Skip to content

Commit 0918b69

Browse files
committed
[HtmlSanitizer] Fix method names
1 parent 352ab1f commit 0918b69

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

html_sanitizer.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -819,16 +819,16 @@ URLs of ``<a>`` elements:
819819
(new HtmlSanitizerConfig())
820820
// if `true`, all URLs using the `http://` scheme will be converted to
821821
// use the `https://` scheme instead. `http` still needs to be
822-
// allowed in `allowedLinkSchemes`
822+
// allowed in `allowLinkSchemes`
823823
->forceHttpsUrls()
824824
825825
// specifies the allowed URL schemes. If the URL has a different scheme, the
826826
// attribute will be dropped
827-
->allowedLinkSchemes(['http', 'https', 'mailto'])
827+
->allowLinkSchemes(['http', 'https', 'mailto'])
828828
829829
// specifies the allowed hosts, the attribute will be dropped if the
830830
// URL contains a different host which is not a subdomain of the allowed host
831-
->allowedLinkHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
831+
->allowLinkHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
832832
833833
// whether to allow relative links (i.e. URLs without scheme and host)
834834
->allowRelativeLinks()
@@ -938,16 +938,16 @@ the HTML sanitizer: ``src``, ``href``, ``lowsrc``, ``background`` and ``ping``.
938938
(new HtmlSanitizerConfig())
939939
// if `true`, all URLs using the `http://` scheme will be converted to
940940
// use the `https://` scheme instead. `http` still needs to be
941-
// allowed in `allowedMediaSchemes`
941+
// allowed in `allowMediaSchemes`
942942
->forceHttpsUrls()
943943
944944
// specifies the allowed URL schemes. If the URL has a different scheme, the
945945
// attribute will be dropped
946-
->allowedMediaSchemes(['http', 'https', 'mailto'])
946+
->allowMediaSchemes(['http', 'https', 'mailto'])
947947
948948
// specifies the allowed hosts, the attribute will be dropped if the URL
949949
// contains a different host which is not a subdomain of the allowed host
950-
->allowedMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
950+
->allowMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
951951
952952
// whether to allow relative URLs (i.e. URLs without scheme and host)
953953
->allowRelativeMedias()

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy