![]() user_content will now work for any arbitrary RTE field, no matter if it came from a column, a string nested three levels deep in a serialized column, whatever. let's call this technique "controlled XSS injection" Change-Id: I56eed1f9b546ac7849dc60faa0f2b3801231131e Reviewed-on: https://gerrit.instructure.com/3704 Reviewed-by: Brian Palmer <brianp@instructure.com> Tested-by: Hudson <hudson@instructure.com> |
||
---|---|---|
.. | ||
index.html.erb | ||
show.html.erb |