Fixed #29055 -- Doc'd that escapejs doesn't make template literals safe.

This commit is contained in:
Tim Graham 2018-01-27 09:40:55 -05:00 committed by GitHub
parent 3aa9ab39cc
commit f229049d6c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -1618,8 +1618,8 @@ For example, you can apply ``escape`` to fields when :ttag:`autoescape` is off::
------------ ------------
Escapes characters for use in JavaScript strings. This does *not* make the Escapes characters for use in JavaScript strings. This does *not* make the
string safe for use in HTML, but does protect you from syntax errors when using string safe for use in HTML or JavaScript template literals, but does protect
templates to generate JavaScript/JSON. you from syntax errors when using templates to generate JavaScript/JSON.
For example:: For example::