diff --git a/docs/en/Configuration.md b/docs/en/Configuration.md index a89d1f9..b9ac63f 100644 --- a/docs/en/Configuration.md +++ b/docs/en/Configuration.md @@ -2,7 +2,8 @@ ## Overview -The module provides a number of built in configuration settings below are the default settings +The module provides a number of built in configuration settings below are the +default settings // mysite/_config.php @@ -23,8 +24,8 @@ The module provides a number of built in configuration settings below are the de 'gravatar_size' => 80 ); -If you want to customize any of the configuration options after you have added the extension (or -on the built-in SiteTree commenting) use `set_config_value` +If you want to customize any of the configuration options after you have added +the extension (or on the built-in SiteTree commenting) use `set_config_value` // mysite/_config.php - Sets require_login to true for all pages Commenting::set_config_value('SiteTree', 'require_login', true); @@ -34,22 +35,22 @@ on the built-in SiteTree commenting) use `set_config_value` ## HTML Comments -Comments can be configured to contain a restricted set of HTML tags -through the `html_allowed` and `html_allowed_elements` settings. -Raw HTML is hardly user friendly, but combined with a rich-text editor -of your own choosing it can allow rich comment formatting. +Comments can be configured to contain a restricted set of HTML tags through the +`html_allowed` and `html_allowed_elements` settings. Raw HTML is hardly user +friendly, but combined with a rich-text editor of your own choosing it can +allow rich comment formatting. In order to use this feature, you need to install the -[HTMLPurifier](http://htmlpurifier.org/) library. -The easiest way to do this is through [Composer](http://getcomposer.org). +[HTMLPurifier](http://htmlpurifier.org/) library. The easiest way to do this is +through [Composer](http://getcomposer.org). { "require": {"ezyang/htmlpurifier": "4.*"} } -**Important**: Rendering user-provided HTML on your website always risks -exposing your users to cross-site scripting (XSS) attacks, if the HTML -isn't properly sanitized. Don't allow tags like `