Skip to content

Commit ef2c1f2

Browse files
committed
Use an instead of a before HTML
1 parent a6c5c5a commit ef2c1f2

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

blade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -439,7 +439,7 @@ In some situations, it's useful to embed PHP code into your views. You can use t
439439
<a name="csrf-field"></a>
440440
### CSRF Field
441441

442-
Anytime you define a HTML form in your application, you should include a hidden CSRF token field in the form so that [the CSRF protection](https://laravel.com/docs/{{version}}/csrf) middleware can validate the request. You may use the `@csrf` Blade directive to generate the token field:
442+
Anytime you define an HTML form in your application, you should include a hidden CSRF token field in the form so that [the CSRF protection](https://laravel.com/docs/{{version}}/csrf) middleware can validate the request. You may use the `@csrf` Blade directive to generate the token field:
443443

444444
<form method="POST" action="/profile">
445445
@csrf

csrf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Laravel makes it easy to protect your application from [cross-site request forge
1212

1313
Laravel automatically generates a CSRF "token" for each active user session managed by the application. This token is used to verify that the authenticated user is the one actually making the requests to the application.
1414

15-
Anytime you define a HTML form in your application, you should include a hidden CSRF token field in the form so that the CSRF protection middleware can validate the request. You may use the `@csrf` Blade directive to generate the token field:
15+
Anytime you define an HTML form in your application, you should include a hidden CSRF token field in the form so that the CSRF protection middleware can validate the request. You may use the `@csrf` Blade directive to generate the token field:
1616

1717
<form method="POST" action="/profile">
1818
@csrf
@@ -57,7 +57,7 @@ Typically, you should place these kinds of routes outside of the `web` middlewar
5757
<a name="csrf-x-csrf-token"></a>
5858
## X-CSRF-TOKEN
5959

60-
In addition to checking for the CSRF token as a POST parameter, the `VerifyCsrfToken` middleware will also check for the `X-CSRF-TOKEN` request header. You could, for example, store the token in a HTML `meta` tag:
60+
In addition to checking for the CSRF token as a POST parameter, the `VerifyCsrfToken` middleware will also check for the `X-CSRF-TOKEN` request header. You could, for example, store the token in an HTML `meta` tag:
6161

6262
<meta name="csrf-token" content="{{ csrf_token() }}">
6363

mail.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Within a mailable class' `build` method, you may use the `view` method to specif
170170
171171
#### Plain Text Emails
172172

173-
If you would like to define a plain-text version of your email, you may use the `text` method. Like the `view` method, the `text` method accepts a template name which will be used to render the contents of the email. You are free to define both a HTML and plain-text version of your message:
173+
If you would like to define a plain-text version of your email, you may use the `text` method. Like the `view` method, the `text` method accepts a template name which will be used to render the contents of the email. You are free to define both an HTML and plain-text version of your message:
174174

175175
/**
176176
* Build the message.

0 commit comments

Comments
 (0)