Skip to content

Commit f087d3e

Browse files
committed
More syntax fixes
1 parent 51741ae commit f087d3e

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

templates.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -906,7 +906,7 @@ user name. If a malicious user sets ``<script>alert('hello!')</script>`` as
906906
their name and you output that value unchanged, the application will display a
907907
JavaScript popup window.
908908

909-
This is known as a `Cross Site Scripting`_ (XSS) attack. And while the previous
909+
This is known as a `Cross-Site Scripting`_ (XSS) attack. And while the previous
910910
example seems harmless, the attacker could write more advanced JavaScript code
911911
to performs malicious actions.
912912

@@ -1097,3 +1097,4 @@ Learn more
10971097
.. _`snake case`: https://en.wikipedia.org/wiki/Snake_case
10981098
.. _`Twig template inheritance`: https://twig.symfony.com/doc/2.x/tags/extends.html
10991099
.. _`Twig block tag`: https://twig.symfony.com/doc/2.x/tags/block.html
1100+
.. _`Cross-Site Scripting`: https://en.wikipedia.org/wiki/Cross-site_scripting

templating/global_variables.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,6 @@ the ``@`` character, which is the usual syntax to
108108
Now you can use the ``uuid`` variable in any Twig template to access to the
109109
``UuidGenerator`` service:
110110

111-
.. code-block:: html+twig
111+
.. code-block:: twig
112112
113113
UUID: {{ uuid.generate }}

0 commit comments

Comments
 (0)