sizes to a maximum fixed limit setRequestLimitMiddleware, // Validate all the incoming requests. setRequestValidityMiddleware, // Add upload forwarding middleware for site replication setUploadForwardingMiddleware, // Add bucket forwarding middleware setBucketForwardingMiddleware, // Add new middlewares here. } // configureServer handler returns final handler for the http server.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Mon Jul 29 18:10:04 GMT 2024 - 3.9K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/query/QueryCommandTest.java
@Override public String getIndexFieldHost() { return "host"; } @Override public String getIndexFieldSite() { return "site"; } @Override public String getIndexFieldLastModified() { return "last_modified"; } @OverrideCreated: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
## CSRF-Risiko { #csrf-risk } Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario. Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/ds/AbstractDataStore.java
// mimetype defaultDataMap.put(fessConfig.getIndexFieldMimetype(), mimeType); // title // content // cache // digest // host // site // url // anchor // content_length // last_modified // id // virtual_host defaultDataMap.put(fessConfig.getIndexFieldVirtualHost(),Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 7.6K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario. These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/app/service/DuplicateHostService.java
* * <p>Duplicate host configurations allow administrators to define hostname patterns * that should be treated as equivalent during crawling. This helps avoid indexing * duplicate content from the same logical site that may be accessible via different * hostnames (e.g., www.example.com and example.com).</p> */ public class DuplicateHostService extends FessAppService { /** * DBFlute behavior for duplicate host operations.
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Jul 17 08:28:31 GMT 2025 - 7.4K bytes - Click Count (0)