Updated capitalization in the word "JavaScript" for consistency
This commit is contained in:
parent
57202a112a
commit
08c980d752
|
@ -242,16 +242,16 @@ Once you have completed these steps, you are finished with the deprecation.
|
||||||
In each major release, all ``RemovedInDjangoXXWarning``\s matching the new
|
In each major release, all ``RemovedInDjangoXXWarning``\s matching the new
|
||||||
version are removed.
|
version are removed.
|
||||||
|
|
||||||
Javascript patches
|
JavaScript patches
|
||||||
------------------
|
------------------
|
||||||
|
|
||||||
Django's admin system leverages the jQuery framework to increase the
|
Django's admin system leverages the jQuery framework to increase the
|
||||||
capabilities of the admin interface. In conjunction, there is an emphasis on
|
capabilities of the admin interface. In conjunction, there is an emphasis on
|
||||||
admin javascript performance and minimizing overall admin media file size.
|
admin JavaScript performance and minimizing overall admin media file size.
|
||||||
Serving compressed or "minified" versions of javascript files is considered
|
Serving compressed or "minified" versions of JavaScript files is considered
|
||||||
best practice in this regard.
|
best practice in this regard.
|
||||||
|
|
||||||
To that end, patches for javascript files should include both the original
|
To that end, patches for JavaScript files should include both the original
|
||||||
code for future development (e.g. ``foo.js``), and a compressed version for
|
code for future development (e.g. ``foo.js``), and a compressed version for
|
||||||
production use (e.g. ``foo.min.js``). Any links to the file in the codebase
|
production use (e.g. ``foo.min.js``). Any links to the file in the codebase
|
||||||
should point to the compressed version.
|
should point to the compressed version.
|
||||||
|
@ -259,7 +259,7 @@ should point to the compressed version.
|
||||||
Compressing JavaScript
|
Compressing JavaScript
|
||||||
~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
To simplify the process of providing optimized javascript code, Django
|
To simplify the process of providing optimized JavaScript code, Django
|
||||||
includes a handy python script which should be used to create a "minified"
|
includes a handy python script which should be used to create a "minified"
|
||||||
version. To run it::
|
version. To run it::
|
||||||
|
|
||||||
|
@ -268,11 +268,11 @@ version. To run it::
|
||||||
Behind the scenes, ``compress.py`` is a front-end for Google's
|
Behind the scenes, ``compress.py`` is a front-end for Google's
|
||||||
`Closure Compiler`_ which is written in Java. However, the Closure Compiler
|
`Closure Compiler`_ which is written in Java. However, the Closure Compiler
|
||||||
library is not bundled with Django directly, so those wishing to contribute
|
library is not bundled with Django directly, so those wishing to contribute
|
||||||
complete javascript patches will need to download and install the library
|
complete JavaScript patches will need to download and install the library
|
||||||
independently. The Closure Compiler library requires `Java`_ 7 or higher.
|
independently. The Closure Compiler library requires `Java`_ 7 or higher.
|
||||||
|
|
||||||
Please don't forget to run ``compress.py`` and include the ``diff`` of the
|
Please don't forget to run ``compress.py`` and include the ``diff`` of the
|
||||||
minified scripts when submitting patches for Django's javascript.
|
minified scripts when submitting patches for Django's JavaScript.
|
||||||
|
|
||||||
.. _Closure Compiler: https://developers.google.com/closure/compiler/
|
.. _Closure Compiler: https://developers.google.com/closure/compiler/
|
||||||
.. _list of tickets with patches: https://code.djangoproject.com/query?status=new&status=assigned&status=reopened&has_patch=1&order=priority
|
.. _list of tickets with patches: https://code.djangoproject.com/query?status=new&status=assigned&status=reopened&has_patch=1&order=priority
|
||||||
|
|
|
@ -1827,7 +1827,7 @@ definitions on forms <form-asset-paths>`.
|
||||||
jQuery
|
jQuery
|
||||||
~~~~~~
|
~~~~~~
|
||||||
|
|
||||||
Django admin Javascript makes use of the `jQuery`_ library.
|
Django admin JavaScript makes use of the `jQuery`_ library.
