- Sort Score
- Num 10 results
- Language All
Results 61 - 70 of 194 for cois (0.02 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
docs/tr/docs/advanced/middleware.md
# İleri Seviye Middleware { #advanced-middleware } Ana tutorial'da uygulamanıza [Özel Middleware](../tutorial/middleware.md) eklemeyi gördünüz. Ardından [`CORSMiddleware` ile CORS'u yönetmeyi](../tutorial/cors.md) de okudunuz. Bu bölümde diğer middleware'leri nasıl kullanacağımıza bakacağız. ## ASGI middleware'leri ekleme { #adding-asgi-middlewares }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 4.6K bytes - Click Count (0) -
cmd/dummy-handlers.go
func (api objectAPIHandlers) DeleteBucketWebsiteHandler(w http.ResponseWriter, r *http.Request) { writeSuccessResponseHeadersOnly(w) } // GetBucketCorsHandler - GET bucket cors, a dummy api func (api objectAPIHandlers) GetBucketCorsHandler(w http.ResponseWriter, r *http.Request) { ctx := newContext(r, w, "GetBucketCors") defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 13 15:25:16 GMT 2024 - 8.8K bytes - Click Count (0) -
docs/minio-limits.md
- BucketACL (Use [bucket policies](https://docs.min.io/community/minio-object-store/administration/identity-access-management/policy-based-access-control.html) instead) - BucketCORS (CORS enabled by default on all buckets for all HTTP verbs, you can optionally restrict the CORS domains) - BucketWebsite (Use [`caddy`](https://github.com/caddyserver/caddy) or [`nginx`](https://www.nginx.com/resources/wiki/))
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 6K bytes - Click Count (0) -
docs/tr/docs/advanced/strict-content-type.md
## CSRF Riski { #csrf-risk } Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar. Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır: - bir Content-Type header’ı yoksa (örn. body olarak Blob ile fetch() kullanıldığında)Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:51:35 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/pt/docs/async.md
<img src="/img/async/concurrent-burgers/concurrent-burgers-01.png" class="illustration"> Então chega a sua vez, você pede dois saborosos hambúrgueres para você e seu _crush_. 🍔🍔 <img src="/img/async/concurrent-burgers/concurrent-burgers-02.png" class="illustration">
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 25.2K bytes - Click Count (0) -
docs/pt/docs/index.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 22.7K bytes - Click Count (0) -
docs/uk/docs/advanced/strict-content-type.md
Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії. Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони: * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`) * і не надсилають жодних облікових даних автентифікації. Такий тип атаки головним чином актуальний, коли:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:25:54 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/de/docs/advanced/strict-content-type.md
Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario. Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie: * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body) * und keine Authentifizierungsdaten senden. Diese Art von Angriff ist vor allem relevant, wenn:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:48:21 GMT 2026 - 3.6K bytes - Click Count (0) -
docs/zh/docs/advanced/strict-content-type.md
默认情况下,FastAPI 对 JSON 请求体使用严格的 `Content-Type` 头检查。这意味着,JSON 请求必须包含有效的 `Content-Type` 头(例如 `application/json`),其请求体才会被按 JSON 解析。 ## CSRF 风险 { #csrf-risk } 此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。 这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求: - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body) - 且不发送任何认证凭据。 这种攻击主要在以下情况下相关: - 应用在本地(如 `localhost`)或内网中运行 - 且应用没有任何认证,假定来自同一网络的请求都可信。 ## 攻击示例 { #example-attack }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:29:48 GMT 2026 - 3K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario. These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they: * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body) * and don't send any authentication credentials. This type of attack is mainly relevant when:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0)