Ver Fonte

[5.0.x] Tweaked docs to avoid reformatting given new black version.

Backport of fd3cfd80bebad292d639a03e58632e494369eb92 from main.
nessita há 1 mês atrás
pai
commit
19bed6d30c
2 ficheiros alterados com 8 adições e 9 exclusões
  1. 2 3
      docs/ref/contrib/postgres/aggregates.txt
  2. 6 6
      docs/releases/1.10.txt

+ 2 - 3
docs/ref/contrib/postgres/aggregates.txt

@@ -49,11 +49,10 @@ General-purpose aggregation functions
 
         Examples::
 
-            "some_field"
-            "-some_field"
             from django.db.models import F
 
-            F("some_field").desc()
+            ArrayAgg("a_field", ordering="-some_field")
+            ArrayAgg("a_field", ordering=F("some_field").desc())
 
     .. versionchanged:: 5.0
 

+ 6 - 6
docs/releases/1.10.txt

@@ -687,13 +687,13 @@ If you have an old Django project with MD5 or SHA1 (even salted) encoded
 passwords, be aware that these can be cracked fairly easily with today's
 hardware. To make Django users acknowledge continued use of weak hashers, the
 following hashers are removed from the default :setting:`PASSWORD_HASHERS`
-setting::
+setting:
 
-    "django.contrib.auth.hashers.SHA1PasswordHasher"
-    "django.contrib.auth.hashers.MD5PasswordHasher"
-    "django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"
-    "django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"
-    "django.contrib.auth.hashers.CryptPasswordHasher"
+* ``"django.contrib.auth.hashers.SHA1PasswordHasher"``
+* ``"django.contrib.auth.hashers.MD5PasswordHasher"``
+* ``"django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"``
+* ``"django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"``
+* ``"django.contrib.auth.hashers.CryptPasswordHasher"``
 
 Consider using a :ref:`wrapped password hasher <wrapping-password-hashers>` to
 strengthen the hashes in your database. If that's not feasible, add the