@@ -30,14 +30,14 @@ msgid ""
30
30
"One of the design decisions in Flask was that simple tasks should be "
31
31
"simple; they should not take a lot of code and yet they should not limit "
32
32
"you. Because of that, Flask has a few design choices that some people "
33
- "might find surprising or unorthodox. For example, Flask uses thread-local"
34
- " objects internally so that you don’t have to pass objects around from "
33
+ "might find surprising or unorthodox. For example, Flask uses thread-local "
34
+ "objects internally so that you don’t have to pass objects around from "
35
35
"function to function within a request in order to stay threadsafe. This "
36
36
"approach is convenient, but requires a valid request context for "
37
37
"dependency injection or when attempting to reuse code which uses a value "
38
38
"pegged to the request. The Flask project is honest about thread-locals, "
39
- "does not hide them, and calls out in the code and documentation where "
40
- "they are used."
39
+ "does not hide them, and calls out in the code and documentation where they "
40
+ " are used."
41
41
msgstr ""
42
42
43
43
#: ../../advanced_foreword.rst:20
@@ -52,8 +52,8 @@ msgstr ""
52
52
msgid ""
53
53
"If you write a web application, you are probably allowing users to "
54
54
"register and leave their data on your server. The users are entrusting "
55
- "you with data. And even if you are the only user that might leave data in"
56
- " your application, you still want that data to be stored securely."
55
+ "you with data. And even if you are the only user that might leave data in "
56
+ "your application, you still want that data to be stored securely."
57
57
msgstr ""
58
58
59
59
#: ../../advanced_foreword.rst:29
@@ -70,8 +70,8 @@ msgstr ""
70
70
msgid ""
71
71
"The documentation will warn you about aspects of web development that "
72
72
"require attention to security. Some of these security concerns are far "
73
- "more complex than one might think, and we all sometimes underestimate the"
74
- " likelihood that a vulnerability will be exploited - until a clever "
73
+ "more complex than one might think, and we all sometimes underestimate the "
74
+ "likelihood that a vulnerability will be exploited - until a clever "
75
75
"attacker figures out a way to exploit our applications. And don't think "
76
76
"that your application is not important enough to attract an attacker. "
77
77
"Depending on the kind of attack, chances are that automated bots are "
@@ -85,4 +85,3 @@ msgid ""
85
85
"must build with caution, watching for exploits when building to your "
86
86
"requirements."
87
87
msgstr ""
88
-
0 commit comments