|
||||||
|
|
||||||
To avoid conflicts with user-supplied scripts or libraries, Django's jQuery
|
To avoid conflicts with user-supplied scripts or libraries, Django's jQuery
|
||||||
(version 1.11.2) is namespaced as ``django.jQuery``. If you want to use jQuery
|
(version 1.11.2) is namespaced as ``django.jQuery``. If you want to use jQuery
|
||||||
|
@ -2673,7 +2673,7 @@ Index ``index``
|
||||||
Logout ``logout``
|
Logout ``logout``
|
||||||
Password change ``password_change``
|
Password change ``password_change``
|
||||||
Password change done ``password_change_done``
|
Password change done ``password_change_done``
|
||||||
i18n javascript ``jsi18n``
|
i18n JavaScript ``jsi18n``
|
||||||
Application index page ``app_list`` ``app_label``
|
Application index page ``app_list`` ``app_label``
|
||||||
Redirect to object's page ``view_on_site`` ``content_type_id``, ``object_id``
|
Redirect to object's page ``view_on_site`` ``content_type_id``, ``object_id``
|
||||||
========================= ======================== ==================================
|
========================= ======================== ==================================
|
||||||
|
|
|
@ -7,7 +7,7 @@ Cross Site Request Forgery protection
|
||||||
|
|
||||||
The CSRF middleware and template tag provides easy-to-use protection against
|
The CSRF middleware and template tag provides easy-to-use protection against
|
||||||
`Cross Site Request Forgeries`_. This type of attack occurs when a malicious
|
`Cross Site Request Forgeries`_. This type of attack occurs when a malicious
|
||||||
Web site contains a link, a form button or some javascript that is intended to
|
Web site contains a link, a form button or some JavaScript that is intended to
|
||||||
perform some action on your Web site, using the credentials of a logged-in user
|
perform some action on your Web site, using the credentials of a logged-in user
|
||||||
who visits the malicious site in their browser. A related type of attack,
|
who visits the malicious site in their browser. A related type of attack,
|
||||||
'login CSRF', where an attacking site tricks a user's browser into logging into
|
'login CSRF', where an attacking site tricks a user's browser into logging into
|
||||||
|
@ -80,7 +80,7 @@ While the above method can be used for AJAX POST requests, it has some
|
||||||
inconveniences: you have to remember to pass the CSRF token in as POST data with
|
inconveniences: you have to remember to pass the CSRF token in as POST data with
|
||||||
every POST request. For this reason, there is an alternative method: on each
|
every POST request. For this reason, there is an alternative method: on each
|
||||||
XMLHttpRequest, set a custom ``X-CSRFToken`` header to the value of the CSRF
|
XMLHttpRequest, set a custom ``X-CSRFToken`` header to the value of the CSRF
|
||||||
token. This is often easier, because many javascript frameworks provide hooks
|
token. This is often easier, because many JavaScript frameworks provide hooks
|
||||||
that allow headers to be set on every request.
|
that allow headers to be set on every request.
|
||||||
|
|
||||||
As a first step, you must get the CSRF token itself. The recommended source for
|
As a first step, you must get the CSRF token itself. The recommended source for
|
||||||
|
|
|
@ -252,7 +252,7 @@ sites with improperly configured servers, it can also pose a security
|
||||||
risk.
|
risk.
|
||||||
|
|
||||||
If your site serves user-uploaded files, a malicious user could upload a
|
If your site serves user-uploaded files, a malicious user could upload a
|
||||||
specially-crafted file that would be interpreted as HTML or Javascript by
|
specially-crafted file that would be interpreted as HTML or JavaScript by
|
||||||
the browser when you expected it to be something harmless.
|
the browser when you expected it to be something harmless.
|
||||||
|
|
||||||
To learn more about this header and how the browser treats it, you can
|
To learn more about this header and how the browser treats it, you can
|
||||||
|
@ -280,8 +280,8 @@ setting will be useful.
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
Some browsers have the ability to block content that appears to be an `XSS
|
Some browsers have the ability to block content that appears to be an `XSS
|
||||||
attack`_. They work by looking for Javascript content in the GET or POST
|
attack`_. They work by looking for JavaScript content in the GET or POST
|
||||||
parameters of a page. If the Javascript is replayed in the server's response,
|
parameters of a page. If the JavaScript is replayed in the server's response,
|
||||||
the page is blocked from rendering and an error page is shown instead.
|
the page is blocked from rendering and an error page is shown instead.
|
||||||
|
|
||||||
The `X-XSS-Protection header`_ is used to control the operation of the
|
The `X-XSS-Protection header`_ is used to control the operation of the
|
||||||
|
|
|
@ -2862,7 +2862,7 @@ protected cookie data.
|
||||||
Turning it on makes it less trivial for an attacker to escalate a cross-site
|
Turning it on makes it less trivial for an attacker to escalate a cross-site
|
||||||
scripting vulnerability into full hijacking of a user's session. There's not
|
scripting vulnerability into full hijacking of a user's session. There's not
|
||||||
much excuse for leaving this off, either: if your code depends on reading
|
much excuse for leaving this off, either: if your code depends on reading
|
||||||
session cookies from Javascript, you're probably doing it wrong.
