X-Git-Url: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?a=blobdiff_plain;f=lib%2FCatalyst%2FManual%2FTutorial%2F03_MoreCatalystBasics.pod;h=c9b6f4d87d94decf9d897ae279f0424bcd6afd26;hb=be3349e1a2966ee8abc15c1b9a168a3c70125ccb;hp=da416ff981d14eccdd1d5bdc929724017a96b532;hpb=69d57cda557b2f9a04a058dfd4e875c1d9153133;p=catagits%2FCatalyst-Manual.git diff --git a/lib/Catalyst/Manual/Tutorial/03_MoreCatalystBasics.pod b/lib/Catalyst/Manual/Tutorial/03_MoreCatalystBasics.pod index da416ff..c9b6f4d 100644 --- a/lib/Catalyst/Manual/Tutorial/03_MoreCatalystBasics.pod +++ b/lib/Catalyst/Manual/Tutorial/03_MoreCatalystBasics.pod @@ -881,9 +881,9 @@ L version C<0.05000> or later. =head1 ENABLE THE MODEL IN THE CONTROLLER Open C and un-comment the model code we -left disabled earlier so that your version matches the following (un- -comment the line containing C<[$c-Emodel('DB::Book')-Eall]> and -delete the next 2 lines): +left disabled earlier so that your version matches the following +(un-comment the line containing C<[$c-Emodel('DB::Book')-Eall]> +and delete the next 2 lines): =head2 list @@ -1381,7 +1381,7 @@ alternate way to specify the trace option just in case): $ DBIC_TRACE=1 script/myapp_server.pl -r Make sure that the application loads correctly and that you see the -three dynamically created model class (one for each of the Result +three dynamically created model classes (one for each of the Result Classes we created). Then hit the URL L with your browser @@ -1461,11 +1461,11 @@ html" at the end of every field where a user has control over the information that can appear in that field (and can therefore inject markup or code if you don't "neutralize" those fields). In addition to "| html", Template Toolkit has a variety of other useful filters that -can found in the documentation for L. (While we are -on the topic of security and escaping of dangerous values, one of the -advantages of using tools like DBIC for database access or +can be found in the documentation for L. (While we +are on the topic of security and escaping of dangerous values, one of +the advantages of using tools like DBIC for database access or L for form management [see -L +L] is that they automatically handle most escaping for you and therefore dramatically increase the security of your app.) @@ -1474,7 +1474,7 @@ dramatically increase the security of your app.) In some situations, it can be useful to run your application and display a page without using a browser. Catalyst lets you do this using the -C script. Just supply the URL you wish to +C