Browse Source

Fixed highlightlang deprecation warning on Sphinx 1.8+.

Mariusz Felisiak 5 years ago
parent
commit
678f958ef9

+ 1 - 1
docs/ref/templates/language.txt

@@ -34,7 +34,7 @@ or Jinja2_, you should feel right at home with Django's templates.
 Templates
 =========
 
-.. highlightlang:: html+django
+.. highlight:: html+django
 
 A template is a text file. It can generate any text-based format (HTML, XML,
 CSV, etc.).

+ 4 - 4
docs/topics/i18n/translation.txt

@@ -551,7 +551,7 @@ Similar access to this information is available for template code. See below.
 Internationalization: in template code
 ======================================
 
-.. highlightlang:: html+django
+.. highlight:: html+django
 
 Translations in :doc:`Django templates </ref/templates/language>` uses two template
 tags and a slightly different syntax than in Python code. To give your template
@@ -964,7 +964,7 @@ There are also some filters available for convenience:
 Internationalization: in JavaScript code
 ========================================
 
-.. highlightlang:: python
+.. highlight:: python
 
 Adding translations to JavaScript poses some problems:
 
@@ -1051,7 +1051,7 @@ precedence.
 Using the JavaScript translation catalog
 ----------------------------------------
 
-.. highlightlang:: javascript
+.. highlight:: javascript
 
 To use the catalog, pull in the dynamically generated script like this:
 
@@ -1838,7 +1838,7 @@ redirected in the ``redirect_to`` context variable.
 Explicitly setting the active language
 --------------------------------------
 
-.. highlightlang:: python
+.. highlight:: python
 
 You may want to set the active language for the current session explicitly. Perhaps
 a user's language preference is retrieved from another system, for example.

+ 1 - 1
docs/topics/security.txt

@@ -10,7 +10,7 @@ on securing a Django-powered site.
 Cross site scripting (XSS) protection
 =====================================
 
-.. highlightlang:: html+django
+.. highlight:: html+django
 
 XSS attacks allow a user to inject client side scripts into the browsers of
 other users. This is usually achieved by storing the malicious scripts in the

+ 1 - 1
docs/topics/templates.txt

@@ -657,7 +657,7 @@ creating an object that specifies the following attributes:
 The Django template language
 ============================
 
-.. highlightlang:: html+django
+.. highlight:: html+django
 
 Syntax
 ------