From 0dfd37e5a930317d0144913ae63407a73fcdacc6 Mon Sep 17 00:00:00 2001 From: Patrice Chalin Date: Tue, 20 Dec 2016 14:14:58 -0800 Subject: [PATCH] docs(security): hide TOC for Dart; other minor copyedits (#3017) --- .../ts/app/bypass-security.component.html | 9 +- .../ts/app/inner-html-binding.component.ts | 2 +- public/docs/ts/latest/guide/security.jade | 250 +++++++++--------- 3 files changed, 132 insertions(+), 129 deletions(-) diff --git a/public/docs/_examples/security/ts/app/bypass-security.component.html b/public/docs/_examples/security/ts/app/bypass-security.component.html index 374dcc8d64..a757d6b75b 100644 --- a/public/docs/_examples/security/ts/app/bypass-security.component.html +++ b/public/docs/_examples/security/ts/app/bypass-security.component.html @@ -1,20 +1,17 @@

Bypass Security Component

- +

An untrusted URL:

Click me

A trusted URL:

Click me

- + - +

Resource URL:

Trusted:

Untrusted:

- - - diff --git a/public/docs/_examples/security/ts/app/inner-html-binding.component.ts b/public/docs/_examples/security/ts/app/inner-html-binding.component.ts index 88475e3724..603a1981d6 100644 --- a/public/docs/_examples/security/ts/app/inner-html-binding.component.ts +++ b/public/docs/_examples/security/ts/app/inner-html-binding.component.ts @@ -6,7 +6,7 @@ import { Component } from '@angular/core'; selector: 'inner-html-binding', templateUrl: 'inner-html-binding.component.html', }) -// #docregion inner-html-controller +// #docregion class export class InnerHtmlBindingComponent { // For example, a user/attacker-controlled value from a URL. htmlSnippet = 'Template Syntax'; diff --git a/public/docs/ts/latest/guide/security.jade b/public/docs/ts/latest/guide/security.jade index 2e093b4b47..398b26316f 100644 --- a/public/docs/ts/latest/guide/security.jade +++ b/public/docs/ts/latest/guide/security.jade @@ -8,17 +8,19 @@ block includes For more information about the attacks and mitigations described below, see [OWASP Guide Project](https://www.owasp.org/index.php/Category:OWASP_Guide_Project). -.l-main-section ++ifDocsFor('ts') + .l-main-section + :marked + # Contents: + + * [Reporting vulnerabilities](#report-issues). + * [Best practices](#best-practices). + * [Preventing cross-site scripting (XSS)](#xss). + * [Trusting safe values](#bypass-security-apis). + * [HTTP-Level vulnerabilities](#http). + * [Auditing Angular applications](#code-review). + :marked - # Contents: - - * [Reporting vulnerabilities](#report-issues). - * [Best practices](#best-practices). - * [Preventing cross-site scripting (XSS)](#xss). - * [Trusting safe values](#bypass-security-apis). - * [HTTP-Level vulnerabilities](#http). - * [Auditing Angular applications](#code-review). - Try the of the code shown in this page. .l-main-section @@ -103,15 +105,17 @@ h2#xss Preventing cross-site scripting (XSS) a value that an attacker might control into `innerHTML` normally causes an XSS vulnerability. For example, code contained in a `