1
0
mirror of https://github.com/django/django.git synced 2025-08-21 01:09:13 +00:00

Fixed spelling of "logged-in" when used as an adjective in docs.

This commit is contained in:
mengxun 2025-08-19 23:43:05 +08:00 committed by GitHub
parent f02b49d2f3
commit f5c944b314
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 3 additions and 3 deletions

View File

@ -15,7 +15,7 @@ have loaded in a hidden frame or iframe.
An example of clickjacking An example of clickjacking
========================== ==========================
Suppose an online store has a page where a logged in user can click "Buy Now" to Suppose an online store has a page where a logged-in user can click "Buy Now" to
purchase an item. A user has chosen to stay logged into the store all the time purchase an item. A user has chosen to stay logged into the store all the time
for convenience. An attacker site might create an "I Like Ponies" button on one for convenience. An attacker site might create an "I Like Ponies" button on one
of their own pages, and load the store's page in a transparent iframe such that of their own pages, and load the store's page in a transparent iframe such that

View File

@ -783,7 +783,7 @@ uniquely identify the cache fragment:
{% load cache %} {% load cache %}
{% cache 500 sidebar request.user.username %} {% cache 500 sidebar request.user.username %}
.. sidebar for logged in user .. .. sidebar for logged-in user ..
{% endcache %} {% endcache %}
If :setting:`USE_I18N` is set to ``True`` the per-site middleware cache will If :setting:`USE_I18N` is set to ``True`` the per-site middleware cache will

View File

@ -75,7 +75,7 @@ control.
:ref:`CSRF protection works <how-csrf-works>` by checking for a secret in each :ref:`CSRF protection works <how-csrf-works>` by checking for a secret in each
POST request. This ensures that a malicious user cannot "replay" a form POST to POST request. This ensures that a malicious user cannot "replay" a form POST to
your website and have another logged in user unwittingly submit that form. The your website and have another logged-in user unwittingly submit that form. The
malicious user would have to know the secret, which is user specific (using a malicious user would have to know the secret, which is user specific (using a
cookie). cookie).