- Sort Score
- Num 10 results
- Language All
Results 311 - 320 of 437 for tlsg (0.03 seconds)
-
docs/zh-hant/docs/deployment/concepts.md
## 安全性 - HTTPS { #security-https } 在[前一章關於 HTTPS](https.md) 中,我們學到 HTTPS 如何為你的 API 提供加密。 我們也看到,HTTPS 通常由應用伺服器外部的元件提供,即 TLS Termination Proxy。 而且必須有某個東西負責續期 HTTPS 憑證,可能是同一個元件,也可能是不同的東西。 ### HTTPS 工具範例 { #example-tools-for-https } 你可以用來作為 TLS Termination Proxy 的工具包括: - Traefik - 自動處理憑證續期 ✨ - Caddy - 自動處理憑證續期 ✨ - Nginx - 搭配像 Certbot 這類外部元件進行憑證續期 - HAProxyCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 16.1K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/OkHostnameVerifier.kt
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package okhttp3.internal.tls import java.security.cert.CertificateParsingException import java.security.cert.X509Certificate import java.util.Locale import javax.net.ssl.HostnameVerifier import javax.net.ssl.SSLException
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 7.6K bytes - Click Count (0) -
api/go1.5.txt
pkg crypto/sha512, func Sum512_256([]uint8) [32]uint8 pkg crypto/tls, const TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 = 49196 pkg crypto/tls, const TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 uint16 pkg crypto/tls, const TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 = 49200 pkg crypto/tls, const TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 uint16 pkg crypto/tls, method (*Config) SetSessionTicketKeys([][32]uint8) pkg crypto/tls, type Certificate struct, SignedCertificateTimestamps [][]uint8
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jul 30 21:14:09 GMT 2015 - 46.6K bytes - Click Count (0) -
samples/guide/src/main/java/okhttp3/recipes/CustomCipherSuites.java
* certificates. */ private SSLSocketFactory defaultSslSocketFactory(X509TrustManager trustManager) throws NoSuchAlgorithmException, KeyManagementException { SSLContext sslContext = SSLContext.getInstance("TLS"); sslContext.init(null, new TrustManager[] { trustManager }, null); return sslContext.getSocketFactory(); } /** Returns a trust manager that trusts the VM's default certificate authorities. */
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Thu Mar 14 21:57:42 GMT 2019 - 6.5K bytes - Click Count (0) -
cmd/sts-errors.go
HTTPStatusCode: http.StatusBadRequest, }, ErrSTSInsecureConnection: { Code: "InsecureConnection", Description: "The request was made over a plain HTTP connection. A TLS connection is required.", HTTPStatusCode: http.StatusBadRequest, }, ErrSTSInvalidClientCertificate: { Code: "InvalidClientCertificate",Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Feb 05 00:29:41 GMT 2025 - 6K bytes - Click Count (1) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/client/ftp/FtpClient.java
Created: Sun Apr 12 03:50:13 GMT 2026 - Last Modified: Mon Nov 24 03:59:47 GMT 2025 - 40K bytes - Click Count (0) -
okhttp/src/jvmMain/kotlin/okhttp3/internal/platform/ConscryptPlatform.kt
// for version differences override fun newSSLContext(): SSLContext = // supports TLSv1.3 by default (version api is >= 1.4.0) SSLContext.getInstance("TLS", provider) override fun platformTrustManager(): X509TrustManager { val trustManagers = TrustManagerFactory .getInstance(TrustManagerFactory.getDefaultAlgorithm()) .apply {
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 4.6K bytes - Click Count (0) -
docs/de/docs/deployment/concepts.md
Und es muss etwas geben, das für die **Erneuerung der HTTPS-Zertifikate** zuständig ist, es könnte sich um dieselbe Komponente handeln oder um etwas anderes. ### Beispieltools für HTTPS { #example-tools-for-https } Einige der Tools, die Sie als TLS-Terminierungsproxy verwenden können, sind: * TraefikCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 21.4K bytes - Click Count (0) -
docs/en/docs/deployment/concepts.md
We also saw that HTTPS is normally provided by a component **external** to your application server, a **TLS Termination Proxy**. And there has to be something in charge of **renewing the HTTPS certificates**, it could be the same component or it could be something different. ### Example Tools for HTTPS { #example-tools-for-https } Some of the tools you could use as a TLS Termination Proxy are: * Traefik * Automatically handles certificates renewals ✨Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 18.5K bytes - Click Count (1) -
docs/ko/docs/deployment/docker.md
이제 다음과 같은 디렉터리 구조가 되어야 합니다: ``` . ├── app │ ├── __init__.py │ └── main.py ├── Dockerfile └── requirements.txt ``` #### TLS 종료 프록시의 배후 { #behind-a-tls-termination-proxy } Nginx나 Traefik 같은 TLS 종료 프록시(로드 밸런서) 뒤에서 컨테이너를 실행하고 있다면 `--proxy-headers` 옵션을 추가하세요. 이 옵션은 (FastAPI CLI를 통해) Uvicorn에게 해당 프록시가 보낸 헤더를 신뢰하도록 하여, 애플리케이션이 HTTPS 뒤에서 실행 중임을 알게 합니다. ```DockerfileCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 32.6K bytes - Click Count (0)