Commit 9432f1e7 authored by Tim Graham's avatar Tim Graham
Browse files

Fixed some doc errors that caused syntax highlighting to fail.

parent 132d0e51
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -569,7 +569,7 @@ Selector and checkbox widgets
    .. code-block:: html

        <ul>
          <li><input type='radio' ...></li>
          <li><input type='radio' name='...'></li>
          ...
        </ul>

@@ -663,7 +663,7 @@ Selector and checkbox widgets
    .. code-block:: html

        <ul>
          <li><input type='checkbox' ...></li>
          <li><input type='checkbox' name='...' ></li>
          ...
        </ul>

+1 −1
Original line number Diff line number Diff line
@@ -320,7 +320,7 @@ If you ``pop()`` too much, it'll raise
    >>> c.pop()
    Traceback (most recent call last):
    ...
    django.template.ContextPopException
    ContextPopException

.. versionadded:: 1.7

+1 −1
Original line number Diff line number Diff line
@@ -108,7 +108,7 @@ Variables included in the cycle will be escaped. You can disable auto-escaping
with::

    {% for o in some_list %}
        <tr class="{% autoescape off %}{% cycle rowvalue1 rowvalue2 %}{% endautoescape %}
        <tr class="{% autoescape off %}{% cycle rowvalue1 rowvalue2 %}{% endautoescape %}">
            ...
        </tr>
    {% endfor %}
+3 −1
Original line number Diff line number Diff line
@@ -1329,7 +1329,9 @@ For example, if your Django app contained a translation string for the text
    _("Welcome to my site.")

...then :djadmin:`django-admin makemessages <makemessages>` will have created
a ``.po`` file containing the following snippet -- a message::
a ``.po`` file containing the following snippet -- a message:

.. code-block:: po

    #: path/to/python/module.py:23
    msgid "Welcome to my site."
+1 −1
Original line number Diff line number Diff line
@@ -31,7 +31,7 @@ protect the following:

.. code-block:: html+django

    <style class={{ var }}>...</style>
    <style class="{{ var }}">...</style>

If ``var`` is set to ``'class1 onmouseover=javascript:func()'``, this can result
in unauthorized JavaScript execution, depending on how the browser renders
Loading