mirror of
https://github.com/django/django.git
synced 2025-10-24 06:06:09 +00:00
[1.8.x] Updated capitalization in the word "JavaScript" for consistency
Backport of 08c980d752 from master
This commit is contained in:
@@ -1872,7 +1872,7 @@ definitions on forms <form-asset-paths>`.
|
||||
jQuery
|
||||
~~~~~~
|
||||
|
||||
Django admin Javascript makes use of the `jQuery`_ library.
|
||||
Django admin JavaScript makes use of the `jQuery`_ library.
|
||||
|
||||
To avoid conflicts with user-supplied scripts or libraries, Django's jQuery
|
||||
(version 1.11.2) is namespaced as ``django.jQuery``. If you want to use jQuery
|
||||
@@ -2725,7 +2725,7 @@ Index ``index``
|
||||
Logout ``logout``
|
||||
Password change ``password_change``
|
||||
Password change done ``password_change_done``
|
||||
i18n javascript ``jsi18n``
|
||||
i18n JavaScript ``jsi18n``
|
||||
Application index page ``app_list`` ``app_label``
|
||||
Redirect to object's page ``view_on_site`` ``content_type_id``, ``object_id``
|
||||
========================= ======================== ==================================
|
||||
|
||||
@@ -7,7 +7,7 @@ Cross Site Request Forgery protection
|
||||
|
||||
The CSRF middleware and template tag provides easy-to-use protection against
|
||||
`Cross Site Request Forgeries`_. This type of attack occurs when a malicious
|
||||
Web site contains a link, a form button or some javascript that is intended to
|
||||
Web site contains a link, a form button or some JavaScript that is intended to
|
||||
perform some action on your Web site, using the credentials of a logged-in user
|
||||
who visits the malicious site in their browser. A related type of attack,
|
||||
'login CSRF', where an attacking site tricks a user's browser into logging into
|
||||
@@ -80,7 +80,7 @@ While the above method can be used for AJAX POST requests, it has some
|
||||
inconveniences: you have to remember to pass the CSRF token in as POST data with
|
||||
every POST request. For this reason, there is an alternative method: on each
|
||||
XMLHttpRequest, set a custom ``X-CSRFToken`` header to the value of the CSRF
|
||||
token. This is often easier, because many javascript frameworks provide hooks
|
||||
token. This is often easier, because many JavaScript frameworks provide hooks
|
||||
that allow headers to be set on every request.
|
||||
|
||||
As a first step, you must get the CSRF token itself. The recommended source for
|
||||
|
||||
@@ -252,7 +252,7 @@ sites with improperly configured servers, it can also pose a security
|
||||
risk.
|
||||
|
||||
If your site serves user-uploaded files, a malicious user could upload a
|
||||
specially-crafted file that would be interpreted as HTML or Javascript by
|
||||
specially-crafted file that would be interpreted as HTML or JavaScript by
|
||||
the browser when you expected it to be something harmless.
|
||||
|
||||
To learn more about this header and how the browser treats it, you can
|
||||
@@ -280,8 +280,8 @@ setting will be useful.
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
|
||||
Some browsers have the ability to block content that appears to be an `XSS
|
||||
attack`_. They work by looking for Javascript content in the GET or POST
|
||||
parameters of a page. If the Javascript is replayed in the server's response,
|
||||
attack`_. They work by looking for JavaScript content in the GET or POST
|
||||
parameters of a page. If the JavaScript is replayed in the server's response,
|
||||
the page is blocked from rendering and an error page is shown instead.
|
||||
|
||||
The `X-XSS-Protection header`_ is used to control the operation of the
|
||||
|
||||
@@ -3022,7 +3022,7 @@ protected cookie data.
|
||||
Turning it on makes it less trivial for an attacker to escalate a cross-site
|
||||
scripting vulnerability into full hijacking of a user's session. There's not
|
||||
much excuse for leaving this off, either: if your code depends on reading
|
||||
session cookies from Javascript, you're probably doing it wrong.
|
||||
session cookies from JavaScript, you're probably doing it wrong.
|
||||
|
||||
.. versionadded:: 1.7
|
||||
|
||||
|
||||
@@ -1142,7 +1142,7 @@ verbatim
|
||||
|
||||
Stops the template engine from rendering the contents of this block tag.
|
||||
|
||||
A common use is to allow a Javascript template layer that collides with
|
||||
A common use is to allow a JavaScript template layer that collides with
|
||||
Django's syntax. For example::
|
||||
|
||||
{% verbatim %}
|
||||
|
||||
Reference in New Issue
Block a user