Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 61 - 70 of 194 for cois (0.02 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. docs/tr/docs/advanced/middleware.md

    # İleri Seviye Middleware { #advanced-middleware }
    
    Ana tutorial'da uygulamanıza [Özel Middleware](../tutorial/middleware.md) eklemeyi gördünüz.
    
    Ardından [`CORSMiddleware` ile CORS'u yönetmeyi](../tutorial/cors.md) de okudunuz.
    
    Bu bölümde diğer middleware'leri nasıl kullanacağımıza bakacağız.
    
    ## ASGI middleware'leri ekleme { #adding-asgi-middlewares }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 4.6K bytes
    - Click Count (0)
  2. cmd/dummy-handlers.go

    func (api objectAPIHandlers) DeleteBucketWebsiteHandler(w http.ResponseWriter, r *http.Request) {
    	writeSuccessResponseHeadersOnly(w)
    }
    
    // GetBucketCorsHandler - GET bucket cors, a dummy api
    func (api objectAPIHandlers) GetBucketCorsHandler(w http.ResponseWriter, r *http.Request) {
    	ctx := newContext(r, w, "GetBucketCors")
    
    	defer logger.AuditLog(ctx, w, r, mustGetClaimsFromToken(r))
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 13 15:25:16 GMT 2024
    - 8.8K bytes
    - Click Count (0)
  3. docs/minio-limits.md

    - BucketACL (Use [bucket policies](https://docs.min.io/community/minio-object-store/administration/identity-access-management/policy-based-access-control.html) instead)
    - BucketCORS (CORS enabled by default on all buckets for all HTTP verbs, you can optionally restrict the CORS domains)
    - BucketWebsite (Use [`caddy`](https://github.com/caddyserver/caddy) or [`nginx`](https://www.nginx.com/resources/wiki/))
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 6K bytes
    - Click Count (0)
  4. docs/tr/docs/advanced/strict-content-type.md

    ## CSRF Riski { #csrf-risk }
    
    Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar.
    
    Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:
    
    - bir Content-Type header’ı yoksa (örn. body olarak Blob ile fetch() kullanıldığında)
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:51:35 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  5. docs/pt/docs/async.md

    <img src="/img/async/concurrent-burgers/concurrent-burgers-01.png" class="illustration">
    
    Então chega a sua vez, você pede dois saborosos hambúrgueres para você e seu _crush_.  🍔🍔
    
    <img src="/img/async/concurrent-burgers/concurrent-burgers-02.png" class="illustration">
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 25.2K bytes
    - Click Count (0)
  6. docs/pt/docs/index.md

    ## **Typer**, o FastAPI das interfaces de linhas de comando { #typer-the-fastapi-of-clis }
    
    <a href="https://typer.tiangolo.com"><img src="https://typer.tiangolo.com/img/logo-margin/logo-margin-vector.svg" style="width: 20%;"></a>
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 22.7K bytes
    - Click Count (0)
  7. docs/uk/docs/advanced/strict-content-type.md

    Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії.
    
    Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:
    
    * не мають заголовка `Content-Type` (наприклад, використовуючи `fetch()` з тілом типу `Blob`)
    * і не надсилають жодних облікових даних автентифікації.
    
    Такий тип атаки головним чином актуальний, коли:
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:25:54 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  8. docs/de/docs/advanced/strict-content-type.md

    Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario.
    
    Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:
    
    * keinen `Content-Type`-Header haben (z. B. mit `fetch()` und einem `Blob`-Body)
    * und keine Authentifizierungsdaten senden.
    
    Diese Art von Angriff ist vor allem relevant, wenn:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  9. docs/zh/docs/advanced/strict-content-type.md

    默认情况下,FastAPI 对 JSON 请求体使用严格的 `Content-Type` 头检查。这意味着,JSON 请求必须包含有效的 `Content-Type` 头(例如 `application/json`),其请求体才会被按 JSON 解析。
    
    ## CSRF 风险 { #csrf-risk }
    
    此默认行为在一个非常特定的场景下,可防御一类跨站请求伪造(CSRF)攻击。
    
    这类攻击利用了浏览器的一个事实:当请求满足以下条件时,浏览器允许脚本在不进行任何 CORS 预检的情况下直接发送请求:
    
    - 没有 `Content-Type` 头(例如使用 `fetch()` 携带 `Blob` 作为 body)
    - 且不发送任何认证凭据。
    
    这种攻击主要在以下情况下相关:
    
    - 应用在本地(如 `localhost`)或内网中运行
    - 且应用没有任何认证,假定来自同一网络的请求都可信。
    
    ## 攻击示例 { #example-attack }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 14:29:48 GMT 2026
    - 3K bytes
    - Click Count (0)
  10. docs/en/docs/advanced/strict-content-type.md

    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body)
    * and don't send any authentication credentials.
    
    This type of attack is mainly relevant when:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
Back to Top