|
session cookies from JavaScript, you're probably doing it wrong.
|
||||||
|
|
||||||
.. _HTTPOnly: https://www.owasp.org/index.php/HTTPOnly
|
.. _HTTPOnly: https://www.owasp.org/index.php/HTTPOnly
|
||||||
|
|
||||||
|
|
|
@ -1146,7 +1146,7 @@ verbatim
|
||||||
|
|
||||||
Stops the template engine from rendering the contents of this block tag.
|
Stops the template engine from rendering the contents of this block tag.
|
||||||
|
|
||||||
A common use is to allow a Javascript template layer that collides with
|
A common use is to allow a JavaScript template layer that collides with
|
||||||
Django's syntax. For example::
|
Django's syntax. For example::
|
||||||
|
|
||||||
{% verbatim %}
|
{% verbatim %}
|
||||||
|
|
|
@ -36,7 +36,7 @@ browsers, our encoding of cookie values was changed so that the characters
|
||||||
comma and semi-colon are treated as non-safe characters, and are therefore
|
comma and semi-colon are treated as non-safe characters, and are therefore
|
||||||
encoded as ``\054`` and ``\073`` respectively. This could produce backwards
|
encoded as ``\054`` and ``\073`` respectively. This could produce backwards
|
||||||
incompatibilities, especially if you are storing comma or semi-colon in
|
incompatibilities, especially if you are storing comma or semi-colon in
|
||||||
cookies and have javascript code that parses and manipulates cookie values
|
cookies and have JavaScript code that parses and manipulates cookie values
|
||||||
client-side.
|
client-side.
|
||||||
|
|
||||||
One new feature
|
One new feature
|
||||||
|
|
|
@ -686,7 +686,7 @@ other browsers, our encoding of cookie values was changed so that the
|
||||||
comma and semicolon are treated as non-safe characters, and are
|
comma and semicolon are treated as non-safe characters, and are
|
||||||
therefore encoded as ``\054`` and ``\073`` respectively. This could
|
therefore encoded as ``\054`` and ``\073`` respectively. This could
|
||||||
produce backwards incompatibilities, especially if you are storing
|
produce backwards incompatibilities, especially if you are storing
|
||||||
comma or semi-colon in cookies and have javascript code that parses
|
comma or semi-colon in cookies and have JavaScript code that parses
|
||||||
and manipulates cookie values client-side.
|
and manipulates cookie values client-side.
|
||||||
|
|
||||||
``ModelForm.is_valid()`` and ``ModelForm.errors``
|
``ModelForm.is_valid()`` and ``ModelForm.errors``
|
||||||
|
|
|
@ -101,7 +101,7 @@ Extended static files handling
|
||||||
|
|
||||||
Django 1.3 ships with a new contrib app --
|
Django 1.3 ships with a new contrib app --
|
||||||
``django.contrib.staticfiles`` -- to help developers handle the static
|
``django.contrib.staticfiles`` -- to help developers handle the static
|
||||||
media files (images, CSS, Javascript, etc.) that are needed to render
|
media files (images, CSS, JavaScript, etc.) that are needed to render
|
||||||
a complete web page.
|
a complete web page.
|
||||||
|
|
||||||
In previous versions of Django, it was common to place static assets
|
In previous versions of Django, it was common to place static assets
|
||||||
|
@ -588,7 +588,7 @@ gettext domain):
|
||||||
translations). See the `corresponding deprecated features section`_
|
translations). See the `corresponding deprecated features section`_
|
||||||
of this document.
|
of this document.
|
||||||
|
|
||||||
For translatable literals found in Javascript code (``'djangojs'`` gettext
|
For translatable literals found in JavaScript code (``'djangojs'`` gettext
|
||||||
domain):
|
domain):
|
||||||
|
|
||||||
* Similarly to the ``'django'`` domain translations: Overriding of
|
* Similarly to the ``'django'`` domain translations: Overriding of
|
||||||
|
|
|
@ -194,7 +194,7 @@ more information.
|
||||||
``{% verbatim %}`` template tag
|
``{% verbatim %}`` template tag
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
To make it easier to deal with javascript templates which collide with Django's
|
To make it easier to deal with JavaScript templates which collide with Django's
|
||||||
syntax, you can now use the :ttag:`verbatim` block tag to avoid parsing the
|
syntax, you can now use the :ttag:`verbatim` block tag to avoid parsing the
|
||||||
tag's content.
