mirror of
https://github.com/silverstripe/silverstripe-framework
synced 2024-10-22 12:05:37 +00:00
Making docs gender agnostic
This commit is contained in:
parent
0898487ad2
commit
d2a3da2203
@ -1149,7 +1149,7 @@ jQuery.noConflict();
|
|||||||
* selection support. Rather than manually adding classes to selects we want
|
* selection support. Rather than manually adding classes to selects we want
|
||||||
* styled, we style everything but the ones we tell it not to.
|
* styled, we style everything but the ones we tell it not to.
|
||||||
*
|
*
|
||||||
* For the CMS we also need to tell the parent div that his has a select so
|
* For the CMS we also need to tell the parent div that it has a select so
|
||||||
* we can fix the height cropping.
|
* we can fix the height cropping.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
@ -149,7 +149,7 @@ When a string is literal (contains no variable substitutions), the apostrophe or
|
|||||||
When a literal string itself contains apostrophes, it is permitted to demarcate the string with quotation marks or "double quotes".
|
When a literal string itself contains apostrophes, it is permitted to demarcate the string with quotation marks or "double quotes".
|
||||||
|
|
||||||
:::php
|
:::php
|
||||||
$greeting = "She said 'hello'";
|
$greeting = "They said 'hello'";
|
||||||
|
|
||||||
This syntax is preferred over escaping apostrophes as it is much easier to read.
|
This syntax is preferred over escaping apostrophes as it is much easier to read.
|
||||||
|
|
||||||
|
@ -222,7 +222,7 @@ In order for this to work, the CMS templates declare certain sections as "PJAX f
|
|||||||
through a `data-pjax-fragment` attribute. These names correlate to specific
|
through a `data-pjax-fragment` attribute. These names correlate to specific
|
||||||
rendering logic in the PHP controllers, through the `[api:PjaxResponseNegotiator]` class.
|
rendering logic in the PHP controllers, through the `[api:PjaxResponseNegotiator]` class.
|
||||||
|
|
||||||
Through a custom `X-Pjax` HTTP header, the client can declare which view he's expecting,
|
Through a custom `X-Pjax` HTTP header, the client can declare which view they're expecting,
|
||||||
through identifiers like `CurrentForm` or `Content` (see `[api:LeftAndMain->getResponseNegotiator()]`).
|
through identifiers like `CurrentForm` or `Content` (see `[api:LeftAndMain->getResponseNegotiator()]`).
|
||||||
These identifiers are passed to `loadPanel()` via the `pjax` data option.
|
These identifiers are passed to `loadPanel()` via the `pjax` data option.
|
||||||
The HTTP response is a JSON object literal, with template replacements keyed by their Pjax fragment.
|
The HTTP response is a JSON object literal, with template replacements keyed by their Pjax fragment.
|
||||||
|
@ -156,4 +156,4 @@ cases.
|
|||||||
## Summary ##
|
## Summary ##
|
||||||
|
|
||||||
The code presented gives you a fully functioning alternating button, similar to the defaults that come with the the CMS.
|
The code presented gives you a fully functioning alternating button, similar to the defaults that come with the the CMS.
|
||||||
These alternating buttons can be used to give user the advantage of visual feedback upon his actions.
|
These alternating buttons can be used to give user the advantage of visual feedback upon their actions.
|
||||||
|
@ -35,14 +35,14 @@ Thanks to Rutger de Jong for reporting.
|
|||||||
Severity: Moderate
|
Severity: Moderate
|
||||||
|
|
||||||
Autologin tokens (remember me and reset password) are stored in the database as a plain text.
|
Autologin tokens (remember me and reset password) are stored in the database as a plain text.
|
||||||
If attacker obtained the database he would be able to gain access to accounts that have requested a password change, or have "remember me" enabled.
|
If attacker obtained the database they would be able to gain access to accounts that have requested a password change, or have "remember me" enabled.
|
||||||
|
|
||||||
### Security: Privilege escalation through profile form
|
### Security: Privilege escalation through profile form
|
||||||
|
|
||||||
Severity: Moderate
|
Severity: Moderate
|
||||||
|
|
||||||
A logged-in CMS user can gain additional privileges by crafting a request
|
A logged-in CMS user can gain additional privileges by crafting a request
|
||||||
to his/her profile form which resets another user's password.
