mirror of
https://github.com/django/django.git
synced 2025-08-25 19:29:14 +00:00
[5.2.x] Fixed spelling of "logged-in" when used as an adjective in docs.
Backport of f5c944b3141c58bb4a5c7bbca61180b2ad7c13aa from main.
This commit is contained in:
parent
9a720d5c50
commit
38844c348b
@ -15,7 +15,7 @@ have loaded in a hidden frame or iframe.
|
|||||||
An example of clickjacking
|
An example of clickjacking
|
||||||
==========================
|
==========================
|
||||||
|
|
||||||
Suppose an online store has a page where a logged in user can click "Buy Now" to
|
Suppose an online store has a page where a logged-in user can click "Buy Now" to
|
||||||
purchase an item. A user has chosen to stay logged into the store all the time
|
purchase an item. A user has chosen to stay logged into the store all the time
|
||||||
for convenience. An attacker site might create an "I Like Ponies" button on one
|
for convenience. An attacker site might create an "I Like Ponies" button on one
|
||||||
of their own pages, and load the store's page in a transparent iframe such that
|
of their own pages, and load the store's page in a transparent iframe such that
|
||||||
|
@ -783,7 +783,7 @@ uniquely identify the cache fragment:
|
|||||||
|
|
||||||
{% load cache %}
|
{% load cache %}
|
||||||
{% cache 500 sidebar request.user.username %}
|
{% cache 500 sidebar request.user.username %}
|
||||||
.. sidebar for logged in user ..
|
.. sidebar for logged-in user ..
|
||||||
{% endcache %}
|
{% endcache %}
|
||||||
|
|
||||||
If :setting:`USE_I18N` is set to ``True`` the per-site middleware cache will
|
If :setting:`USE_I18N` is set to ``True`` the per-site middleware cache will
|
||||||
|
@ -75,7 +75,7 @@ control.
|
|||||||
|
|
||||||
:ref:`CSRF protection works <how-csrf-works>` by checking for a secret in each
|
:ref:`CSRF protection works <how-csrf-works>` by checking for a secret in each
|
||||||
POST request. This ensures that a malicious user cannot "replay" a form POST to
|
POST request. This ensures that a malicious user cannot "replay" a form POST to
|
||||||
your website and have another logged in user unwittingly submit that form. The
|
your website and have another logged-in user unwittingly submit that form. The
|
||||||
malicious user would have to know the secret, which is user specific (using a
|
malicious user would have to know the secret, which is user specific (using a
|
||||||
cookie).
|
cookie).
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user