File tree Expand file tree Collapse file tree 3 files changed +4
-4
lines changed Expand file tree Collapse file tree 3 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -138,7 +138,7 @@ Extract attribute and/or node values from the list of nodes::
138138Call an anonymous function on each node of the list::
139139
140140 $nodeValues = $crawler->filter('p')->each(function ($node, $i) {
141- return $node->nodeValue ;
141+ return $node->text() ;
142142 });
143143
144144The anonymous function receives the position and the node as arguments.
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ and return the resulting response to the browser.
4040
4141Because every request is routed through it, the front controller can be
4242used to perform global initializations prior to setting up the kernel or
43- to * `decorate`_ * the kernel with additional features. Examples include:
43+ to `decorate `_ the kernel with additional features. Examples include:
4444
4545* Configuring the autoloader or adding additional autoloading mechanisms;
4646* Adding HTTP level caching by wrapping the kernel with an instance of
Original file line number Diff line number Diff line change 44How to implement your own Voter to blacklist IP Addresses
55=========================================================
66
7- The Symfony2 security component provides several layers to authenticate users.
7+ The Symfony2 security component provides several layers to authorize users.
88One of the layers is called a `voter `. A voter is a dedicated class that checks
99if the user has the rights to be connected to the application. For instance,
10- Symfony2 provides a layer that checks if the user is fully authenticated or if
10+ Symfony2 provides a layer that checks if the user is fully authorized or if
1111it has some expected roles.
1212
1313It is sometimes useful to create a custom voter to handle a specific case not
You can’t perform that action at this time.
0 commit comments