From: Bartosz DziewoƄski Date: Thu, 19 Jan 2017 15:08:51 +0000 (+0100) Subject: Do not linkify the namespace URI in 'uploadscriptednamespace' error message X-Git-Tag: 1.31.0-rc.0~4160^2 X-Git-Url: http://git.cyclocoop.org//%22%22.url_de_base%28%29.%22/%22?a=commitdiff_plain;h=42f84ece51b6b764e18aec2b77784c7bb4397b45;p=lhc%2Fweb%2Fwiklou.git Do not linkify the namespace URI in 'uploadscriptednamespace' error message While namespace names look just like URLs, many of them (even valid ones) do not actually represent viewable pages. Change-Id: Ie5bf7c2662bb9ea5cdeb7506a1ee875c4d032dde --- diff --git a/languages/i18n/en.json b/languages/i18n/en.json index b86ca92e10..351ebe8fed 100644 --- a/languages/i18n/en.json +++ b/languages/i18n/en.json @@ -1541,7 +1541,7 @@ "uploaded-setting-handler-svg": "SVG that sets the \"handler\" attribute with remote/data/script is blocked. Found $1=\"$2\" in the uploaded SVG file.", "uploaded-remote-url-svg": "SVG that sets any style attribute with remote URL is blocked. Found $1=\"$2\" in the uploaded SVG file.", "uploaded-image-filter-svg": "Found image filter with URL: <$1 $2=\"$3\"> in the uploaded SVG file.", - "uploadscriptednamespace": "This SVG file contains an illegal namespace \"$1\".", + "uploadscriptednamespace": "This SVG file contains an illegal namespace \"$1\".", "uploadinvalidxml": "The XML in the uploaded file could not be parsed.", "uploadvirus": "The file contains a virus!\nDetails: $1", "uploadjava": "The file is a ZIP file that contains a Java .class file.\nUploading Java files is not allowed because they can cause security restrictions to be bypassed.",