|
tag's content.
|
||||||
|
|
||||||
|
|
|
@ -857,7 +857,7 @@ Miscellaneous
|
||||||
:meth:`~django.db.models.query.QuerySet.none` has been called:
|
:meth:`~django.db.models.query.QuerySet.none` has been called:
|
||||||
``isinstance(qs.none(), EmptyQuerySet)``
|
``isinstance(qs.none(), EmptyQuerySet)``
|
||||||
|
|
||||||
* If your CSS/Javascript code used to access HTML input widgets by type, you
|
* If your CSS/JavaScript code used to access HTML input widgets by type, you
|
||||||
should review it as ``type='text'`` widgets might be now output as
|
should review it as ``type='text'`` widgets might be now output as
|
||||||
``type='email'``, ``type='url'`` or ``type='number'`` depending on their
|
``type='email'``, ``type='url'`` or ``type='number'`` depending on their
|
||||||
corresponding field type.
|
corresponding field type.
|
||||||
|
|
|
@ -1747,7 +1747,7 @@ whose implementation was changed to make use of ``json.dumps()`` instead.
|
||||||
If you were relying on this function to provide safe output from untrusted
|
If you were relying on this function to provide safe output from untrusted
|
||||||
strings, you should use ``django.utils.html.escapejs`` or the
|
strings, you should use ``django.utils.html.escapejs`` or the
|
||||||
:tfilter:`escapejs` template filter.
|
:tfilter:`escapejs` template filter.
|
||||||
If all you need is to generate valid javascript strings, you can simply use
|
If all you need is to generate valid JavaScript strings, you can simply use
|
||||||
``json.dumps()``.
|
``json.dumps()``.
|
||||||
|
|
||||||
``fix_ampersands`` utils method and template filter
|
``fix_ampersands`` utils method and template filter
|
||||||
|
|
|
@ -390,7 +390,7 @@ itunes
|
||||||
iTunes
|
iTunes
|
||||||
ize
|
ize
|
||||||
Jannis
|
Jannis
|
||||||
javascript
|
JavaScript
|
||||||
Jinja
|
Jinja
|
||||||
jQuery
|
jQuery
|
||||||
JServ
|
JServ
|
||||||
|
|
|
@ -207,7 +207,7 @@ be prepended with the value of the appropriate prefix.
|
||||||
|
|
||||||
As part of the introduction of the
|
As part of the introduction of the
|
||||||
:doc:`staticfiles app </ref/contrib/staticfiles>` two new settings were added
|
:doc:`staticfiles app </ref/contrib/staticfiles>` two new settings were added
|
||||||
to refer to "static files" (images, CSS, Javascript, etc.) that are needed
|
to refer to "static files" (images, CSS, JavaScript, etc.) that are needed
|
||||||
to render a complete web page: :setting:`STATIC_URL` and :setting:`STATIC_ROOT`.
|
to render a complete web page: :setting:`STATIC_URL` and :setting:`STATIC_ROOT`.
|
||||||
|
|
||||||
To find the appropriate prefix to use, Django will check if the
|
To find the appropriate prefix to use, Django will check if the
|
||||||
|
|
|
@ -64,7 +64,7 @@ will try to use a locale specific format whenever it outputs a value
|
||||||
in a template.
|
in a template.
|
||||||
|
|
||||||
However, it may not always be appropriate to use localized values --
|
However, it may not always be appropriate to use localized values --
|
||||||
for example, if you're outputting Javascript or XML that is designed
|
for example, if you're outputting JavaScript or XML that is designed
|
||||||
to be machine-readable, you will always want unlocalized values. You
|
to be machine-readable, you will always want unlocalized values. You
|
||||||
may also want to use localization in selected templates, rather than
|
may also want to use localization in selected templates, rather than
|
||||||
using localization everywhere.
|
using localization everywhere.
|
||||||
|
|
|
@ -1187,7 +1187,7 @@ whenever you restart your application server.
|
||||||
def cached_javascript_catalog(request, domain='djangojs', packages=None):
|
def cached_javascript_catalog(request, domain='djangojs', packages=None):
|
||||||
return javascript_catalog(request, domain, packages)
|
return javascript_catalog(request, domain, packages)
|
||||||
|
|
||||||
You can even pre-generate the javascript catalog as part of your deployment
|
You can even pre-generate the JavaScript catalog as part of your deployment
|
||||||
procedure and serve it as a static file. This radical technique is implemented
|
procedure and serve it as a static file. This radical technique is implemented
|
||||||
in django-statici18n_.
|
in django-statici18n_.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue