Skip to content

Commit 65297bd

Browse files
Merge branch '2.8' into 3.4
* 2.8: Use the real image URL for the filesystem tests [Finder] Update PHPdoc append() [DI] Fix phpdoc Fix code examples in PHPDoc [HttpKernel] Fix inheritdocs
2 parents cee4b49 + 2828093 commit 65297bd

File tree

2 files changed

+10
-14
lines changed

2 files changed

+10
-14
lines changed

Kernel/MicroKernelTrait.php

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,17 +39,17 @@ abstract protected function configureRoutes(RouteCollectionBuilder $routes);
3939
*
4040
* You can register extensions:
4141
*
42-
* $c->loadFromExtension('framework', array(
43-
* 'secret' => '%secret%'
44-
* ));
42+
* $c->loadFromExtension('framework', array(
43+
* 'secret' => '%secret%'
44+
* ));
4545
*
4646
* Or services:
4747
*
48-
* $c->register('halloween', 'FooBundle\HalloweenProvider');
48+
* $c->register('halloween', 'FooBundle\HalloweenProvider');
4949
*
5050
* Or parameters:
5151
*
52-
* $c->setParameter('halloween', 'lot of fun');
52+
* $c->setParameter('halloween', 'lot of fun');
5353
*
5454
* @param ContainerBuilder $c
5555
* @param LoaderInterface $loader

Templating/Helper/FormHelper.php

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -212,18 +212,14 @@ public function block(FormView $view, $blockName, array $variables = array())
212212
* Use this helper for CSRF protection without the overhead of creating a
213213
* form.
214214
*
215-
* <code>
216-
* echo $view['form']->csrfToken('rm_user_'.$user->getId());
217-
* </code>
215+
* echo $view['form']->csrfToken('rm_user_'.$user->getId());
218216
*
219217
* Check the token in your action using the same CSRF token id.
220218
*
221-
* <code>
222-
* // $csrfProvider being an instance of Symfony\Component\Security\Csrf\TokenGenerator\TokenGeneratorInterface
223-
* if (!$csrfProvider->isCsrfTokenValid('rm_user_'.$user->getId(), $token)) {
224-
* throw new \RuntimeException('CSRF attack detected.');
225-
* }
226-
* </code>
219+
* // $csrfProvider being an instance of Symfony\Component\Security\Csrf\TokenGenerator\TokenGeneratorInterface
220+
* if (!$csrfProvider->isCsrfTokenValid('rm_user_'.$user->getId(), $token)) {
221+
* throw new \RuntimeException('CSRF attack detected.');
222+
* }
227223
*
228224
* @param string $tokenId The CSRF token id of the protected action
229225
*

0 commit comments

Comments
 (0)