|
to their profile form which resets another user's password.
|
||||||
This method can potentially be used by CSRF attacks as well.
|
This method can potentially be used by CSRF attacks as well.
|
||||||
Thanks to Nathaniel Carew (Sense of Security) for reporting.
|
Thanks to Nathaniel Carew (Sense of Security) for reporting.
|
||||||
|
|
||||||
|
@ -607,9 +607,7 @@ when using deprecated functionality (through the new `Deprecation` class).
|
|||||||
* 2012-04-12 [e9dc610](https://github.com/silverstripe/sapphire/commit/e9dc610) API-CHANGE: new GridFieldFooter component (Julian Seidenberg)
|
* 2012-04-12 [e9dc610](https://github.com/silverstripe/sapphire/commit/e9dc610) API-CHANGE: new GridFieldFooter component (Julian Seidenberg)
|
||||||
* 2012-04-10 [9888f98](https://github.com/silverstripe/silverstripe-cms/commit/9888f98) ENHANCMENT: Link pages in reports to cms edit (Andrew O'Neil)
|
* 2012-04-10 [9888f98](https://github.com/silverstripe/silverstripe-cms/commit/9888f98) ENHANCMENT: Link pages in reports to cms edit (Andrew O'Neil)
|
||||||
* 2012-04-10 [1516934](https://github.com/silverstripe/silverstripe-cms/commit/1516934) Revert "BUGFIX: SSF-168 fixing rendering issue in Chrome, which displays extra control at the bottom of the window in a report that is of a certain length" (Julian Seidenberg)
|
* 2012-04-10 [1516934](https://github.com/silverstripe/silverstripe-cms/commit/1516934) Revert "BUGFIX: SSF-168 fixing rendering issue in Chrome, which displays extra control at the bottom of the window in a report that is of a certain length" (Julian Seidenberg)
|
||||||
* 2012-04-06 [797d526](https://github.com/silverstripe/sapphire/commit/797d526) For png images with transparency, the imagesaveaplpha() needs to be set to true on the source image in order for
|
* 2012-04-06 [797d526](https://github.com/silverstripe/sapphire/commit/797d526) For png images with transparency, the imagesaveaplpha() needs to be set to true on the source image in order for the alpha to be preserved when using the modifier methods. (jmwohl)
|
||||||
|
|
||||||
he alpha to be preserved when using the modifier methods. (jmwohl)
|
|
||||||
* 2012-04-05 [e76913f](https://github.com/silverstripe/sapphire/commit/e76913f) API-CHANGE: adding a default option of null to the $args argument in DataExtension::add_to_class. The args argument isn't used anywhere in the class and adding a third argument to every call to this function is tedious. (Julian Seidenberg)
|
* 2012-04-05 [e76913f](https://github.com/silverstripe/sapphire/commit/e76913f) API-CHANGE: adding a default option of null to the $args argument in DataExtension::add_to_class. The args argument isn't used anywhere in the class and adding a third argument to every call to this function is tedious. (Julian Seidenberg)
|
||||||
* 2012-04-04 [5826b36](https://github.com/silverstripe/sapphire/commit/5826b36) ENHACEMENT: SSF-168 updated the font for titles on print stylesheets (Felipe Skroski)
|
* 2012-04-04 [5826b36](https://github.com/silverstripe/sapphire/commit/5826b36) ENHACEMENT: SSF-168 updated the font for titles on print stylesheets (Felipe Skroski)
|
||||||
* 2012-04-04 [349a04d](https://github.com/silverstripe/silverstripe-cms/commit/349a04d) API-CHANGE: SSF-168 changing the API/code-conventions for excluding specific reports. get_reports method now returns an ArrayList instead of an array of SS_Reports. (Julian Seidenberg)
|
* 2012-04-04 [349a04d](https://github.com/silverstripe/silverstripe-cms/commit/349a04d) API-CHANGE: SSF-168 changing the API/code-conventions for excluding specific reports. get_reports method now returns an ArrayList instead of an array of SS_Reports. (Julian Seidenberg)
|
||||||
|
@ -22,7 +22,7 @@ Thanks to Rutger de Jong for reporting.
