mirror of
https://github.com/actix/actix-web.git
synced 2024-11-15 21:31:24 +00:00
Merge branch 'master' into private-cookies
This commit is contained in:
commit
0b0bbd6bd9
3 changed files with 6 additions and 7 deletions
|
@ -4,7 +4,7 @@ use diesel;
|
|||
use actix_web::*;
|
||||
use actix::prelude::*;
|
||||
use diesel::prelude::*;
|
||||
use diesel::r2d2::{ Pool, ConnectionManager };
|
||||
use diesel::r2d2::{Pool, ConnectionManager};
|
||||
|
||||
use models;
|
||||
use schema;
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
//! * There is no `Origin` header but the `Referer` header matches one of
|
||||
//! the allowed origins.
|
||||
//!
|
||||
//! Use [`CsrfFilterBuilder::allow_xhr()`](struct.CsrfFilterBuilder.html#method.allow_xhr)
|
||||
//! Use [`CsrfFilter::allow_xhr()`](struct.CsrfFilter.html#method.allow_xhr)
|
||||
//! if you want to allow requests with unsafe methods via
|
||||
//! [CORS](../cors/struct.Cors.html).
|
||||
//!
|
||||
|
@ -32,9 +32,8 @@
|
|||
//! fn main() {
|
||||
//! let app = App::new()
|
||||
//! .middleware(
|
||||
//! csrf::CsrfFilter::build()
|
||||
//! .allowed_origin("https://www.example.com")
|
||||
//! .finish())
|
||||
//! csrf::CsrfFilter::new()
|
||||
//! .allowed_origin("https://www.example.com"))
|
||||
//! .resource("/", |r| {
|
||||
//! r.method(http::Method::GET).f(|_| HttpResponse::Ok());
|
||||
//! r.method(http::Method::POST).f(handle_post);
|
||||
|
|
|
@ -61,10 +61,10 @@ impl<S: 'static> Predicate<S> for AnyPredicate<S> {
|
|||
///
|
||||
/// ```rust
|
||||
/// # extern crate actix_web;
|
||||
/// use actix_web::{pred, Application, HttpResponse};
|
||||
/// use actix_web::{pred, App, HttpResponse};
|
||||
///
|
||||
/// fn main() {
|
||||
/// Application::new()
|
||||
/// App::new()
|
||||
/// .resource("/index.html", |r| r.route()
|
||||
/// .filter(pred::All(pred::Get())
|
||||
/// .and(pred::Header("content-type", "plain/text")))
|
||||
|
|
Loading…
Reference in a new issue