Skip to content

Commit fa8ab90

Browse files
authored
Merge pull request #147 from duongdominhchau/master
Fix typo, markup and PDF display issue. Fix Makefile latexpdf target
2 parents b4b7c23 + f74c6ed commit fa8ab90

9 files changed

+10
-10
lines changed

docs/Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,9 +125,9 @@ latex:
125125

126126
latexpdf:
127127
$(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/html/python-anti-patterns/latex
128-
@cp logo_qc.png $(BUILDDIR)/latex
128+
@cp logo_qc.png $(BUILDDIR)/html/python-anti-patterns/latex
129129
@echo "Running LaTeX files through pdflatex..."
130-
$(MAKE) -C $(BUILDDIR)/latex all-pdf
130+
$(MAKE) -C $(BUILDDIR)/html/python-anti-patterns/latex all-pdf
131131
@echo "pdflatex finished; the PDF files are in $(BUILDDIR)/html/python-anti-patterns/latex."
132132

133133
latexpdfja:

docs/django/1.8/migration/template_string_if_invalid_deprecated.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
TEMPLATE_STRING_IF_INVALID deprecated
22
=====================================
33

4-
This setting sets the output that the template system should use for invalid (e.g. misspelled) variables. The default value is an empty string ``''``. This setting is deprecated since Django version 1.8. Set the `string_if_invalid` option in the `OPTIONS` of a `DjangoTemplates` backend instead.
4+
This setting sets the output that the template system should use for invalid (e.g. misspelled) variables. The default value is an empty string ``''``. This setting is deprecated since Django version 1.8. Set the ``string_if_invalid`` option in the ``OPTIONS`` of a ``DjangoTemplates`` backend instead.
55

66
Deprecated feature
77
------------------

docs/django/all/performance/inefficient_database_queries.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Best practice
4747
Use ``.values()``
4848
.................
4949

50-
To avoid such a scenario, make sure you only query the data you really need for your program. Use ``.values()`` to restrict the underlying SQL query to required fields only.
50+
To avoid such scenario, make sure you only query the data you really need. Use ``.values()`` to restrict the underlying SQL query to required fields only.
5151

5252
.. code:: python
5353

docs/django/all/security/allowed_hosts_setting_missing.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Anti-Pattern
1919
Best practice
2020
-------------
2121

22-
Make sure, an appropriate host is set in `ALLOWED_HOSTS`, whenever `DEBUG = False`.
22+
Make sure, an appropriate host is set in ``ALLOWED_HOSTS``, whenever ``DEBUG = False``.
2323

2424
.. code:: python
2525

docs/django/all/security/django_secrect_key_published.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ A secret key has to be be kept secret. Make sure it is only used in production,
66
Anti-pattern
77
------------
88

9-
This settings.py contains a SECRET_KEY. You should not do this!
9+
This settings.py contains a ``SECRET_KEY``. You should not do this!
1010

1111
.. code:: python
1212

docs/django/all/security/index.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
:fa:`lock` Security
22
===================
33

4-
Most Django applications contain a lot of proprietory or even confidential information. Hence, it is crucial to take all possible measures to take your Django application secure and to recude the possibility of being hacked.
4+
Most Django applications contain a lot of proprietary or even confidential information. Hence, it is crucial to take all possible measures to take your Django application secure and to reduce the possibility of being hacked.
55

66
Use the following patterns to increase the security of your code.
77

docs/django/all/security/same_value_for_media_root_and_static_root.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Same value for MEDIA_ROOT and STATIC_ROOT
22
=========================================
33

4-
According to Django's documentation, ``MEDIA_ROOT`` and ``STATIC_ROOT`` must have different values. Before STATIC_ROOT was introduced, ``MEDIA_ROOT`` was also used (as fallback) to also serve static files. As this can have serious security implications, Django has validation checks to prevent it.
4+
According to Django's documentation, ``MEDIA_ROOT`` and ``STATIC_ROOT`` must have different values. Before ``STATIC_ROOT`` was introduced, ``MEDIA_ROOT`` was also used (as fallback) to also serve static files. As this can have serious security implications, Django has validation checks to prevent it.
55

66
Anti-pattern
77
------------

docs/django/all/security/same_value_for_media_url_and_static_url.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Anti-pattern
1919
Best practice
2020
-------------
2121

22-
Ensure, `STATIC_URL` and `MEDIA_URL` point to different URL's.
22+
Ensure, ``STATIC_URL`` and ``MEDIA_URL`` point to different URL's.
2323

2424
.. code:: python
2525

docs/readability/test_for_object_identity_should_be_is_not.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Only use the ``is`` operator if you want to check the exact identity of two refe
3030
some_list = None
3131
3232
if some_list is None:
33-
do_somthing_with_the_list()
33+
do_something_with_the_list()
3434
3535
References
3636
----------

0 commit comments

Comments
 (0)