|
|||||||
Severity: Moderate
|
Severity: Moderate
|
||||||
|
|
||||||
A logged-in CMS user can gain additional privileges by crafting a request
|
A logged-in CMS user can gain additional privileges by crafting a request
|
||||||
to his/her profile form which resets another user's password.
|
to their profile form which resets another user's password.
|
||||||
This method can potentially be used by CSRF attacks as well.
|
This method can potentially be used by CSRF attacks as well.
|
||||||
Thanks to Nathaniel Carew (Sense of Security) for reporting.
|
Thanks to Nathaniel Carew (Sense of Security) for reporting.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ API changes related to the below security patch:
|
|||||||
Severity: Moderate
|
Severity: Moderate
|
||||||
|
|
||||||
Autologin tokens (remember me and reset password) are stored in the database as a plain text.
|
Autologin tokens (remember me and reset password) are stored in the database as a plain text.
|
||||||
If attacker obtained the database he would be able to gain access to accounts that have requested a password change, or have "remember me" enabled.
|
If attacker obtained the database they would be able to gain access to accounts that have requested a password change, or have "remember me" enabled.
|
||||||
|
|
||||||
## Changelog
|
## Changelog
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ translators.
|
|||||||
### I'm seeing lots of duplicated translations, what should I do?
|
### I'm seeing lots of duplicated translations, what should I do?
|
||||||
|
|
||||||
For now, please translate all duplications - sometimes they might be intentional, but mostly the developer just didn't
|
For now, please translate all duplications - sometimes they might be intentional, but mostly the developer just didn't
|
||||||
know his phrase was already translated. Please contact us about any duplicates that might be worth merging.
|
know their phrase was already translated. Please contact us about any duplicates that might be worth merging.
|
||||||
|
|
||||||
### What happened to translate.silverstripe.org?
|
### What happened to translate.silverstripe.org?
|
||||||
|
|
||||||
|
@ -1468,8 +1468,8 @@ class Member extends DataObject implements TemplateGlobalProvider {
|
|||||||
if(!($member && $member->exists())) return false;
|
if(!($member && $member->exists())) return false;
|
||||||
|
|
||||||
// If the requesting member is not an admin, but has access to manage members,
|
// If the requesting member is not an admin, but has access to manage members,
|
||||||
// he still can't edit other members with ADMIN permission.
|
// they still can't edit other members with ADMIN permission.
|
||||||
// This is a bit weak, strictly speaking he shouldn't be allowed to
|
// This is a bit weak, strictly speaking they shouldn't be allowed to
|
||||||
// perform any action that could change the password on a member
|
// perform any action that could change the password on a member
|
||||||
// with "higher" permissions than himself, but thats hard to determine.
|
// with "higher" permissions than himself, but thats hard to determine.
|
||||||
if(!Permission::checkMember($member, 'ADMIN') && Permission::checkMember($this, 'ADMIN')) return false;
|
if(!Permission::checkMember($member, 'ADMIN') && Permission::checkMember($this, 'ADMIN')) return false;
|
||||||
|
@ -223,7 +223,7 @@ JS;
|
|||||||
return $this->controller->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest);
|
return $this->controller->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Redirect the user to the page where he came from
|
// Redirect the user to the page where they came from
|
||||||
$member = Member::currentUser();
|
$member = Member::currentUser();
|
||||||
if($member) {
|
if($member) {
|
||||||
$firstname = Convert::raw2xml($member->FirstName);
|
$firstname = Convert::raw2xml($member->FirstName);
|
||||||
|
@ -32,7 +32,7 @@ class GridFieldEditButtonTest extends SapphireTest {
|
|||||||
// Check that there are content
|
// Check that there are content
|
||||||
$this->assertEquals(3, count($content->getBySelector('.ss-gridfield-item')));
|
$this->assertEquals(3, count($content->getBySelector('.ss-gridfield-item')));
|
||||||
// Make sure that there are edit links, even though the user doesn't have "edit" permissions
|
// Make sure that there are edit links, even though the user doesn't have "edit" permissions
|
||||||
// (he can still view the records)
|
// (they can still view the records)
|
||||||
$this->assertEquals(2, count($content->getBySelector('.edit-link')),
|
$this->assertEquals(2, count($content->getBySelector('.edit-link')),
|
||||||
'Edit links should show when not logged in.');
|
'Edit links should show when not logged in.');
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user