- Sort Score
- Num 10 results
- Language All
Results 251 - 260 of 790 for site (0.17 seconds)
-
src/main/resources/fess_indices/_aws/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.7K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/crawler/transformer/FessXpathTransformer.java
final byte[] bomBytes = new byte[UTF8_BOM_SIZE]; bis.mark(UTF8_BOM_SIZE); final int size = bis.read(bomBytes); if (size < 3 || !isUtf8BomBytes(bomBytes)) { bis.reset(); } final InputSource is = new InputSource(bis); if (responseData.getCharSet() != null) {
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 12 01:46:45 GMT 2026 - 55.3K bytes - Click Count (0) -
src/main/resources/fess_indices/_cloud/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.7K bytes - Click Count (0) -
cmd/notification.go
wg.Wait() xioutil.SafeClose(ch) }(&wg, ch) return ch } // ReloadSiteReplicationConfig - tells all peer minio nodes to reload the // site-replication configuration. func (sys *NotificationSys) ReloadSiteReplicationConfig(ctx context.Context) []error { errs := make([]error, len(sys.allPeerClients)) var wg sync.WaitGroup for index := range sys.peerClients {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 46K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
## Ризик CSRF { #csrf-risk } Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
## Beispielangriff { #example-attack } Stellen Sie sich vor, Sie bauen eine Möglichkeit, lokal einen KI-Agenten auszuführen. Er stellt eine API bereit unter ``` http://localhost:8000/v1/agents/multivac ``` Es gibt auch ein Frontend unter ``` http://localhost:8000 ``` /// tip | Tipp Beachten Sie, dass beide denselben Host haben. ///Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
compat/maven-model/pom.xml
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Sep 17 10:01:14 GMT 2025 - 7.1K bytes - Click Count (0) -
src/main/resources/fess_indices/fess/doc.json
}, "label": { "type": "keyword" }, "virtual_host": { "type": "keyword" }, "segment": { "type": "keyword" }, "site": { "type": "keyword" }, "title": { "type": "text", "analyzer": "standard_analyzer", "search_analyzer": "standard_search_analyzer",Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sun Mar 15 07:52:55 GMT 2026 - 11.8K bytes - Click Count (0) -
docs/changelogs/upgrading_to_okhttp_4.md
* **Cookie**: domain, expiresAt, hostOnly, httpOnly, name, path, persistent, value * **Dispatcher**: executorService * **FormBody**: size * **Handshake**: cipherSuite, localCertificates, localPrincipal, peerCertificates, peerPrincipal, tlsVersion * **HandshakeCertificates**: keyManager, trustManager * **Headers**: size * **HeldCertificate**: certificate, keyPair * **HttpLoggingInterceptor**: level
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 16:58:16 GMT 2022 - 10.9K bytes - Click Count (0) -
docs/ko/docs/advanced/strict-content-type.md
기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다. ## CSRF 위험 { #csrf-risk } 이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다. 이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다: - `Content-Type` 헤더가 없음(예: `Blob` 본문과 함께 `fetch()` 사용) - 그리고 어떠한 인증 자격 증명도 보내지 않음Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:56:39 GMT 2026 - 4K bytes - Click Count (0)