diff --git a/articles/rendering-output.html b/articles/rendering-output.html index 37558890..d4004947 100644 --- a/articles/rendering-output.html +++ b/articles/rendering-output.html @@ -601,7 +601,7 @@
{
- "letter": ["p"]
+ "letter": ["b"]
}
If we send a PUT
request and specify the
capital
parameter, a cookie will be set on the client which
diff --git a/articles/security.html b/articles/security.html
index eee7d9e4..84d3cba7 100644
--- a/articles/security.html
+++ b/articles/security.html
@@ -215,7 +215,7 @@
This plot, with 10,000 points added, took 0.117 seconds to generate. +
This plot, with 10,000 points added, took 0.119 seconds to generate. While that doesn’t sound like much, if we exposed this API publicly on the Internet, an attacker could easily generate enough traffic on this endpoint to overwhelm the Plumber process. Even worse, an attacker could diff --git a/pkgdown.yml b/pkgdown.yml index a43c61a5..f253cd17 100644 --- a/pkgdown.yml +++ b/pkgdown.yml @@ -13,7 +13,7 @@ articles: routing-and-input: routing-and-input.html security: security.html tips-and-tricks: tips-and-tricks.html -last_built: 2024-03-23T02:16Z +last_built: 2024-03-23T02:21Z urls: reference: https://www.rplumber.io/reference article: https://www.rplumber.io/articles diff --git a/reference/endpoint_serializer.html b/reference/endpoint_serializer.html index 389606dd..1e24cdcb 100644 --- a/reference/endpoint_serializer.html +++ b/reference/endpoint_serializer.html @@ -171,7 +171,7 @@