1
0
mirror of https://github.com/django/django.git synced 2025-10-24 06:06:09 +00:00

[1.8.x] Updated capitalization in the word "JavaScript" for consistency

Backport of 08c980d752 from master
This commit is contained in:
Dave Hodder
2015-04-30 20:39:29 +01:00
committed by Tim Graham
parent c45fd57f68
commit 53031cce42
16 changed files with 27 additions and 27 deletions

View File

@@ -1872,7 +1872,7 @@ definitions on forms <form-asset-paths>`.
jQuery
~~~~~~
Django admin Javascript makes use of the `jQuery`_ library.
Django admin JavaScript makes use of the `jQuery`_ library.
To avoid conflicts with user-supplied scripts or libraries, Django's jQuery
(version 1.11.2) is namespaced as ``django.jQuery``. If you want to use jQuery
@@ -2725,7 +2725,7 @@ Index ``index``
Logout ``logout``
Password change ``password_change``
Password change done ``password_change_done``
i18n javascript ``jsi18n``
i18n JavaScript ``jsi18n``
Application index page ``app_list`` ``app_label``
Redirect to object's page ``view_on_site`` ``content_type_id``, ``object_id``
========================= ======================== ==================================

View File

@@ -7,7 +7,7 @@ Cross Site Request Forgery protection
The CSRF middleware and template tag provides easy-to-use protection against
`Cross Site Request Forgeries`_. This type of attack occurs when a malicious
Web site contains a link, a form button or some javascript that is intended to
Web site contains a link, a form button or some JavaScript that is intended to
perform some action on your Web site, using the credentials of a logged-in user
who visits the malicious site in their browser. A related type of attack,
'login CSRF', where an attacking site tricks a user's browser into logging into
@@ -80,7 +80,7 @@ While the above method can be used for AJAX POST requests, it has some
inconveniences: you have to remember to pass the CSRF token in as POST data with
every POST request. For this reason, there is an alternative method: on each
XMLHttpRequest, set a custom ``X-CSRFToken`` header to the value of the CSRF
token. This is often easier, because many javascript frameworks provide hooks
token. This is often easier, because many JavaScript frameworks provide hooks
that allow headers to be set on every request.
As a first step, you must get the CSRF token itself. The recommended source for

View File

@@ -252,7 +252,7 @@ sites with improperly configured servers, it can also pose a security
risk.
If your site serves user-uploaded files, a malicious user could upload a
specially-crafted file that would be interpreted as HTML or Javascript by
specially-crafted file that would be interpreted as HTML or JavaScript by
the browser when you expected it to be something harmless.
To learn more about this header and how the browser treats it, you can
@@ -280,8 +280,8 @@ setting will be useful.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some browsers have the ability to block content that appears to be an `XSS
attack`_. They work by looking for Javascript content in the GET or POST
parameters of a page. If the Javascript is replayed in the server's response,
attack`_. They work by looking for JavaScript content in the GET or POST
parameters of a page. If the JavaScript is replayed in the server's response,
the page is blocked from rendering and an error page is shown instead.
The `X-XSS-Protection header`_ is used to control the operation of the

View File

@@ -3022,7 +3022,7 @@ protected cookie data.
Turning it on makes it less trivial for an attacker to escalate a cross-site
scripting vulnerability into full hijacking of a user's session. There's not
much excuse for leaving this off, either: if your code depends on reading
session cookies from Javascript, you're probably doing it wrong.
session cookies from JavaScript, you're probably doing it wrong.
.. versionadded:: 1.7

View File

@@ -1142,7 +1142,7 @@ verbatim
Stops the template engine from rendering the contents of this block tag.
A common use is to allow a Javascript template layer that collides with
A common use is to allow a JavaScript template layer that collides with
Django's syntax. For example::
{% verbatim %}