You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`appCsrfSecret`|`string \| string[]`| - |**Erforderlich.** Geheimer Schlüssel (oder Schlüssel) für die HMAC-Token-Generierung. Mehrere Schlüssel ermöglichen die Schlüsselrotation. |
80
+
|`appCsrfSecret`|`string \| string[]`| - |**Erforderlich.** Geheimer Schlüssel/Schlüssel für die HMAC-Token-Generierung. Mehrere Schlüssel ermöglichen die Schlüsselrotation. |
81
81
|`appCsrfLifetime`|`number`|`2592000` (30 Tage) | Token-Lebensdauer in Sekunden. Setzen Sie auf `0` für kein Ablaufdatum. |
82
82
|`appCsrfHeaderName`|`string`|`'x-csrf-token'`| Name des HTTP-Headers für die Token-Validierung. |
83
83
|`appCsrfMethods`|`string[]`|`['POST', 'PUT', 'DELETE', 'PATCH']`| HTTP-Methoden, die eine CSRF-Validierung erfordern. |
@@ -128,4 +128,33 @@ const app = new ExpressKit(nodekit, {
128
128
},
129
129
},
130
130
});
131
-
```
131
+
```
132
+
133
+
## Caching-Steuerung
134
+
135
+
Standardmäßig setzt ExpressKit `no-cache`-Header auf alle Antworten. Sie können dieses Verhalten global oder pro Route steuern.
Copy file name to clipboardExpand all lines: src/content/local-docs/libs/expresskit/README-es.md
+35-6Lines changed: 35 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ export default config;
58
58
59
59
ExpressKit proporciona protección integrada contra Cross-Site Request Forgery (CSRF) para asegurar tus aplicaciones contra solicitudes maliciosas de origen cruzado. El middleware CSRF genera y valida automáticamente tokens para solicitudes HTTP que cambian el estado.
60
60
61
-
### Configuración Básica
61
+
### Configuración básica
62
62
63
63
Para habilitar la protección CSRF, configura la clave secreta en tu configuración:
|`appCsrfSecret`|`string \| string[]`| - |**Requerido.** Clave(s) secreta(s) para la generación de tokens HMAC. Múltiples secretos permiten la rotación de claves. |
81
-
|`appCsrfLifetime`|`number`|`2592000` (30 días) |Vida útil del token en segundos. Establecer a `0` para que no expire. |
81
+
|`appCsrfLifetime`|`number`|`2592000` (30 días) |Duración del token en segundos. Establecer a `0` para que no expire. |
82
82
|`appCsrfHeaderName`|`string`|`'x-csrf-token'`| Nombre de la cabecera HTTP para la validación del token. |
|`appCsrfSecret`|`string \| string[]`| - |**Requis.** Clé(s) secrète(s) pour la génération de jetons HMAC. Plusieurs secrets permettent la rotation des clés. |
81
-
|`appCsrfLifetime`|`number`|`2592000` (30 jours) | Durée de vie du jeton en secondes. Définir à `0` pour aucune expiration. |
81
+
|`appCsrfLifetime`|`number`|`2592000` (30 jours) | Durée de vie du jeton en secondes. Définissez à `0` pour aucune expiration. |
82
82
|`appCsrfHeaderName`|`string`|`'x-csrf-token'`| Nom de l'en-tête HTTP pour la validation du jeton. |
Le paramètre `enableCaching` au niveau de la route remplace le réglage global. L'état de la mise en cache est disponible dans `req.routeInfo.enableCaching`.
Copy file name to clipboardExpand all lines: src/content/local-docs/libs/expresskit/README-ko.md
+37-8Lines changed: 37 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# ExpressKit
2
2
3
-
ExpressKit는 [express.js](https://expressjs.com/)를 위한 경량 래퍼로, [NodeKit](https://github.com/gravity-ui/nodekit)과 통합되며 요청 로깅, 추적 지원, 비동기 컨트롤러 및 미들웨어, 상세한 라우트 설명과 같은 유용한 기능을 제공합니다.
3
+
ExpressKit는 [NodeKit](https://github.com/gravity-ui/nodekit)과 통합되는 경량 [express.js](https://expressjs.com/) 래퍼로, 요청 로깅, 추적 지원, 비동기 컨트롤러 및 미들웨어, 상세한 라우트 설명과 같은 유용한 기능을 제공합니다.
0 commit comments