mirror of
https://github.com/django/django.git
synced 2024-12-22 09:05:43 +00:00
Changed docs and a code comment to use gender-neutral pronouns.
Follow up to e1b7723817
.
This commit is contained in:
parent
fed8129276
commit
477c800443
@ -142,7 +142,7 @@ Pull requests at GitHub have only two states: open and closed. The committer
|
||||
who will deal with your pull request has only two options: merge it or close
|
||||
it. For this reason, it isn't useful to make a pull request until the code is
|
||||
ready for merging -- or sufficiently close that a committer will finish it
|
||||
himself.
|
||||
themselves.
|
||||
|
||||
Rebasing branches
|
||||
-----------------
|
||||
|
@ -186,7 +186,7 @@ provided by the admin.
|
||||
|
||||
.. _custom-admin-action:
|
||||
|
||||
For example, we can use ``self`` to flash a message to the user informing her
|
||||
For example, we can use ``self`` to flash a message to the user informing them
|
||||
that the action was successful::
|
||||
|
||||
from django.contrib import messages
|
||||
|
@ -32,7 +32,7 @@ Mitigating a remote-code execution vulnerability in :mod:`django.contrib.session
|
||||
session data before storing it in the backend. If you're using the :ref:`signed
|
||||
cookie session backend<cookie-session-backend>` and :setting:`SECRET_KEY` is
|
||||
known by an attacker (there isn't an inherent vulnerability in Django that
|
||||
would cause it to leak), the attacker could insert a string into his session
|
||||
would cause it to leak), the attacker could insert a string into their session
|
||||
which, when unpickled, executes arbitrary code on the server. The technique for
|
||||
doing so is simple and easily available on the internet. Although the cookie
|
||||
session storage signs the cookie-stored data to prevent tampering, a
|
||||
|
@ -797,7 +797,7 @@ Historically, :mod:`django.contrib.sessions` used :mod:`pickle` to serialize
|
||||
session data before storing it in the backend. If you're using the :ref:`signed
|
||||
cookie session backend<cookie-session-backend>` and :setting:`SECRET_KEY` is
|
||||
known by an attacker (there isn't an inherent vulnerability in Django that
|
||||
would cause it to leak), the attacker could insert a string into his session
|
||||
would cause it to leak), the attacker could insert a string into their session
|
||||
which, when unpickled, executes arbitrary code on the server. The technique for
|
||||
doing so is simple and easily available on the internet. Although the cookie
|
||||
session storage signs the cookie-stored data to prevent tampering, a
|
||||
|
@ -185,7 +185,7 @@ Queries can go round in circles::
|
||||
>>> Reporter.objects.filter(article__reporter=r).distinct()
|
||||
<QuerySet [<Reporter: John Smith>]>
|
||||
|
||||
If you delete a reporter, his articles will be deleted (assuming that the
|
||||
If you delete a reporter, their articles will be deleted (assuming that the
|
||||
ForeignKey was defined with :attr:`django.db.models.ForeignKey.on_delete` set to
|
||||
``CASCADE``, which is the default)::
|
||||
|
||||
|
@ -370,7 +370,7 @@ class ManyToOneTests(TestCase):
|
||||
pub_date=datetime.date(2005, 7, 27),
|
||||
reporter_id=str(self.r.id),
|
||||
)
|
||||
# If you delete a reporter, his articles will be deleted.
|
||||
# If you delete a reporter, their articles will be deleted.
|
||||
self.assertSequenceEqual(
|
||||
Article.objects.all(),
|
||||
[new_article4, new_article1, new_article2, new_article3, self.a],
|
||||
|
@ -24,4 +24,4 @@ def template_response_view(request):
|
||||
|
||||
|
||||
def snark(request):
|
||||
return HttpResponse('Found him!')
|
||||
return HttpResponse('Found them!')
|
||||
|
Loading…
Reference in New Issue
Block a user