core.validators.EmailValidator.message

message The error message used by ValidationError if validation fails. Defaults to "Enter a valid email address".

contenttypes.models.ContentType.model

model The name of the model class. Additionally, the following property is available:

auth.mixins.PermissionRequiredMixin.get_permission_required()

get_permission_required() Returns an iterable of permission names used by the mixin. Defaults to the permission_required attribute, converted to a tuple if necessary.

middleware.security.SecurityMiddleware

class SecurityMiddleware [source] The django.middleware.security.SecurityMiddleware provides several security enhancements to the request/response cycle. Each one can be independently enabled or disabled with a setting. SECURE_BROWSER_XSS_FILTER SECURE_CONTENT_TYPE_NOSNIFF SECURE_HSTS_INCLUDE_SUBDOMAINS SECURE_HSTS_SECONDS SECURE_REDIRECT_EXEMPT SECURE_SSL_HOST SECURE_SSL_REDIRECT

core.paginator.Page.has_previous()

Page.has_previous() [source] Returns True if there’s a previous page.

utils.cache.get_cache_key()

get_cache_key(request, key_prefix=None) [source] Returns a cache key based on the request path. It can be used in the request phase because it pulls the list of headers to take into account from the global path registry and uses those to build a cache key to check against. If there is no headerlist stored, the page needs to be rebuilt, so this function returns None.

forms.Widget.render()

render(name, value, attrs=None) [source] Returns HTML for the widget, as a Unicode string. This method must be implemented by the subclass, otherwise NotImplementedError will be raised. The ‘value’ given is not guaranteed to be valid input, therefore subclass implementations should program defensively.

http.QueryDict.setdefault()

QueryDict.setdefault(key, default=None) [source] Just like the standard dictionary setdefault() method, except it uses __setitem__() internally.

auth.forms.AuthenticationForm.confirm_login_allowed()

confirm_login_allowed(user) By default, AuthenticationForm rejects users whose is_active flag is set to False. You may override this behavior with a custom policy to determine which users can log in. Do this with a custom form that subclasses AuthenticationForm and overrides the confirm_login_allowed() method. This method should raise a ValidationError if the given user may not log in. For example, to allow all users to log in regardless of “active” status: from django.contrib.auth.forms imp

gis.gdal.OGRGeomType.name

name Returns a short-hand string form of the OGR Geometry type: >>> gt1.name 'Polygon'