- Sort Score
- Num 10 results
- Language All
Results 251 - 260 of 332 for Site (0.18 seconds)
-
src/main/resources/fess_indices/_aws/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.7K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/crawler/transformer/FessXpathTransformer.java
} // segment putResultDataBody(dataMap, fessConfig.getIndexFieldSegment(), sessionId); // host putResultDataBody(dataMap, fessConfig.getIndexFieldHost(), getHost(url)); // site putResultDataBody(dataMap, fessConfig.getIndexFieldSite(), getSite(url, urlEncoding)); // filename if (StringUtil.isNotBlank(fileName)) {Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 12 01:46:45 GMT 2026 - 55.3K bytes - Click Count (0) -
cmd/notification.go
wg.Wait() xioutil.SafeClose(ch) }(&wg, ch) return ch } // ReloadSiteReplicationConfig - tells all peer minio nodes to reload the // site-replication configuration. func (sys *NotificationSys) ReloadSiteReplicationConfig(ctx context.Context) []error { errs := make([]error, len(sys.allPeerClients)) var wg sync.WaitGroup for index := range sys.peerClients {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 46K bytes - Click Count (0) -
src/main/resources/fess_indices/_cloud/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.7K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
## Ризик CSRF { #csrf-risk } Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
## CSRF-Risiko { #csrf-risk } Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario. Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
compat/maven-model/pom.xml
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Sep 17 10:01:14 GMT 2025 - 7.1K bytes - Click Count (0) -
src/main/resources/fess_indices/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.8K bytes - Click Count (0) -
docs/changelogs/upgrading_to_okhttp_4.md
[java_sams]: https://kotlinlang.org/docs/reference/java-interop.html#sam-conversions [kotlin_sams]: https://youtrack.jetbrains.com/issue/KT-11129 [mockito]: https://site.mockito.org/ [proguard_problems]: https://github.com/square/okhttp/issues/5167 [require_android_5]: https://code.cash.app/okhttp-3-13-requires-android-5
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 16:58:16 GMT 2022 - 10.9K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다: - `Content-Type` 헤더가 없음(예: `Blob` 본문과 함께 `fetch()` 사용) - 그리고 어떠한 인증 자격 증명도 보내지 않음Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0)