Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 51 - 60 of 93 for cftype (0.04 seconds)

  1. tensorflow/c/eager/c_api_unified_experimental_internal.h

     protected:
      explicit TracingContext(AbstractContextKind kind) : AbstractContext(kind) {}
    
     public:
      // Add a function parameter and return the corresponding tensor.
      virtual absl::Status AddParameter(DataType dtype,
                                        const PartialTensorShape& shape,
                                        TracingTensorHandle**) = 0;
    
      // Finalize this context and make a function out of it. The context is in a
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Sat Oct 12 05:11:17 GMT 2024
    - 5.2K bytes
    - Click Count (0)
  2. cmd/bucket-replication-utils.go

    //go:generate msgp -file=$GOFILE
    
    // replicatedTargetInfo struct represents replication info on a target
    type replicatedTargetInfo struct {
    	Arn                   string
    	Size                  int64
    	Duration              time.Duration
    	ReplicationAction     replicationAction // full or metadata only
    	OpType                replication.Type  // whether incoming replication, existing object, healing etc..
    	ReplicationStatus     replication.StatusType
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 26.1K bytes
    - Click Count (0)
  3. cmd/object-api-datatypes_gen.go

    	o = append(o, 0xac, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4d, 0x61, 0x72, 0x6b, 0x65, 0x72)
    	o = msgp.AppendBool(o, z.DeleteMarker)
    	// string "OpType"
    	o = append(o, 0xa6, 0x4f, 0x70, 0x54, 0x79, 0x70, 0x65)
    	o, err = z.OpType.MarshalMsg(o)
    	if err != nil {
    		err = msgp.WrapError(err, "OpType")
    		return
    	}
    	// string "EventType"
    	o = append(o, 0xa9, 0x45, 0x76, 0x65, 0x6e, 0x74, 0x54, 0x79, 0x70, 0x65)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 71.7K bytes
    - Click Count (0)
  4. docs/en/docs/advanced/strict-content-type.md

    # Strict Content-Type Checking { #strict-content-type-checking }
    
    By default, **FastAPI** uses strict `Content-Type` header checking for JSON request bodies, this means that JSON requests **must** include a valid `Content-Type` header (e.g. `application/json`) in order for the body to be parsed as JSON.
    
    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  5. docs/de/docs/advanced/strict-content-type.md

    # Strikte Content-Type-Prüfung { #strict-content-type-checking }
    
    Standardmäßig verwendet **FastAPI** eine strikte Prüfung des `Content-Type`-Headers für JSON-Requestbodys. Das bedeutet, dass JSON-Requests einen gültigen `Content-Type`-Header (z. B. `application/json`) enthalten MÜSSEN, damit der Body als JSON geparst wird.
    
    ## CSRF-Risiko { #csrf-risk }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  6. docs/ko/docs/advanced/strict-content-type.md

    # 엄격한 Content-Type 확인 { #strict-content-type-checking }
    
    기본적으로 **FastAPI**는 JSON 요청 본문에 대해 엄격한 `Content-Type` 헤더 검사를 사용합니다. 이는 JSON 요청의 본문을 JSON으로 파싱하려면 유효한 `Content-Type` 헤더(예: `application/json`)를 반드시 포함해야 함을 의미합니다.
    
    ## CSRF 위험 { #csrf-risk }
    
    이 기본 동작은 매우 특정한 시나리오에서 **Cross-Site Request Forgery (CSRF)** 공격의 한 유형에 대한 보호를 제공합니다.
    
    이러한 공격은 브라우저가 다음과 같은 경우 CORS 사전 요청(preflight) 검사를 수행하지 않고 스크립트가 요청을 보내도록 허용한다는 점을 악용합니다:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:56:39 GMT 2026
    - 4K bytes
    - Click Count (0)
  7. docs/ja/docs/advanced/strict-content-type.md

    # Content-Type の厳格チェック { #strict-content-type-checking }
    
    既定では、FastAPI は JSON リクエストボディに対して厳格な `Content-Type` ヘッダーのチェックを行います。つまり、JSON のリクエストを JSON として解析するには、有効な `Content-Type` ヘッダー(例: `application/json`)を必ず含める必要があります。
    
    ## CSRF のリスク { #csrf-risk }
    
    この既定の挙動は、ある特定の状況における Cross-Site Request Forgery(CSRF)攻撃の一種に対する保護を提供します。
    
    これらの攻撃は、次の条件を満たすときにブラウザが CORS のプリフライトチェックを行わずにスクリプトからリクエストを送信できる事実を悪用します。
    
    - `Content-Type` ヘッダーがない(例: `Blob` をボディにして `fetch()` を使う)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:55:22 GMT 2026
    - 4.4K bytes
    - Click Count (0)
  8. docs/fr/docs/advanced/strict-content-type.md

    # Vérifier strictement le Content-Type { #strict-content-type-checking }
    
    Par défaut, FastAPI applique une vérification stricte de l’en-tête `Content-Type` pour les corps de requêtes JSON ; cela signifie que les requêtes JSON doivent inclure un en-tête `Content-Type` valide (par ex. `application/json`) pour que le corps soit analysé comme JSON.
    
    ## Risque CSRF { #csrf-risk }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:33:45 GMT 2026
    - 3.9K bytes
    - Click Count (0)
  9. docs/pt/docs/advanced/strict-content-type.md

    # Verificação Estrita de Content-Type { #strict-content-type-checking }
    
    Por padrão, o **FastAPI** usa verificação estrita do cabeçalho `Content-Type` para corpos de requisição JSON; isso significa que requisições JSON devem incluir um `Content-Type` válido (por exemplo, `application/json`) para que o corpo seja interpretado como JSON.
    
    ## Risco de CSRF { #csrf-risk }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  10. docs/zh-hant/docs/advanced/strict-content-type.md

    # 嚴格的 Content-Type 檢查 { #strict-content-type-checking }
    
    預設情況下,FastAPI 會對 JSON 請求主體使用嚴格的 `Content-Type` 標頭檢查。也就是說,JSON 請求必須包含有效的 `Content-Type` 標頭(例如 `application/json`),請求主體(body)才能被解析為 JSON。
    
    ## CSRF 風險 { #csrf-risk }
    
    這個預設行為在某個非常特定的情境下,能對一類跨站請求偽造(CSRF, Cross-Site Request Forgery)攻擊提供保護。
    
    這類攻擊利用了瀏覽器在以下情況下允許腳本發送請求而不進行任何 CORS 預檢(preflight)檢查的事實:
    
    - 沒有 `Content-Type` 標頭(例如以 `fetch()` 並使用 `Blob` 作為 body)
    - 且沒有送出任何身分驗證憑證
    
    這種攻擊主要與以下情境相關:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 14:33:04 GMT 2026
    - 3.1K bytes
    - Click Count (0)
Back to Top