Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 31 - 40 of 613 for script3 (0.08 seconds)

  1. docs/fr/docs/_llm-test.md

    # Fichier de test LLM { #llm-test-file }
    
    Ce document teste si le <abbr title="Large Language Model - Grand modèle de langage">LLM</abbr>, qui traduit la documentation, comprend le `general_prompt` dans `scripts/translate.py` et l’invite spécifique à la langue dans `docs/{language code}/llm-prompt.md`. L’invite spécifique à la langue est ajoutée à la fin de `general_prompt`.
    
    Les tests ajoutés ici seront visibles par tous les concepteurs d’invites spécifiques à chaque langue.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 12.8K bytes
    - Click Count (0)
  2. docs/es/docs/advanced/strict-content-type.md

    Este comportamiento por defecto provee protección contra una clase de ataques de **Cross-Site Request Forgery (CSRF)** en un escenario muy específico.
    
    Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando:
    
    * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`)
    * y no envían credenciales de autenticación.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:12:26 GMT 2026
    - 3.4K bytes
    - Click Count (0)
  3. docs/pt/docs/_llm-test.md

    # Arquivo de teste de LLM { #llm-test-file }
    
    Este documento testa se o <abbr title="Large Language Model - Modelo de Linguagem de Grande Porte">LLM</abbr>, que traduz a documentação, entende o `general_prompt` em `scripts/translate.py` e o prompt específico do idioma em `docs/{language code}/llm-prompt.md`. O prompt específico do idioma é anexado ao `general_prompt`.
    
    Os testes adicionados aqui serão vistos por todos os designers dos prompts específicos de idioma.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 12.1K bytes
    - Click Count (0)
  4. docs/en/docs/advanced/strict-content-type.md

    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    * and don't send any authentication credentials.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  5. docs/pt/docs/advanced/strict-content-type.md

    Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico.
    
    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`)
    - e não enviam nenhuma credencial de autenticação.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
  6. docs/en/docs/_llm-test.md

    # LLM test file { #llm-test-file }
    
    This document tests if the <abbr title="Large Language Model">LLM</abbr>, which translates the documentation, understands the `general_prompt` in `scripts/translate.py` and the language specific prompt in `docs/{language code}/llm-prompt.md`. The language specific prompt is appended to `general_prompt`.
    
    Tests added here will be seen by all designers of language specific prompts.
    
    Use as follows:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 11K bytes
    - Click Count (0)
  7. docs/fr/docs/advanced/strict-content-type.md

    Ce comportement par défaut offre une protection contre une catégorie d’attaques de Cross-Site Request Forgery (CSRF) dans un scénario très spécifique.
    
    Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils :
    
    * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:33:45 GMT 2026
    - 3.9K bytes
    - Click Count (0)
  8. docs/tr/docs/virtual-environments.md

    ////
    
    //// tab | Windows PowerShell
    
    <div class="termy">
    
    ```console
    $ .venv\Scripts\Activate.ps1
    ```
    
    </div>
    
    ////
    
    //// tab | Windows Bash
    
    Ya da Windows'ta Bash kullanıyorsanız (örn. [Git Bash](https://gitforwindows.org/)):
    
    <div class="termy">
    
    ```console
    $ source .venv/Scripts/activate
    ```
    
    </div>
    
    ////
    
    /// tip | İpucu
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 23.5K bytes
    - Click Count (0)
  9. docs/de/docs/virtual-environments.md

    ////
    
    //// tab | Windows PowerShell
    
    <div class="termy">
    
    ```console
    $ .venv\Scripts\Activate.ps1
    ```
    
    </div>
    
    ////
    
    //// tab | Windows Bash
    
    Oder wenn Sie Bash für Windows verwenden (z. B. [Git Bash](https://gitforwindows.org/)):
    
    <div class="termy">
    
    ```console
    $ source .venv/Scripts/activate
    ```
    
    </div>
    
    ////
    
    /// tip | Tipp
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:58:09 GMT 2026
    - 24.8K bytes
    - Click Count (0)
  10. docs/en/docs/virtual-environments.md

    ////
    
    //// tab | Windows PowerShell
    
    <div class="termy">
    
    ```console
    $ .venv\Scripts\Activate.ps1
    ```
    
    </div>
    
    ////
    
    //// tab | Windows Bash
    
    Or if you use Bash for Windows (e.g. [Git Bash](https://gitforwindows.org/)):
    
    <div class="termy">
    
    ```console
    $ source .venv/Scripts/activate
    ```
    
    </div>
    
    ////
    
    /// tip
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 22.1K bytes
    - Click Count (0)
Back to Top