Browse Source

[5.0.x] Tweaked docs to avoid reformatting given new black version.

Backport of fd3cfd80bebad292d639a03e58632e494369eb92 from main.
nessita 1 month ago
parent
commit
19bed6d30c
2 changed files with 8 additions and 9 deletions
  1. 2 3
      docs/ref/contrib/postgres/aggregates.txt
  2. 6 6
      docs/releases/1.10.txt

+ 2 - 3
docs/ref/contrib/postgres/aggregates.txt

@@ -49,11 +49,10 @@ General-purpose aggregation functions
 
         Examples::
 
-            "some_field"
-            "-some_field"
             from django.db.models import F
 
-            F("some_field").desc()
+            ArrayAgg("a_field", ordering="-some_field")
+            ArrayAgg("a_field", ordering=F("some_field").desc())
 
     .. versionchanged:: 5.0
 

+ 6 - 6
docs/releases/1.10.txt

@@ -687,13 +687,13 @@ If you have an old Django project with MD5 or SHA1 (even salted) encoded
 passwords, be aware that these can be cracked fairly easily with today's
 hardware. To make Django users acknowledge continued use of weak hashers, the
 following hashers are removed from the default :setting:`PASSWORD_HASHERS`
-setting::
+setting:
 
-    "django.contrib.auth.hashers.SHA1PasswordHasher"
-    "django.contrib.auth.hashers.MD5PasswordHasher"
-    "django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"
-    "django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"
-    "django.contrib.auth.hashers.CryptPasswordHasher"
+* ``"django.contrib.auth.hashers.SHA1PasswordHasher"``
+* ``"django.contrib.auth.hashers.MD5PasswordHasher"``
+* ``"django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"``
+* ``"django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"``
+* ``"django.contrib.auth.hashers.CryptPasswordHasher"``
 
 Consider using a :ref:`wrapped password hasher <wrapping-password-hashers>` to
 strengthen the hashes in your database. If that's not feasible, add the