@@ -247,7 +247,7 @@ def add_reviewed_feature(self, type, id, harmful):
247
247
248
248
if changeset .uid in self .request .user .social_auth .values_list ('uid' , flat = True ):
249
249
return Response (
250
- {'detail' : 'User can not check features on his own changeset.' },
250
+ {'detail' : 'User can not check features on their own changeset.' },
251
251
status = status .HTTP_403_FORBIDDEN
252
252
)
253
253
@@ -279,7 +279,7 @@ def remove_harmful_feature(self, request, pk, type, id):
279
279
280
280
if changeset .uid in self .request .user .social_auth .values_list ('uid' , flat = True ):
281
281
return Response (
282
- {'detail' : 'User can not check features on his own changeset.' },
282
+ {'detail' : 'User can not check features on their own changeset.' },
283
283
status = status .HTTP_403_FORBIDDEN
284
284
)
285
285
@@ -343,7 +343,7 @@ def set_harmful(self, request, pk):
343
343
)
344
344
if changeset .uid in request .user .social_auth .values_list ('uid' , flat = True ):
345
345
return Response (
346
- {'detail' : 'User can not check his own changeset.' },
346
+ {'detail' : 'User can not check their own changeset.' },
347
347
status = status .HTTP_403_FORBIDDEN
348
348
)
349
349
if request .data :
@@ -372,7 +372,7 @@ def set_good(self, request, pk):
372
372
)
373
373
if changeset .uid in request .user .social_auth .values_list ('uid' , flat = True ):
374
374
return Response (
375
- {'detail' : 'User can not check his own changeset.' },
375
+ {'detail' : 'User can not check their own changeset.' },
376
376
status = status .HTTP_403_FORBIDDEN
377
377
)
378
378
if request .data :
@@ -440,7 +440,7 @@ def add_tag(self, request, pk, tag_pk):
440
440
441
441
if changeset .uid in request .user .social_auth .values_list ('uid' , flat = True ):
442
442
return Response (
443
- {'detail' : 'User can not add tags to his own changeset.' },
443
+ {'detail' : 'User can not add tags to their own changeset.' },
444
444
status = status .HTTP_403_FORBIDDEN
445
445
)
446
446
if changeset .checked and (
@@ -468,7 +468,7 @@ def remove_tag(self, request, pk, tag_pk):
468
468
469
469
if changeset .uid in request .user .social_auth .values_list ('uid' , flat = True ):
470
470
return Response (
471
- {'detail' : 'User can not remove tags from his own changeset.' },
471
+ {'detail' : 'User can not remove tags from their own changeset.' },
472
472
status = status .HTTP_403_FORBIDDEN
473
473
)
474
474
if changeset .checked and (
@@ -698,6 +698,7 @@ def filter_primary_tags(feature):
698
698
class SetChangesetTagChangesAPIView (ModelViewSet ):
699
699
queryset = Changeset .objects .all ()
700
700
permission_classes = (IsAdminUser ,)
701
+ throttle_classes = [] # do not rate limit the tag changes endpoint
701
702
# The serializer is not used in this view. It's here only to avoid errors
702
703
# in docs schema generation.
703
704
serializer_class = ChangesetStatsSerializer
0 commit comments