Fixed #29055 -- Doc'd that escapejs doesn't make template literals safe.

This commit is contained in:
Tim Graham 2018-01-27 09:40:55 -05:00 committed by GitHub
parent 3aa9ab39cc
commit f229049d6c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -1618,8 +1618,8 @@ For example, you can apply ``escape`` to fields when :ttag:`autoescape` is off::
------------
Escapes characters for use in JavaScript strings. This does *not* make the
string safe for use in HTML, but does protect you from syntax errors when using
templates to generate JavaScript/JSON.
string safe for use in HTML or JavaScript template literals, but does protect
you from syntax errors when using templates to generate JavaScript/JSON.
For example::