Skip to content

Commit

Permalink
Put images into each page's dir in guides
Browse files Browse the repository at this point in the history
  • Loading branch information
yhirano55 committed Mar 31, 2018
1 parent b1a0ab1 commit e5bd4ad
Show file tree
Hide file tree
Showing 13 changed files with 10 additions and 10 deletions.
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
File renamed without changes
2 changes: 1 addition & 1 deletion guides/source/4_0_release_notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ $ ruby /path/to/rails/railties/bin/rails new myapp --dev
Major Features
--------------

[![Rails 4.0](images/rails4_features.png)](http://guides.rubyonrails.org/images/rails4_features.png)
[![Rails 4.0](images/4_0_release_notes/rails4_features.png)](http://guides.rubyonrails.org/images/4_0_release_notes/rails4_features.png)

### Upgrade

Expand Down
14 changes: 7 additions & 7 deletions guides/source/association_basics.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ class Book < ApplicationRecord
end
```

![belongs_to Association Diagram](images/belongs_to.png)
![belongs_to Association Diagram](images/association_basics/belongs_to.png)

NOTE: `belongs_to` associations _must_ use the singular term. If you used the pluralized form in the above example for the `author` association in the `Book` model, you would be told that there was an "uninitialized constant Book::Authors". This is because Rails automatically infers the class name from the association name. If the association name is wrongly pluralized, then the inferred class will be wrongly pluralized too.

Expand Down Expand Up @@ -127,7 +127,7 @@ class Supplier < ApplicationRecord
end
```

![has_one Association Diagram](images/has_one.png)
![has_one Association Diagram](images/association_basics/has_one.png)

The corresponding migration might look like this:

Expand Down Expand Up @@ -171,7 +171,7 @@ end

NOTE: The name of the other model is pluralized when declaring a `has_many` association.

![has_many Association Diagram](images/has_many.png)
![has_many Association Diagram](images/association_basics/has_many.png)

The corresponding migration might look like this:

Expand Down Expand Up @@ -213,7 +213,7 @@ class Patient < ApplicationRecord
end
```

![has_many :through Association Diagram](images/has_many_through.png)
![has_many :through Association Diagram](images/association_basics/has_many_through.png)

The corresponding migration might look like this:

Expand Down Expand Up @@ -299,7 +299,7 @@ class AccountHistory < ApplicationRecord
end
```

![has_one :through Association Diagram](images/has_one_through.png)
![has_one :through Association Diagram](images/association_basics/has_one_through.png)

The corresponding migration might look like this:

Expand Down Expand Up @@ -340,7 +340,7 @@ class Part < ApplicationRecord
end
```

![has_and_belongs_to_many Association Diagram](images/habtm.png)
![has_and_belongs_to_many Association Diagram](images/association_basics/habtm.png)

The corresponding migration might look like this:

Expand Down Expand Up @@ -494,7 +494,7 @@ class CreatePictures < ActiveRecord::Migration[5.0]
end
```

![Polymorphic Association Diagram](images/polymorphic.png)
![Polymorphic Association Diagram](images/association_basics/polymorphic.png)

### Self Joins

Expand Down
4 changes: 2 additions & 2 deletions guides/source/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -217,7 +217,7 @@ The best _solution against it is not to store this kind of data in a session, bu

NOTE: _Apart from stealing a user's session ID, the attacker may fix a session ID known to them. This is called session fixation._
![Session fixation](images/session_fixation.png)
![Session fixation](images/security/session_fixation.png)
This attack focuses on fixing a user's session ID known to the attacker, and forcing the user's browser into using this ID. It is therefore not necessary for the attacker to steal the session ID afterwards. Here is how this attack works:
Expand Down Expand Up @@ -272,7 +272,7 @@ Cross-Site Request Forgery (CSRF)

This attack method works by including malicious code or a link in a page that accesses a web application that the user is believed to have authenticated. If the session for that web application has not timed out, an attacker may execute unauthorized commands.

![](images/csrf.png)
![](images/security/csrf.png)

In the [session chapter](#sessions) you have learned that most Rails applications use cookie-based sessions. Either they store the session ID in the cookie and have a server-side session hash, or the entire session hash is on the client-side. In either case the browser will automatically send along the cookie on every request to a domain, if it can find a cookie for that domain. The controversial point is that if the request comes from a site of a different domain, it will also send the cookie. Let's start with an example:

Expand Down

0 comments on commit e5bd4ad

Please sign in to comment.