You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cordova.apache.org by ma...@apache.org on 2014/09/09 18:44:00 UTC

docs commit: CB-7291 Fix unintended html tags that hosed rendering.

Repository: cordova-docs
Updated Branches:
  refs/heads/master 64cafceec -> 37599cb7c


CB-7291 Fix unintended html tags that hosed rendering.


Project: http://git-wip-us.apache.org/repos/asf/cordova-docs/repo
Commit: http://git-wip-us.apache.org/repos/asf/cordova-docs/commit/37599cb7
Tree: http://git-wip-us.apache.org/repos/asf/cordova-docs/tree/37599cb7
Diff: http://git-wip-us.apache.org/repos/asf/cordova-docs/diff/37599cb7

Branch: refs/heads/master
Commit: 37599cb7c9b18da71ace86cd0fd94fdb9efe1641
Parents: 64cafce
Author: Marcel Kinard <cm...@gmail.com>
Authored: Tue Sep 9 12:42:49 2014 -0400
Committer: Marcel Kinard <cm...@gmail.com>
Committed: Tue Sep 9 12:42:49 2014 -0400

----------------------------------------------------------------------
 docs/en/3.6.1/guide/appdev/whitelist/index.md | 2 +-
 docs/en/edge/guide/appdev/whitelist/index.md  | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cordova-docs/blob/37599cb7/docs/en/3.6.1/guide/appdev/whitelist/index.md
----------------------------------------------------------------------
diff --git a/docs/en/3.6.1/guide/appdev/whitelist/index.md b/docs/en/3.6.1/guide/appdev/whitelist/index.md
index 2a1a3c3..bfc05c7 100644
--- a/docs/en/3.6.1/guide/appdev/whitelist/index.md
+++ b/docs/en/3.6.1/guide/appdev/whitelist/index.md
@@ -83,7 +83,7 @@ whitelist. Also see "External Application Whitelist" below for more information
 on launching external applications by URL.
 
 __NOTE__: Some network requests do not go through the Cordova Whitelist.
-This includes <video> and <audio> resouces, WebSocket connections (on
+This includes &lt;video&gt; and &lt;audio&gt; resouces, WebSocket connections (on
 Android 4.4+), and possibly other non-http requests. On Android 4.4+,
 you can include a [CSP](https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy)
 header in your HTML documents to restrict access to those resources.

http://git-wip-us.apache.org/repos/asf/cordova-docs/blob/37599cb7/docs/en/edge/guide/appdev/whitelist/index.md
----------------------------------------------------------------------
diff --git a/docs/en/edge/guide/appdev/whitelist/index.md b/docs/en/edge/guide/appdev/whitelist/index.md
index 2a1a3c3..bfc05c7 100644
--- a/docs/en/edge/guide/appdev/whitelist/index.md
+++ b/docs/en/edge/guide/appdev/whitelist/index.md
@@ -83,7 +83,7 @@ whitelist. Also see "External Application Whitelist" below for more information
 on launching external applications by URL.
 
 __NOTE__: Some network requests do not go through the Cordova Whitelist.
-This includes <video> and <audio> resouces, WebSocket connections (on
+This includes &lt;video&gt; and &lt;audio&gt; resouces, WebSocket connections (on
 Android 4.4+), and possibly other non-http requests. On Android 4.4+,
 you can include a [CSP](https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy)
 header in your HTML documents to restrict access to those resources.