Sometimes we're interpolating a link inside a translation, and marking the whole translations as HTML safe. However, some translations added by admins to the database or through crowdin are not entirely under our control. Although AFAIK crowdin checks for potential cross-site scripting attacks, it's a good practice to sanitize parts of a string potentially out of our control before marking the string as HTML safe.
31 lines
1.0 KiB
Plaintext
31 lines
1.0 KiB
Plaintext
<div class="debate-form row">
|
|
|
|
<div class="small-12 medium-9 column">
|
|
<%= back_link_to debates_path %>
|
|
|
|
<h1><%= t("debates.new.start_new") %></h1>
|
|
<div data-alert class="callout primary">
|
|
<%= sanitize(t("debates.new.info",
|
|
info_link: link_to(t("debates.new.info_link"), new_proposal_path))) %>
|
|
|
|
<% if feature?(:help_page) %>
|
|
<%= link_to help_path, title: t("shared.target_blank"), target: "_blank" do %>
|
|
<strong><%= t("debates.new.more_info") %></strong>
|
|
<% end %>
|
|
<% end %>
|
|
</div>
|
|
<%= render "form" %>
|
|
</div>
|
|
|
|
<div class="small-12 medium-3 column">
|
|
<span class="icon-debates float-right"></span>
|
|
<h2><%= t("debates.new.recommendations_title") %></h2>
|
|
<ul class="recommendations">
|
|
<li><%= t("debates.new.recommendation_one") %></li>
|
|
<li><%= t("debates.new.recommendation_two") %></li>
|
|
<li><%= t("debates.new.recommendation_three") %></li>
|
|
<li><%= t("debates.new.recommendation_four") %></li>
|
|
</ul>
|
|
</div>
|
|
</div>
|