Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork5.3k
document old way of checking validity of CSRF token#5818
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
document old way of checking validity of CSRF token#5818
Uh oh!
There was an error while loading.Please reload this page.
Conversation
snoek09 commentedOct 20, 2015
| Q | A |
|---|---|
| Doc fix? | yes |
| New docs? | yes |
| Applies to | all |
| Fixed tickets | Related to#4668 |
xabbuh commentedOct 20, 2015
👍 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
DELETE in backticks?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
I checked the docs for mentions of HTTP methods. In a sentence they are never in backticks.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
👍
snoek09 commentedOct 24, 2015
@xabbuh please let me know if the example code is fine now. |
snoek09 commentedDec 1, 2015
@xabbuh is this PR finished? |
book/controller.rst Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
I think this should link to the method in the interface instead (it doesn't matter which implementation is registered as the service).
xabbuh commentedDec 1, 2015
@snoek09 Sorry for missing your last comment. I left a last minor comment. After that this looks good to be merged to me. |
snoek09 commentedDec 1, 2015
@xabbuh No problem. I updated the link. |
OskarStark commentedDec 2, 2015
👍 |
snoek09 commentedDec 9, 2015
@xabbuh I think this is ready to be merged. |
xabbuh commentedDec 9, 2015
@weaverryan@wouterj@javiereguiluz Ready to go here? :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Does it make sense to show this without showing a template? When you generate the CSRF token in the template, you would need to also includeauthenticate then, right?
weaverryan commentedDec 10, 2015
I added some comments, but I like it! Short and simple. To be clear, this is not an "old way" of checking CSRF, correct? It seems totally valid and current. Thanks! |
ogizanagi commentedDec 10, 2015
@weaverryan : No it isn't, because the However, I wonder if the |
snoek09 commentedDec 15, 2015
@ogizanagi is right. The example code has to work with 2.3 using the 'old way'. |
xabbuh commentedDec 15, 2015
I think we can merge it just as it is and then work on converting this into a cookbook recipe afterwards. What do you think? |
ogizanagi commentedDec 15, 2015
👍 |
snoek09 commentedDec 15, 2015
I like that idea@xabbuh. |
xabbuh commentedDec 31, 2015
@weaverryan@wouterj@javiereguiluz Okay with merging and thinking about how to rework the whole part afterwards? |
javiereguiluz commentedDec 31, 2015
@xabbuh yes! |
weaverryan commentedJan 10, 2016
👍 |
xabbuh commentedJan 11, 2016
Thank you Henry. |
…k09)This PR was squashed before being merged into the 2.3 branch (closes#5818).Discussion----------document old way of checking validity of CSRF token| Q | A| ------------- | ---| Doc fix? | yes| New docs? | yes| Applies to | all| Fixed tickets | Related to#4668Commits-------8257cc8 document old way of checking validity of CSRF token