mirror of
				https://github.com/encode/django-rest-framework.git
				synced 2025-10-31 16:07:38 +03:00 
			
		
		
		
	Updated links to CSRF/AJAX Django documentation (#9118)
This commit is contained in:
		
							parent
							
								
									4bbfa8d455
								
							
						
					
					
						commit
						605cc4f736
					
				|  | @ -454,7 +454,7 @@ More information can be found in the [Documentation](https://django-rest-durin.r | |||
| [basicauth]: https://tools.ietf.org/html/rfc2617 | ||||
| [permission]: permissions.md | ||||
| [throttling]: throttling.md | ||||
| [csrf-ajax]: https://docs.djangoproject.com/en/stable/ref/csrf/#ajax | ||||
| [csrf-ajax]: https://docs.djangoproject.com/en/stable/howto/csrf/#using-csrf-protection-with-ajax | ||||
| [mod_wsgi_official]: https://modwsgi.readthedocs.io/en/develop/configuration-directives/WSGIPassAuthorization.html | ||||
| [django-oauth-toolkit-getting-started]: https://django-oauth-toolkit.readthedocs.io/en/latest/rest-framework/getting_started.html | ||||
| [django-rest-framework-oauth]: https://jpadilla.github.io/django-rest-framework-oauth/ | ||||
|  |  | |||
|  | @ -35,7 +35,7 @@ The best way to deal with CORS in REST framework is to add the required response | |||
| 
 | ||||
| [cite]: https://blog.codinghorror.com/preventing-csrf-and-xsrf-attacks/ | ||||
| [csrf]: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) | ||||
| [csrf-ajax]: https://docs.djangoproject.com/en/stable/ref/csrf/#ajax | ||||
| [csrf-ajax]: https://docs.djangoproject.com/en/stable/howto/csrf/#using-csrf-protection-with-ajax | ||||
| [cors]: https://www.w3.org/TR/cors/ | ||||
| [adamchainz]: https://github.com/adamchainz | ||||
| [django-cors-headers]: https://github.com/adamchainz/django-cors-headers | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue
	
	Block a user