File tree Expand file tree Collapse file tree 2 files changed +8
-9
lines changed Expand file tree Collapse file tree 2 files changed +8
-9
lines changed Original file line number Diff line number Diff line change @@ -49,11 +49,10 @@ General-purpose aggregation functions
49
49
50
50
Examples::
51
51
52
- "some_field"
53
- "-some_field"
54
52
from django.db.models import F
55
53
56
- F("some_field").desc()
54
+ ArrayAgg("a_field", order_by="-some_field")
55
+ ArrayAgg("a_field", order_by=F("some_field").desc())
57
56
58
57
.. versionchanged:: 5.0
59
58
Original file line number Diff line number Diff line change @@ -687,13 +687,13 @@ If you have an old Django project with MD5 or SHA1 (even salted) encoded
687
687
passwords, be aware that these can be cracked fairly easily with today's
688
688
hardware. To make Django users acknowledge continued use of weak hashers, the
689
689
following hashers are removed from the default :setting:`PASSWORD_HASHERS`
690
- setting::
690
+ setting:
691
691
692
- "django.contrib.auth.hashers.SHA1PasswordHasher"
693
- "django.contrib.auth.hashers.MD5PasswordHasher"
694
- "django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"
695
- "django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"
696
- "django.contrib.auth.hashers.CryptPasswordHasher"
692
+ * `` "django.contrib.auth.hashers.SHA1PasswordHasher"``
693
+ * `` "django.contrib.auth.hashers.MD5PasswordHasher"``
694
+ * `` "django.contrib.auth.hashers.UnsaltedSHA1PasswordHasher"``
695
+ * `` "django.contrib.auth.hashers.UnsaltedMD5PasswordHasher"``
696
+ * `` "django.contrib.auth.hashers.CryptPasswordHasher"``
697
697
698
698
Consider using a :ref:`wrapped password hasher <wrapping-password-hashers>` to
699
699
strengthen the hashes in your database. If that's not feasible, add the
You can’t perform that action at this time.
0 commit comments